| File name: | e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b |
| Full analysis: | https://app.any.run/tasks/e344a9af-44b3-4687-a2a8-de5dc3e99316 |
| Verdict: | Malicious activity |
| Threats: | Danabot is an advanced banking Trojan malware that was designed to steal financial information from victims. Out of the Trojans in the wild, this is one of the most advanced thanks to the modular design and a complex delivery method. |
| Analysis date: | October 01, 2024, 11:54:10 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
| MD5: | 50C424218307E9CB81CE2B1FEBBBC9A4 |
| SHA1: | F57DDD3AC726BFA59DE0EDF309EDAC4D63C3BDAE |
| SHA256: | E07DBE17A3EF5F5D09629DA0D34D077166D3D1E0CAEC94F6C5B46F8DFB92228B |
| SSDEEP: | 196608:J76b7Mj9gujQm7Xgw+6uUmRulZOMfmjzX4mExEi:J76kgyLMw+6FmR0tmjz4mo |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:09:27 16:58:56+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit, DLL |
| PEType: | PE32 |
| LinkerVersion: | 14.41 |
| CodeSize: | 5210624 |
| InitializedDataSize: | 20784128 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x4af881 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.3.1006.0 |
| ProductVersionNumber: | 2024.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | Asset Manager |
| CompanyName: | Kaizen Software Solutions |
| FileDescription: | Asset Manager 2024 |
| FileVersion: | 4.3.1006.0 |
| InternalName: | AssetManager.dll |
| LegalCopyright: | Copyright © 2007 - 2024 |
| LegalTrademarks: | - |
| OriginalFileName: | AssetManager.dll |
| ProductName: | Asset Manager |
| ProductVersion: | 2024+925fe5b0ba348bf35f4bc35c07830d31c26b66c6 |
| AssemblyVersion: | 4.3.1006.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1220 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2980 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5916 | "C:\WINDOWS\SysWOW64\rundll32.exe" C:\Users\admin\AppData\Local\Temp\e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b.dll, #1 | C:\Windows\SysWOW64\rundll32.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6572 | "C:\Users\admin\AppData\Local\Programs\Apps Security Manager\secd.exe" | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\secd.exe | rundll32.exe | ||||||||||||
User: admin Company: Apple, Inc. Integrity Level: MEDIUM Description: Apple Security Manager Version: 106.1.0.49 Modules
| |||||||||||||||
| 7100 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\EmieSiteList |
| Operation: | write | Name: | CacheRepair |
Value: 0 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost\IndexedDB\Microsoft.BioEnrollment_cw5n1h2txyewy |
| Operation: | write | Name: | PerPackageIndexedDBEnabled |
Value: 1 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\iecompatua |
| Operation: | write | Name: | CachePrefix |
Value: iecompatua: | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyServer |
Value: 127.0.0.1:23160 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\iedownload |
| Operation: | write | Name: | CacheOptions |
Value: 9 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppBroadcast\PlugIns\{5504e330-9d3d-44c5-8786-c9b100cd9893} |
| Operation: | write | Name: | AppId |
Value: Microsoft.XboxGameOverlay_8wekyb3d8bbwe!App | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | CertificateRevocation |
Value: 1 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AccountsService |
| Operation: | write | Name: | State |
Value: {
"Version":5,
"WnsChannelSuccess":false,
"WnsChannelSuccessDate":"",
"WnsChannelLastAttemptDate":"",
"WnsChannelRetryCount":0,
"WnsChannelRetryDate":"",
"WnsChannelUri":"",
"WnsChannelExpiryDate":"",
"WnsLastEtag":"",
"WnsLastTrackingId":"",
"CassWnsSuccess":false,
"CassWnsStatusCode":0,
"CassWnsSuccessDate":"",
"CassWnsLastAttemptDate":"",
"CassWnsRetryCount":0,
"CassWnsRetryDate":"",
"CassWnsPollingOverride":0,
"SubscriptionsSuccess":false,
"SubscriptionsStatusCode":0,
"SubscriptionsSuccessDate":"",
"SubscriptionsLastAttemptDate":"",
"SubscriptionsRetryCount":0,
"SubscriptionsRetryDate":"",
"SubscriptionsLastEtag":"",
"SubscriptionsContext":"",
"SubscriptionsContextChangedDate":"",
"SubscriptionsPollingOverride":0,
"LastTriggerType":6,
"LastBackgroundTaskRunDate":"2024-07-18T12:41:08Z",
"IsEligibleAccountType":false,
"IneligibilityReason":1,
"EligibilityRetryCount":0,
"MaintenanceTaskDate":"2024-07-19T12:41:08Z"
} | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | IE5_UA_Backup_Flag |
Value: 5.0 | |||
| (PID) Process: | (6572) secd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\feedplat |
| Operation: | write | Name: | CacheLimit |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\TMP66E0.tmp | — | |
MD5:— | SHA256:— | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\Module.dat | — | |
MD5:— | SHA256:— | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\s4kc.2 | binary | |
MD5:DF40BC1EE97B136B9B7B3016CFBEF588 | SHA256:64E3E02320CE3F0FA923A061C1B9964A86CA6F08803D590D85130C772532854C | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\Workout.wav | binary | |
MD5:7B89592151464805E0530A79DF9A4324 | SHA256:97424B6B492765669D32224D8D7A271710A9B972A0BE39DDF250B9FA1DD2A385 | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\ApplePushService.dll | executable | |
MD5:5833DA04537DB47A9A5F3C53771D2874 | SHA256:146D8F7AB57A2D288831E3FA46CDB59BC8FAB17B8800A820C3BAE2F77D8D3EDC | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\IDecrypt.dll | executable | |
MD5:D2F9628B2689DE60B8930E23CE75D791 | SHA256:37ACE8CF5FAE40095727139BA1D21054FF7D7CAD2DB7E1B7FE193DA1EA40CF95 | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\CFNetwork.dll | executable | |
MD5:80038B5A64F915C4EEE38271AE666250 | SHA256:8CE28693F8E55D3824F14ED71EF08E8CB7BDF23692694A60078F7B9AD70FABC9 | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\ASL.dll | executable | |
MD5:9D4285CBB6F8BE63FE18426A6AD49C3F | SHA256:B6CDD784675F102DFD811DD621A04CAC97D0CE36BDC73C373870D1A84F9449D8 | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\concrt140.dll | executable | |
MD5:9AD549C121108B3B1408A30BEE325D08 | SHA256:263975E4F5AFC90E91F9F601080B92C9FBC5E471132F63AD01C6C4F99B33B83A | |||
| 5916 | rundll32.exe | C:\Users\admin\AppData\Local\Programs\Apps Security Manager\CoreFoundation.dll | executable | |
MD5:F8E1AFEA1FF44A643D44BD2E7BFECFBB | SHA256:9D8EB1314D91240641FAD144472EB897AA3A95BBE9E59674C200A86012BB4A9B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6796 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6604 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
3272 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4892 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4892 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6796 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.126.31.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6604 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
— | — | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7072 | svchost.exe | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
browser.pipe.aria.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6572 | secd.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |
6572 | secd.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |
6572 | secd.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |
6572 | secd.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |
6572 | secd.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |