| File name: | cog.exe |
| Full analysis: | https://app.any.run/tasks/a2c93b41-a4fe-43ef-a846-8e8fac285846 |
| Verdict: | Malicious activity |
| Threats: | Danabot is an advanced banking Trojan malware that was designed to steal financial information from victims. Out of the Trojans in the wild, this is one of the most advanced thanks to the modular design and a complex delivery method. |
| Analysis date: | June 01, 2021, 13:26:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | BE891367A9A7F020097506D3E964BD08 |
| SHA1: | 4AE27F5A2EC7C7AA26CA725D79397E4645C807C6 |
| SHA256: | 32ECBB31B795B66ACE206DA2CA93E22F05A002D070BA5A5965BF89C0C91BEB82 |
| SSDEEP: | 192:dD5G0QXE2YYgL2pA+On9xLrkYT00bOTFi7Dgvlnnh7/r+5d:dD5G0QXaq49xLrku00aTQqLa5 |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| AssemblyVersion: | 0.0.0.0 |
|---|---|
| ProductVersion: | 0.0.0.0 |
| OriginalFileName: | cog.exe |
| LegalCopyright: | |
| InternalName: | cog.exe |
| FileVersion: | 0.0.0.0 |
| FileDescription: | |
| CharacterSet: | Unicode |
| LanguageCode: | Neutral |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 0.0.0.0 |
| FileVersionNumber: | 0.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0x40ee |
| UninitializedDataSize: | - |
| InitializedDataSize: | 2048 |
| CodeSize: | 8704 |
| LinkerVersion: | 11 |
| PEType: | PE32 |
| TimeStamp: | 2021:06:01 15:22:50+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 01-Jun-2021 13:22:50 |
| FileDescription: | - |
| FileVersion: | 0.0.0.0 |
| InternalName: | cog.exe |
| LegalCopyright: | - |
| OriginalFilename: | cog.exe |
| ProductVersion: | 0.0.0.0 |
| Assembly Version: | 0.0.0.0 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 01-Jun-2021 13:22:50 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00002000 | 0x000020F4 | 0x00002200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.18824 |
.rsrc | 0x00006000 | 0x000004C8 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.6686 |
.reloc | 0x00008000 | 0x0000000C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.0815394 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.00112 | 490 | UNKNOWN | UNKNOWN | RT_MANIFEST |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 404 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 440 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 544 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 600 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 608 | "C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe" | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | cmd.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 628 | \??\C:\Windows\system32\conhost.exe "2092846509-747985281-1342786918-14643068993034815264062852162082201651-2140604474" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 716 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 752 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 848 | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | — | DPGJIV9Z8DKBG8NPJXCE88AN.exe | |||||||||||
User: admin Company: AppDomainManager Integrity Level: HIGH Description: WebReference Exit code: 0 Version: 746.395.698.422 Modules
| |||||||||||||||
| 884 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (988) cog.exe | Key: | HKEY_CLASSES_ROOT\mscfile\shell\open\command |
| Operation: | write | Name: | (default) |
Value: C:\Users\admin\AppData\Local\Temp\cog.exe CleanReg | |||
| (PID) Process: | (988) cog.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (988) cog.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2380) consent.exe | Key: | HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000_CLASSES\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2380) consent.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\CTF\HiddenDummyLayouts |
| Operation: | write | Name: | 00000411 |
Value: 00000411 | |||
| (PID) Process: | (2380) consent.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\CTF\HiddenDummyLayouts |
| Operation: | write | Name: | 00000412 |
Value: 00000412 | |||
| (PID) Process: | (2380) consent.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\CTF\MSUTB |
| Operation: | write | Name: | Left |
Value: 1226 | |||
| (PID) Process: | (2380) consent.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\CTF\MSUTB |
| Operation: | write | Name: | Top |
Value: 0 | |||
| (PID) Process: | (884) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1302019708-1500728564-335382590-1000 |
| Operation: | write | Name: | RefCount |
Value: 3 | |||
| (PID) Process: | (884) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1302019708-1500728564-335382590-1000 |
| Operation: | write | Name: | RefCount |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2464 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2IXJQQJUCLAQUKH208U3.temp | — | |
MD5:— | SHA256:— | |||
| 884 | svchost.exe | C:\Windows\appcompat\programs\RecentFileCache.bcf | txt | |
MD5:— | SHA256:— | |||
| 2124 | cog.exe | C:\Users\admin\AppData\Roaming\O1GZMKGK9PKVZ63XQ6I88J7U.exe | executable | |
MD5:— | SHA256:— | |||
| 2464 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF132195.TMP | binary | |
MD5:— | SHA256:— | |||
| 2464 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 2124 | cog.exe | C:\Users\admin\AppData\Roaming\VEZF0T6Q7WDR062O5G641KK0.exe | executable | |
MD5:— | SHA256:— | |||
| 2124 | cog.exe | C:\Users\admin\AppData\Roaming\CFHKM0L0ALF5HSIXB4IMXY5L.exe | executable | |
MD5:— | SHA256:— | |||
| 2124 | cog.exe | C:\Users\admin\AppData\Roaming\DPGJIV9Z8DKBG8NPJXCE88AN.exe | executable | |
MD5:— | SHA256:— | |||
| 2124 | cog.exe | C:\Users\admin\AppData\Roaming\GSILYNUZDLNPO4SKU7BEBK8W.exe | executable | |
MD5:— | SHA256:— | |||
| 1824 | jfiag3g_gg.exe | C:\Users\admin\AppData\Local\Temp\fj4ghga23_fsa.txt | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2848 | BO98MRCVQ69U5S3F6HE9AD4R.exe | GET | — | 8.209.68.196:80 | http://g-cleanpartners.in/decision.php?pub=mixinte | US | — | — | malicious |
2848 | BO98MRCVQ69U5S3F6HE9AD4R.exe | GET | — | 8.209.68.196:80 | http://g-cleanpartners.in/stats/statistics.php?trackid=&postback=noSub | US | — | — | malicious |
2848 | BO98MRCVQ69U5S3F6HE9AD4R.exe | GET | — | 8.209.68.196:80 | http://g-cleanpartners.in/dlc/distribution.php?pub=mixinte | US | — | — | malicious |
2124 | cog.exe | GET | 302 | 45.91.67.130:80 | http://akenkraken.com/bogota/project.php | unknown | — | — | suspicious |
2124 | cog.exe | GET | 200 | 104.21.60.85:80 | http://bandshoo.info/app.exe | US | executable | 4.47 Mb | suspicious |
2124 | cog.exe | GET | 200 | 195.123.222.92:80 | http://privacytools.xyz/downloads/toolspab2.exe | NL | executable | 330 Kb | whitelisted |
2124 | cog.exe | GET | 302 | 162.255.119.200:80 | http://ww.hackacademy.me/ | US | html | 67 b | whitelisted |
2124 | cog.exe | GET | 200 | 212.192.241.136:80 | http://212.192.241.136/files/file4.exe | RU | executable | 1.57 Mb | malicious |
2124 | cog.exe | GET | 200 | 212.192.241.136:80 | http://212.192.241.136/files/file6.exe | RU | executable | 415 Kb | malicious |
2124 | cog.exe | GET | 404 | 212.192.241.136:80 | http://212.192.241.136/files/file9.exe | RU | html | 301 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2124 | cog.exe | 162.255.119.200:80 | ww.hackacademy.me | Namecheap, Inc. | US | suspicious |
2124 | cog.exe | 89.221.213.3:80 | moonlabmediacompany.com | WEDOS Internet, a.s. | CZ | suspicious |
2124 | cog.exe | 212.192.241.136:80 | — | — | RU | malicious |
2124 | cog.exe | 195.123.222.92:80 | privacytools.xyz | ITL Company | NL | suspicious |
2124 | cog.exe | 104.21.65.45:443 | jom.diregame.live | Cloudflare Inc | US | unknown |
2124 | cog.exe | 104.21.60.85:80 | bandshoo.info | Cloudflare Inc | US | suspicious |
2124 | cog.exe | 162.159.135.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2124 | cog.exe | 162.159.133.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2124 | cog.exe | 185.154.14.180:443 | kiff.store | ITL Company | NL | unknown |
2124 | cog.exe | 88.99.66.31:443 | 2no.co | Hetzner Online GmbH | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
ww.hackacademy.me |
| whitelisted |
kiff.store |
| suspicious |
moonlabmediacompany.com |
| suspicious |
privacytools.xyz |
| whitelisted |
jom.diregame.live |
| whitelisted |
bandshoo.info |
| suspicious |
2no.co |
| whitelisted |
cdn.discordapp.com |
| shared |
014a2835-e6dd-43e5-833c-a25b69a6bfd4.s3.amazonaws.com |
| shared |
akenkraken.com |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
2124 | cog.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2124 | cog.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2124 | cog.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2124 | cog.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2124 | cog.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2124 | cog.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2124 | cog.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2124 | cog.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2124 | cog.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2124 | cog.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |