Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
7f561ee0e9d2708b2a3ad12777848117.exe
Resource
win7-20240705-en
General
-
Target
7f561ee0e9d2708b2a3ad12777848117.exe
-
Size
10.9MB
-
MD5
7f561ee0e9d2708b2a3ad12777848117
-
SHA1
f5dc006b9e11c8ec456f462ac7eb7441ecd788b5
-
SHA256
f57ebec60e5466a335a50e27629bd497513b149a31cc69d348bd65c2e05723ed
-
SHA512
201512bd373d10b11f62e58fe7d0ce65ef98f26c58c19849b541274060243b9c2940cd582631f70f51b651652c9eb955262192a58c01b3f7030d2228d5a091c9
-
SSDEEP
196608:8KzfL83/gGw6kOztHKYCaKWfyBn7SJTfAp:8afL83/V9kYHppfWiTfAp
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7f561ee0e9d2708b2a3ad12777848117.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f561ee0e9d2708b2a3ad12777848117.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7f561ee0e9d2708b2a3ad12777848117.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7f561ee0e9d2708b2a3ad12777848117.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 7f561ee0e9d2708b2a3ad12777848117.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 7f561ee0e9d2708b2a3ad12777848117.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 7f561ee0e9d2708b2a3ad12777848117.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz 7f561ee0e9d2708b2a3ad12777848117.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 7f561ee0e9d2708b2a3ad12777848117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 7f561ee0e9d2708b2a3ad12777848117.exe