Analysis

  • max time kernel
    143s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2025 09:04

General

  • Target

    B6F6C74F86A145460F03AC3A0520D3345FC7FCC1.msi

  • Size

    8.9MB

  • MD5

    e1438c21e6de91615a6a5e2a48f274fc

  • SHA1

    b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

  • SHA256

    9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

  • SHA512

    9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

  • SSDEEP

    196608:9n520ZroZkRsj6N+gdC1fcmwz/MIpqPuJS8ErZ/0jCi:9n52eSFjG+aAfcRo4Kz8W0j

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    5059953BB045843A520147F73664DC78

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot family
  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 17 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\B6F6C74F86A145460F03AC3A0520D3345FC7FCC1.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2764
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D03CD08CC0D7056327245442CEC46E0F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2580
    • C:\Windows\Installer\MSIF1D3.tmp
      "C:\Windows\Installer\MSIF1D3.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2416
    • C:\Windows\Installer\MSIF1D4.tmp
      "C:\Windows\Installer\MSIF1D4.tmp" /DontWait /HideWindow /dir "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\" C:\Windows\System32\rundll32.exe "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1704
  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:2000
  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76ebca.rbs

    Filesize

    897KB

    MD5

    4633dbe6424255baad1ac5f26a11b48c

    SHA1

    37ad669d3ee69dfa5dcfe8b2ed1583552310309b

    SHA256

    9c23c1ec82b6dafd9a57e3afd32365489163545cd5278afba423da6fc1046bb1

    SHA512

    1b181441a2020f27337709e957a46e0484b57bbb7c6831c96e4fb37591e0b588dabf023dab7ed43afda141e3c735f05e1eee4eecd8f2b7884b37ab33bde9c5cb

  • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    843B

    MD5

    a110cd5b519139efdeae254b642853fb

    SHA1

    ff1769d265d097b843d310800ab3903c05ec4cd4

    SHA256

    e5e57e67ffba33f22b0befd8e91f23e68995b828855a8427b3480a7154a00730

    SHA512

    e0b81c6a55b514566a7409be86e5831b01644ba5967c5bccf5cabf76f501262234131467e55a1ba7252f5e9c8f278aacd15d7963088f4a606fbf5148a43f8fac

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1d51f2a1cf5a88408cb998f3749c86e9

    SHA1

    8a412ff2c624935fcfdda2005eb4ab14830d00e4

    SHA256

    ad7e6ef8e3cee9f1c50baec733865cdd143c536ef7c0d5671ccf5a70eaa09479

    SHA512

    02c27560a047c1ab8c94a40d8aa349bd93150f27222e760b1d44f564fd2905f4fdf58c2173ea2ff237b08f9cc43ab1da41f0ff426a55e1c599f3f6c318d4ee66

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\App\AppInfo\Launcher\TypeFasterPortable.ini

    Filesize

    93B

    MD5

    f9186b93e2ae8b298b2e6297c052e62b

    SHA1

    de07e38fb4d6e104ce47895f4116691bacd56e17

    SHA256

    091e3fc55b8bc2ebf9ca278b34c355fc005b209e9370efdcbd87028cb5b1c1a4

    SHA512

    d40383cf7b3fbc29087ba9a4277c7efc271aa86de8300a9085ce1bed011f420f3d362f6c2d0b221143555c6c26eeb6ae999314f2925415d22a396ca7a2eabaa1

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\App\AppInfo\appinfo.ini

    Filesize

    89B

    MD5

    7bcb7b1845f59df53a03c202a1601207

    SHA1

    912782607739bd4d8deb5f0e3e33c1fb7206db4c

    SHA256

    b9f2b2c8a325250948169be34df400c23e7b08e808596adb11407420f7f6eb9b

    SHA512

    4bc037466d761fa025264a15004363e4fc700a12d5b21e59a2f545116ee817f2d897d11031db57e3ec9911f36ef282c6fb1e5f15afb490a394e40e1cbcff3319

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\App\AppInfo\appinfo.ini

    Filesize

    194B

    MD5

    bf472706802dd5f6af8e260848701527

    SHA1

    05e6c39dc3f028c14994c612cda7565278cbf1fb

    SHA256

    2b2f3cf89d6aa7c9caaa9c68060c894c22894cb62a30d884c43bc96980e9404f

    SHA512

    e2012fc3cf259a6130b9c2e86215b27701811c36c751ce4016a356474df0fc2c56db8624da79ebd7498299c0ffad73ff6aa7084c311ef0e2bfa0fce7a4ca36ae

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\App\AppInfo\appinfo.ini

    Filesize

    421B

    MD5

    a273175a13e52400ce061eb2bf2dcdc6

    SHA1

    70245abbf4dcc6dd86f4295435ce168690f62828

    SHA256

    cf18c44ac149949198858169f8c050fd83f9f59dd03ffdd8691bc0417626689b

    SHA512

    8eae62bc656dfcc0db18ddec0e3cbbe2e03c50c351927e87e3fc97742cf6dc80ae80ba877fdb4c0e078aed940825ed62214d2f9d8f095ac7eaf1b4fa50c14957

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\App\AppInfo\pac_installer_log.ini

    Filesize

    351B

    MD5

    8fdf87c031aa3848bc32df9fdc25472e

    SHA1

    8a76fd74c6cbeacf7630c929d16d8e34243f46d0

    SHA256

    d278bfeed017704e818bbc21681262251d7471a1bdab16df39736f80196c7487

    SHA512

    fa2b2bdb9e08606a248fe254bd07c2827b44b90ab4db8773aa9e6c988e2ac7e21f04ead50ebfae572e1671340f28958f1a8c70f255d30047a3efad5411e0d38c

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll

    Filesize

    7.7MB

    MD5

    043dae1b817ae561da9d6654b6354696

    SHA1

    a9f62f9ca8faa6023c4ef755d3b1f5aed2914516

    SHA256

    9de78011f776d2f3c963c6c3f77bc7af98ac51b4dbd11350850a8416bf767c36

    SHA512

    b7b44df89e93de8f31a35a22ed7b2d292cbad83ef564281af8e50aedade2f3ed4560b1e2ee9d91a5f1b270c407eafbef0f983895f8ed6651428ec5fe7389198e

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf

    Filesize

    19B

    MD5

    138994255ba043be1c37715fd931b1f3

    SHA1

    a39ed185ae5c91a59f9ae7bddce84cdcccb766cf

    SHA256

    6df84c79758b9f79709bd9292563dbda3fc7c726180ec6d394dd4e54b4427beb

    SHA512

    b26f7ea2c106852044b3a014ea91555a50ba43d4305a61c796926718da78d7dce335e9bb9613f0275ede4c961cc49f9a38e4bd59cc1504ba28457b364e3ee0cc

  • C:\Windows\Installer\MSIEBE5.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSIF1D3.tmp

    Filesize

    418KB

    MD5

    dd31c60eedf38fe4704ac9293614afee

    SHA1

    48b7ad49bfcba2906834324548e731729ead34bc

    SHA256

    6e8b9a6e7497d88421fa446ec1c2312fcf61d7f340364c61bd02b0bb4684b94f

    SHA512

    66f4642b3c0a92c2fc8e7cc7d0a61e7132d5193b90b7d4b2554a4a7bfff0fd990b47157d1f2af05ed177dc7dc920984f56b81e114e17de389d20fa5e51fa19e9

  • C:\Windows\Installer\f76ebc6.msi

    Filesize

    8.9MB

    MD5

    e1438c21e6de91615a6a5e2a48f274fc

    SHA1

    b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

    SHA256

    9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

    SHA512

    9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

  • memory/1704-534-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/2000-574-0x0000000003EB0000-0x0000000003EB1000-memory.dmp

    Filesize

    4KB

  • memory/2000-604-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-573-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-553-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2000-576-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-575-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-551-0x0000000002280000-0x0000000002A4C000-memory.dmp

    Filesize

    7.8MB

  • memory/2000-600-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-597-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-595-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-603-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-571-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-602-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-601-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-599-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-598-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-596-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-605-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-606-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-607-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-628-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2000-623-0x0000000002280000-0x0000000002A4C000-memory.dmp

    Filesize

    7.8MB

  • memory/2000-627-0x0000000003250000-0x0000000003D9B000-memory.dmp

    Filesize

    11.3MB

  • memory/2416-533-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB