| URL: | https://crackkits.com/vysor-pro-crack/ |
| Full analysis: | https://app.any.run/tasks/bc56a0a4-c541-4e41-9083-0575fc3a77cf |
| Verdict: | Malicious activity |
| Threats: | Danabot is an advanced banking Trojan malware that was designed to steal financial information from victims. Out of the Trojans in the wild, this is one of the most advanced thanks to the modular design and a complex delivery method. |
| Analysis date: | June 14, 2021, 03:59:25 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | FEEE475F1ED18154442D67E347103798 |
| SHA1: | 1B698F5DAB2D11AA17FA2DCF8BE9DC124CB4DDD1 |
| SHA256: | C86CE795CAAE1633E243C1B6656FE932CDE395895EB217F4BFF7D4FAAE775901 |
| SSDEEP: | 3:N8KSWLGTKTJVMl:2KSWLNy |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "C:\Windows\system32\Dwm.exe" | C:\Windows\System32\dwm.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Desktop Window Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 264 | \SystemRoot\System32\smss.exe | C:\Windows\System32\smss.exe | System | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Session Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | \??\C:\Windows\system32\conhost.exe "-635794380-1213949309-1305861360-9575568851573093299-1496291537-70975285795606186" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 308 | "C:\Program Files\Browzar\ix78ESOrnjfX.exe" | C:\Program Files\Browzar\ix78ESOrnjfX.exe | — | ix78ESOrnjfX.exe | |||||||||||
User: admin Company: HttpSessionStateContainer Integrity Level: HIGH Description: DefaultSettingValueAttribute Exit code: 0 Version: 658.594.755.513 Modules
| |||||||||||||||
| 324 | "C:\Program Files\Browzar\ix78ESOrnjfX.exe" | C:\Program Files\Browzar\ix78ESOrnjfX.exe | — | ix78ESOrnjfX.exe | |||||||||||
User: admin Company: HttpSessionStateContainer Integrity Level: HIGH Description: DefaultSettingValueAttribute Exit code: 0 Version: 658.594.755.513 Modules
| |||||||||||||||
| 344 | %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 | C:\Windows\System32\csrss.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Client Server Runtime Process Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 376 | C:\Windows\system32\AUDIODG.EXE 0x6b8 | C:\Windows\system32\AUDIODG.EXE | — | svchost.exe | |||||||||||
User: LOCAL SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Audio Device Graph Isolation Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 380 | wininit.exe | C:\Windows\System32\wininit.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Start-Up Application Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 388 | %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 | C:\Windows\System32\csrss.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Client Server Runtime Process Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 428 | winlogon.exe | C:\Windows\System32\winlogon.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Logon Application Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (668) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2204-13268116783248125 |
Value: 259 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 3252-13245750958665039 |
Value: 0 | |||
| (PID) Process: | (2204) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60C6D430-89C.pma | — | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\21863e31-485a-42b1-9824-c514c2aaa8e8.tmp | — | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF13f37b.TMP | text | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2204 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF13f56f.TMP | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3140 | chrome.exe | GET | 301 | 104.21.29.203:80 | http://faizabeauty.xyz/?s=29&q=Vysor-Pro-3-Crack---License-Key-Free-Download&g=aca1c2f40a043a5bbed47ef06e11d76f&mode= | US | — | — | suspicious |
2224 | metina_6.exe | GET | — | 136.144.41.133:80 | http://136.144.41.133/WW/file4.exe | NL | — | — | malicious |
2872 | metina_5.tmp | HEAD | 200 | 198.54.116.159:80 | http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/UltraMediaBurner/UltraMediaBurner.exe | US | — | — | suspicious |
2872 | metina_5.tmp | GET | — | 198.54.116.159:80 | http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/UltraMediaBurner/UltraMediaBurner.exe | US | — | — | suspicious |
2224 | metina_6.exe | GET | — | 136.144.41.133:80 | http://136.144.41.133/WW/file2.exe | NL | — | — | malicious |
2224 | metina_6.exe | GET | — | 104.21.82.172:80 | http://leselesp.info/app.exe | US | — | — | suspicious |
2224 | metina_6.exe | GET | — | 185.156.177.26:80 | http://privacytoolsforyou.xyz/downloads/toolspab2.exe | RU | — | — | suspicious |
2664 | metina_4.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | text | 255 b | malicious |
3140 | chrome.exe | GET | 200 | 54.190.206.20:80 | http://54.190.206.20/favicon.ico | US | text | 106 b | unknown |
2576 | setup_install.exe | GET | 200 | 104.21.86.8:80 | http://razino.xyz/addInstall.php?key=125478824515ADNxu2ccbwe&ip=&oid=139&oname[]=14June315AM&oname[]=7&oname[]=1&oname[]=2&oname[]=3&oname[]=4&oname[]=5&oname[]=6&cnt=7 | US | text | 10 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3140 | chrome.exe | 142.250.185.109:443 | accounts.google.com | Google Inc. | US | suspicious |
3140 | chrome.exe | 142.250.185.227:443 | fonts.gstatic.com | Google Inc. | US | whitelisted |
3140 | chrome.exe | 142.250.184.206:443 | clients1.google.com | Google Inc. | US | whitelisted |
3140 | chrome.exe | 192.0.78.26:443 | href.li | Automattic, Inc | US | suspicious |
3140 | chrome.exe | 104.21.29.203:443 | faizabeauty.xyz | Cloudflare Inc | US | suspicious |
3140 | chrome.exe | 192.0.76.3:443 | stats.wp.com | Automattic, Inc | US | suspicious |
3140 | chrome.exe | 172.67.212.165:443 | frionene.xyz | — | US | unknown |
3140 | chrome.exe | 35.190.80.1:443 | a.nel.cloudflare.com | Google Inc. | US | suspicious |
3140 | chrome.exe | 104.21.29.203:80 | faizabeauty.xyz | Cloudflare Inc | US | suspicious |
3140 | chrome.exe | 142.250.185.195:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crackkits.com |
| malicious |
accounts.google.com |
| shared |
fonts.googleapis.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
stats.wp.com |
| whitelisted |
pixel.wp.com |
| whitelisted |
clients1.google.com |
| whitelisted |
href.li |
| shared |
frionene.xyz |
| unknown |
a.nel.cloudflare.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3140 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2576 | setup_install.exe | A Network Trojan was detected | AV TROJAN GCleaner Downloader CnC Activity |
2576 | setup_install.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2664 | metina_4.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
2664 | metina_4.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
1052 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .cf Domain |
2872 | metina_5.tmp | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2224 | metina_6.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2224 | metina_6.exe | Potentially Bad Traffic | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile |
2224 | metina_6.exe | Misc activity | ET INFO Packed Executable Download |