analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

906354386162603411_58429239.vbs

Full analysis: https://app.any.run/tasks/7dcd261a-7e7b-4b23-843c-3960c9e645c7
Verdict: Malicious activity
Threats:

Danabot is an advanced banking Trojan malware that was designed to steal financial information from victims. Out of the Trojans in the wild, this is one of the most advanced thanks to the modular design and a complex delivery method.

Analysis date: July 18, 2019, 00:03:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
danabot
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

156C040E2D09BAD59C2A4C26FBE682B2

SHA1:

E0AC7E7715282B8B7726BE9865EE40A7466470B3

SHA256:

86F8D6B6DC7CAB1AB5FF4DF4B3500A56E6A65BA693219A59730FB4A23332D6DA

SSDEEP:

24576:HXB2rfuOH58yuRBvN2VDMN/QeouvjIiYIrB8qHNoWVc0PwNMHmqzgoSRFRtk1m3c:J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 1148)
      • rundll32.exe (PID: 1600)
    • Registers / Runs the DLL via REGSVR32.EXE

      • WScript.exe (PID: 3744)
    • DANABOT was detected

      • rundll32.exe (PID: 1600)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • regsvr32.exe (PID: 1148)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3744)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wscript.exe regsvr32.exe no specs #DANABOT rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
3744"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\906354386162603411_58429239.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1148C:\Windows\System32\regsvr32.exe -s C:\Users\admin\AppData\Local\Temp\XzTm.txtC:\Windows\System32\regsvr32.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
4
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1600C:\Windows\system32\\rundll32.exe C:\Users\admin\AppData\Local\Temp\XzTm.txt,f0C:\Windows\system32\rundll32.exe
regsvr32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
30
Read events
30
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3744WScript.exeC:\Users\admin\AppData\Local\Temp\afCEDE.QAJGztext
MD5:A19E5DADFBBE6A759D60E5E6633A8B26
SHA256:6693F64FBC71EC322A41301B3B888CF72F17A511486F9451421D3B4B5F2DEE35
3744WScript.exeC:\Users\admin\AppData\Local\Temp\XzTm.txtexecutable
MD5:39FCCFAA9C0796F18496FE8CA1590B05
SHA256:1FF2EF8DC94A040CBB528368D8EADCA4110661EE06BC3EF35D8BBA0AC447EC16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1600
rundll32.exe
178.209.51.211:443
Nine Internet Solutions AG
CH
malicious
1600
rundll32.exe
96.92.201.175:443
Comcast Cable Communications, LLC
US
malicious
1600
rundll32.exe
20.51.72.111:443
US
malicious
1600
rundll32.exe
154.144.119.42:443
Itissalat Al-MAGHRIB
MA
malicious
1600
rundll32.exe
132.212.109.159:443
Universite du Quebec
CA
malicious
1600
rundll32.exe
163.159.238.181:443
SI
malicious
1600
rundll32.exe
149.28.180.182:443
US
malicious
1600
rundll32.exe
216.2.226.14:443
XO Communications
US
malicious
1600
rundll32.exe
100.115.208.111:443
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
1600
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Danabot.I
No debug info