File name:

Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe

Full analysis: https://app.any.run/tasks/d0c0392a-7257-4ae8-a776-f678535a3b81
Verdict: Malicious activity
Threats:

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

Analysis date: April 14, 2024, 16:29:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
darkcomet
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

58D328C859ED26102D84959E95DE9BCA

SHA1:

D40750FD353B093A0418B167ECCD4C2124C64594

SHA256:

71E944842708DDE91A617790C517A3295DB2EA867F894C4F465BFEE2977FBE38

SSDEEP:

6144:rcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37PpdHQdH:rcW7KEZlPzCy37RdeH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Changes the autorun value in the registry

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
      • winlogon.exe (PID: 3488)
    • Changes the login/logoff helper path in the registry

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • DARKCOMET has been detected (YARA)

      • winlogon.exe (PID: 3488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Starts CMD.EXE for commands execution

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Reads the Internet Settings

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Reads security settings of Internet Explorer

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Start notepad (likely ransomware note)

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
      • winlogon.exe (PID: 3488)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 2232)
      • cmd.exe (PID: 2572)
    • Starts itself from another location

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Reads the date of Windows installation

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Connects to unusual port

      • winlogon.exe (PID: 3488)
  • INFO

    • Reads the computer name

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
      • winlogon.exe (PID: 3488)
    • Checks supported languages

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
      • winlogon.exe (PID: 3488)
    • Creates files or folders in the user directory

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
    • Reads the machine GUID from the registry

      • Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe (PID: 1836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (38.2)
.exe | Win32 EXE Yoda's Crypter (37.5)
.dll | Win32 Dynamic Link Library (generic) (9.2)
.exe | Win32 Executable (generic) (6.3)
.exe | Win16/32 Executable Delphi generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:06:07 15:59:53+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 253952
InitializedDataSize: 24576
UninitializedDataSize: 503808
EntryPoint: 0xb97b0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.0
ProductVersionNumber: 4.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: Remote Service Application
CompanyName: Microsoft Corp.
FileDescription: Remote Service Application
FileVersion: 1, 0, 0, 1
InternalName: MSRSAAPP
LegalCopyright: Copyright (C) 1999
OriginalFileName: MSRSAAP.EXE
ProductName: Remote Service Application
ProductVersion: 4, 0, 0, 0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start anubis 2.5 ( android banking botnet ) panel + apk file.exe cmd.exe no specs cmd.exe no specs notepad.exe no specs attrib.exe no specs attrib.exe no specs #DARKCOMET winlogon.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1836"C:\Users\admin\AppData\Local\Temp\Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe" C:\Users\admin\AppData\Local\Temp\Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe
explorer.exe
User:
admin
Company:
Microsoft Corp.
Integrity Level:
MEDIUM
Description:
Remote Service Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\anubis 2.5 ( android banking botnet ) panel + apk file.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\avicap32.dll
c:\windows\system32\user32.dll
2064notepadC:\Windows\System32\notepad.exewinlogon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2232"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\AppData\Local\Temp\Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe" +s +hC:\Windows\System32\cmd.exeAnubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2292attrib "C:\Users\admin\AppData\Local\Temp\Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2408attrib "C:\Users\admin\AppData\Local\Temp" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2572"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\AppData\Local\Temp" +s +hC:\Windows\System32\cmd.exeAnubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3488"C:\Users\admin\AppData\Roaming\winlogon.exe" C:\Users\admin\AppData\Roaming\winlogon.exe
Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe
User:
admin
Company:
Microsoft Corp.
Integrity Level:
MEDIUM
Description:
Remote Service Application
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\roaming\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\avicap32.dll
c:\windows\system32\user32.dll
4000notepadC:\Windows\System32\notepad.exeAnubis 2.5 ( Android Banking Botnet ) Panel + APK file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
5 111
Read events
5 039
Write events
72
Delete events
0

Modification events

(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:windows
Value:
C:\Users\admin\AppData\Roaming\winlogon.exe
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:UserInit
Value:
C:\Windows\system32\userinit.exe,C:\Users\admin\AppData\Roaming\winlogon.exe
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1836) Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3488) winlogon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:windows
Value:
C:\Users\admin\AppData\Roaming\winlogon.exe
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1836Anubis 2.5 ( Android Banking Botnet ) Panel + APK file.exeC:\Users\admin\AppData\Roaming\winlogon.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
2
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
3488
winlogon.exe
1.2.3.4:1604
kvejo991.ddns.net
AU
malicious
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
kvejo991.ddns.net
  • 1.2.3.4
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info