Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 05:52 UTC

General

  • Target

    1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll

  • Size

    1.3MB

  • MD5

    08077c0cbc7bbe2320b1d07a9cd475ab

  • SHA1

    273ea1d057e4bfb80849ff53aa948ed7ed08fb17

  • SHA256

    1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001

  • SHA512

    9ecf36bd8d47b5357ef63a95e8a3a3195ca2401c5923d343dba0c34ec0f1bcdd7ad0fdc5e845dd558758ec6ae3492d7b196272aef3b13fd416fb01492c9c6f17

  • SSDEEP

    24576:58FG/L98qXKTVfl8B0Y1ewAfj3xCV2D3qyzITrQB79te:a7VSNAfj3xCoayzIT0je

Malware Config

Extracted

Family

danabot

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPvYED31s9p4zf6GMtg/u+PcE3
3
nZfynudhDfv9UkUfPbos2SlZ26IDACG5/jQNYcToWrfJiUO9rHtvi2OvyMM0sHdJ
4
KQVRs5DsWW+z2cSr3feptw4M2MoUKzr9hDPum7mJDoHCnp1QQ88CXGRFUkIgeDWQ
5
xtcCtZrs2sSQRqUMiwIDAQAB
6
-----END PUBLIC KEY-----
rsa_privkey.plain
1
-----BEGIN PRIVATE KEY-----
2
MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOOm9k+ryXXerM68
3
3MtZ9iYTNyuRgucSqPY6lE/MXd+yHzKDr/WATSQNCWHyU0vm06l6EojeRy2n/34t
4
g7HMf0bs8WdlZE4TZ91//IKYaD3MrU/K6vPCzNJ0koNPb1fYQRjQ48pZvJjekgJ9
5
OWhXoYgdzVvNFQrLJ7gYBKHLNXKVAgMBAAECgYA1gEWez7aW9vAR3hzdxZStuhJb
6
MOVcvOvsgjPc1SCys7/VNVGjFrYKZO3xkOu2iNbxm3jDpcmAl1zaIIQ0wuSeKu+d
7
M+nlRvEv92bvMt77h/71VRYK/634+DngV7N8fkWTpHgBAy1sjRZv126PV4joEL2L
8
h8sJRWeTHmrWqE5BuQJBAP3xg8DF0jJHQt+0YLGFndMxhJyHx76G9Qo3k5Sdrt5g
9
vH/DeZgXXWjkWcU3zZ+aHkXVD2UQfvUY+5zctaJrmE8CQQDlfvCEBfKkBSFyl3je
10
Ci09Fy4TozqMWe67QNTo/t3V6CyL+KHytDqnQnhR6X2hUfueGe9wL5xZrv1FTc0P

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 2 IoCs
  • Danabot family
  • Blocklisted process makes network request 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll,#1
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2876

Network

    No results found
  • 192.119.110.73:443
    https
    rundll32.exe
    1.2kB
    212 B
    6
    5
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x0000000001FB0000-0x0000000002110000-memory.dmp

    Filesize

    1.4MB

  • memory/2876-1-0x0000000001FB0000-0x0000000002110000-memory.dmp

    Filesize

    1.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.