Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
895s -
max time network
688s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18/01/2025, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Emotet.zip
Resource
win10ltsc2021-20250113-en
General
-
Target
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
-
Size
2.7MB
-
MD5
48d8f7bbb500af66baa765279ce58045
-
SHA1
2cdb5fdeee4e9c7bd2e5f744150521963487eb71
-
SHA256
db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1
-
SHA512
aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd
-
SSDEEP
49152:bbevayZlMTWkygVy0nQZfVY2BtZzpPL4PuQ65+6Dv7m0KXTn:bbexZlMQcEVY2BtZzpPL4WQI9U
Malware Config
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
40.32.0.40
32.0.40.32
0.40.32.0
96.194.151.156
0.31.0.136
79.194.172.156
0.32.0.136
12.12.12.0
190.236.184.149
0.133.0.136
165.236.83.146
0.134.0.136
140.236.106.146
0.135.0.136
251.236.125.146
0.136.0.136
226.236.20.146
0.137.0.136
201.236.47.146
0.138.0.136
48.236.198.146
0.139.0.136
31.236.217.146
0.140.0.136
6.236.240.146
0.141.0.136
109.236.139.146
0.142.0.136
84.236.162.146
0.143.0.136
67.236.181.146
0.144.0.136
248.96.75.47
187.1.0.0
240.47.78.47
96.5.76.47
120.5.76.47
120.0.0.0
Signatures
-
Danabot family
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral2/files/0x002900000004613b-5.dat family_danabot -
Blocklisted process makes network request 20 IoCs
flow pid Process 10 2572 rundll32.exe 11 2572 rundll32.exe 22 2572 rundll32.exe 25 2572 rundll32.exe 26 2572 rundll32.exe 28 2572 rundll32.exe 31 2572 rundll32.exe 32 2572 rundll32.exe 36 2572 rundll32.exe 37 2572 rundll32.exe 40 2572 rundll32.exe 41 2572 rundll32.exe 42 2572 rundll32.exe 43 2572 rundll32.exe 44 2572 rundll32.exe 45 2572 rundll32.exe 46 2572 rundll32.exe 48 2572 rundll32.exe 49 2572 rundll32.exe 50 2572 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 636 regsvr32.exe 2572 rundll32.exe 2572 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3288 220 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DanaBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 636 220 DanaBot.exe 82 PID 220 wrote to memory of 636 220 DanaBot.exe 82 PID 220 wrote to memory of 636 220 DanaBot.exe 82 PID 636 wrote to memory of 2572 636 regsvr32.exe 86 PID 636 wrote to memory of 2572 636 regsvr32.exe 86 PID 636 wrote to memory of 2572 636 regsvr32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\THE-MA~1\BANKIN~1\DanaBot.dll f1 C:\Users\Admin\AppData\Local\Temp\THE-MA~1\BANKIN~1\DanaBot.exe@2202⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\THE-MA~1\BANKIN~1\DanaBot.dll,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 4682⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 220 -ip 2201⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD57e76f7a5c55a5bc5f5e2d7a9e886782b
SHA1fc500153dba682e53776bef53123086f00c0e041
SHA256abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3
SHA5120318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24