Analysis

  • max time kernel
    293s
  • max time network
    211s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 00:15

General

  • Target

    B6F6C74F86A145460F03AC3A0520D3345FC7FCC1.msi

  • Size

    8.9MB

  • MD5

    e1438c21e6de91615a6a5e2a48f274fc

  • SHA1

    b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

  • SHA256

    9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

  • SHA512

    9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

  • SSDEEP

    196608:9n520ZroZkRsj6N+gdC1fcmwz/MIpqPuJS8ErZ/0jCi:9n52eSFjG+aAfcRo4Kz8W0j

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    5059953BB045843A520147F73664DC78

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot family
  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\B6F6C74F86A145460F03AC3A0520D3345FC7FCC1.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2320
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5C0A72774F18ED018E9F4AD27B1A3F3
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2736
    • C:\Windows\Installer\MSIEE4B.tmp
      "C:\Windows\Installer\MSIEE4B.tmp" /DontWait /HideWindow /dir "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\" C:\Windows\System32\rundll32.exe "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:676
    • C:\Windows\Installer\MSIEE4A.tmp
      "C:\Windows\Installer\MSIEE4A.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2072
  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll",muirent
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:696
  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e738.rbs

    Filesize

    897KB

    MD5

    1fb6d78cc89c60f07471f46da8644394

    SHA1

    9eb0fa86eed6263bbc9dc2709f8d5fb2914633dd

    SHA256

    addafc497402b8f9e8bb8a282fd79c3a3fb07ea54059d3610c46d1f238b37ab7

    SHA512

    fb480d5766d91805cd2dd7369f98e153a2c629474504f7e8441161083621ed5395fb018ff803f9f44424fe8891b0f285d595c1c7564a1459937af6d80b83ca06

  • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI1E54.txt

    Filesize

    410KB

    MD5

    39030b7c1955e0a50ec33cd866b5fe6f

    SHA1

    4849bedc15ffbd9031483d2f08f65edd38367830

    SHA256

    e3ff95a59261302bbcb66f3dfff1ea01b3b4ba80756c990c621eed9d6500f7c9

    SHA512

    5dd38fa695889870ce15f4f0d21735362128d54887455091c70247f086f4e986ff043a87a98ce7d007316b61c03e8669bae75028cc5f63a8176996aa83f23920

  • C:\Users\Admin\AppData\Local\Temp\dd_wcf_CA_smci_20240903_051547_336.txt

    Filesize

    7KB

    MD5

    01ddfd51d1090cf2ad0ab75468d0a510

    SHA1

    18a807cdabadc4d9712f7def90ac5a26a88b6635

    SHA256

    6707194d11efad90feed67f9455a53d583d42467d45fa1dc09d7c10c284c6699

    SHA512

    b7e9e1840134ae7f8c9675571d221a663d7149075939cb135e57cc4789bb50ffb35412c56a968a99e3433e5cbe4a1777490e050ebf80a238bbc03865fa55daa1

  • C:\Users\Admin\AppData\Local\Temp\lpksetup-20240903-052458-0.log

    Filesize

    34KB

    MD5

    1c1d22ecaf71085ece47cb012ef25992

    SHA1

    5a4e747961ad09643e6f466fe7cafcbbcf76b075

    SHA256

    a6c0e2f00ea3e736cca2d55e179388ccb255dfc7c1092cc147e61c07f022c5de

    SHA512

    e593370815d2940c93f47b7d83c21c7274b4b5c7f8f0bc74ae73058396aa83b773acf33421a75e6dd0f03932c961270c87099ed9144aacc30cd3656d14ec481d

  • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2164_1221825644\935330fd-4004-4f6a-8e7d-6f84b499f60b.tmp

    Filesize

    88KB

    MD5

    2cc86b681f2cd1d9f095584fd3153a61

    SHA1

    2a0ac7262fb88908a453bc125c5c3fc72b8d490e

    SHA256

    d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

    SHA512

    14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2164_1637751257\6bb95d14-6008-45c6-854b-217ed10de34b.tmp

    Filesize

    242KB

    MD5

    541f52e24fe1ef9f8e12377a6ccae0c0

    SHA1

    189898bb2dcae7d5a6057bc2d98b8b450afaebb6

    SHA256

    81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82

    SHA512

    d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    843B

    MD5

    0e6a1227adab37a88764ffeabd258ed2

    SHA1

    79f749c62d794c17ecd5a0b956269f280cb88a41

    SHA256

    a699b14b4f1ebbae0653514558e41dee7f4b7e96652fc01dfae6544ee7e9fe3f

    SHA512

    97f52c9cf132100b7f4cb4d446447dcabcf23e6bddc5831b0e7ecced3c5fb5b3caca956ed810ffcac3afe09beb01e68dbb61df32c041223f065ba7b12015308b

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    95b2fb2e0daf4f42a8b45a38815e288c

    SHA1

    5b3e46d22a2a33ac80e1fcca03296d2408a3376e

    SHA256

    ebe984a2e0ba38132004289eb29629a3a6d7b78326d3e9b28b94ab21505417eb

    SHA512

    f5984917c0a3533a36c58874e9b4196378d6d03123ec81dcf5435835ca40614097c1a83811e4e6d7179cea5d8041bf07e30b34ff6a8e01829797eab56b499ed6

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\meitneriumatm.dll

    Filesize

    7.7MB

    MD5

    043dae1b817ae561da9d6654b6354696

    SHA1

    a9f62f9ca8faa6023c4ef755d3b1f5aed2914516

    SHA256

    9de78011f776d2f3c963c6c3f77bc7af98ac51b4dbd11350850a8416bf767c36

    SHA512

    b7b44df89e93de8f31a35a22ed7b2d292cbad83ef564281af8e50aedade2f3ed4560b1e2ee9d91a5f1b270c407eafbef0f983895f8ed6651428ec5fe7389198e

  • C:\Users\Admin\AppData\Roaming\TypeFasterPortable\reportsummary.pdf

    Filesize

    19B

    MD5

    138994255ba043be1c37715fd931b1f3

    SHA1

    a39ed185ae5c91a59f9ae7bddce84cdcccb766cf

    SHA256

    6df84c79758b9f79709bd9292563dbda3fc7c726180ec6d394dd4e54b4427beb

    SHA512

    b26f7ea2c106852044b3a014ea91555a50ba43d4305a61c796926718da78d7dce335e9bb9613f0275ede4c961cc49f9a38e4bd59cc1504ba28457b364e3ee0cc

  • C:\Windows\Installer\MSIE791.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSIEE4A.tmp

    Filesize

    418KB

    MD5

    dd31c60eedf38fe4704ac9293614afee

    SHA1

    48b7ad49bfcba2906834324548e731729ead34bc

    SHA256

    6e8b9a6e7497d88421fa446ec1c2312fcf61d7f340364c61bd02b0bb4684b94f

    SHA512

    66f4642b3c0a92c2fc8e7cc7d0a61e7132d5193b90b7d4b2554a4a7bfff0fd990b47157d1f2af05ed177dc7dc920984f56b81e114e17de389d20fa5e51fa19e9

  • C:\Windows\Installer\f76e734.msi

    Filesize

    8.9MB

    MD5

    e1438c21e6de91615a6a5e2a48f274fc

    SHA1

    b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

    SHA256

    9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

    SHA512

    9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

  • memory/676-533-0x00000000000B0000-0x00000000000B2000-memory.dmp

    Filesize

    8KB

  • memory/696-637-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-668-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-633-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-553-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/696-636-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/696-549-0x0000000002450000-0x0000000002C1C000-memory.dmp

    Filesize

    7.8MB

  • memory/696-638-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-669-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-671-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-673-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-670-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-634-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-666-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-672-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-667-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-665-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-664-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-663-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-674-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-675-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-715-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/696-693-0x0000000002450000-0x0000000002C1C000-memory.dmp

    Filesize

    7.8MB

  • memory/696-714-0x00000000034C0000-0x000000000400B000-memory.dmp

    Filesize

    11.3MB

  • memory/2072-534-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB