| File name: | FIRSTPROLIVNEW.txt |
| Full analysis: | https://app.any.run/tasks/fc619b18-41cd-4ff1-8652-16b25f4d91ba |
| Verdict: | Malicious activity |
| Threats: | Danabot is an advanced banking Trojan malware that was designed to steal financial information from victims. Out of the Trojans in the wild, this is one of the most advanced thanks to the modular design and a complex delivery method. |
| Analysis date: | January 18, 2025, 23:53:11 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines (1165), with CRLF line terminators |
| MD5: | B3DAD34E5E6A2F70B16CBD5A163B8AE4 |
| SHA1: | 1EAB40171C6BFA62F8C17A4DDFA9D2D0F11BF78E |
| SHA256: | FF5968DEE54D79D8301AFE5B8CFFD1AA23AFE5427D116774CB16567042A535AE |
| SSDEEP: | 3072:SFbc4F7dx+hYDGzHoIutwbHKb/0+o8Wx/uZF2yH1WSg0Re:SB3F7dx+hYazIIAaHw/O8Wx/uLgSa |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2996 | C:\Users\admin\AppData\Roaming\KIIupload\Dashboard.exe | C:\Users\admin\AppData\Roaming\KIIupload\Dashboard.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Live installer client executable Version: 12.0.1202.0516 Modules
| |||||||||||||||
| 3288 | "C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\FIRSTPROLIVNEW.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3524 | "C:\Users\admin\AppData\Local\Temp\{EE4054FB-8C6D-4199-B653-9B868C597F4E}\.cr\HGUETURW.exe" -burn.clean.room="C:\Users\admin\AppData\Roaming\HGUETURW.exe" -burn.filehandle.attached=636 -burn.filehandle.self=640 | C:\Users\admin\AppData\Local\Temp\{EE4054FB-8C6D-4199-B653-9B868C597F4E}\.cr\HGUETURW.exe | HGUETURW.exe | ||||||||||||
User: admin Company: Osmose Integrity Level: MEDIUM Description: Grysbok Exit code: 0 Version: 3.10.6.0 Modules
| |||||||||||||||
| 3876 | cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value | C:\Windows\SysWOW64\cmd.exe | — | Dashboard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 2147749911 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4320 | C:\Users\admin\AppData\Local\Temp\{A4B11F80-7240-4297-9AEB-A4B914D0ED30}\.ba\Dashboard.exe | C:\Users\admin\AppData\Local\Temp\{A4B11F80-7240-4297-9AEB-A4B914D0ED30}\.ba\Dashboard.exe | HGUETURW.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Live installer client executable Exit code: 0 Version: 12.0.1202.0516 Modules
| |||||||||||||||
| 4556 | "C:\Users\admin\AppData\Roaming\HGUETURW.exe" | C:\Users\admin\AppData\Roaming\HGUETURW.exe | powershell.exe | ||||||||||||
User: admin Company: Osmose Integrity Level: MEDIUM Description: Grysbok Exit code: 0 Version: 3.10.6.0 Modules
| |||||||||||||||
| 4672 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4716 | C:\Users\admin\AppData\Roaming\KIIupload\Dashboard.exe | C:\Users\admin\AppData\Roaming\KIIupload\Dashboard.exe | — | Dashboard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Live installer client executable Exit code: 1 Version: 12.0.1202.0516 Modules
| |||||||||||||||
| 4980 | C:\WINDOWS\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | — | Dashboard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5556 | "C:\WINDOWS\system32\rundll32.exe" "C:\WINDOWS\system32\shell32.dll",#61 | C:\Windows\System32\rundll32.exe | Dashboard.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | SecureProtocols |
Value: 2688 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost\IndexedDB\Microsoft.AsyncTextService_8wekyb3d8bbwe |
| Operation: | write | Name: | PerPackageIndexedDBEnabled |
Value: 1 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\EmieUserList |
| Operation: | write | Name: | CacheRelativePath |
Value: Microsoft\Internet Explorer\EmieUserList | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ZonesSecurityUpgrade |
Value: DB847CA30259DA01 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyServer |
Value: 127.0.0.1:23160 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppBroadcast |
| Operation: | write | Name: | DefaultPlugInEventId |
Value: {5504e330-9d3d-44c5-8786-c9b100cd9893} | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CacheLimit |
Value: 1 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | DisableIDNPrompt |
Value: 0 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CacheLimit |
Value: 337920 | |||
| (PID) Process: | (2996) Dashboard.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost |
| Operation: | write | Name: | EnableWebContentEvaluation |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3524 | HGUETURW.exe | C:\Users\admin\AppData\Local\Temp\{A4B11F80-7240-4297-9AEB-A4B914D0ED30}\.ba\flagellator.msg | — | |
MD5:— | SHA256:— | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_og2mhqka.vjb.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Roaming\HGUETURW.exe | executable | |
MD5:C655B98DD20AB5B3DC8961CC31B09D60 | SHA256:88EAFDEB69CEF4DB4A96C4BB97EA3BAD3583E8A47AF0346E308E28EC925B0E41 | |||
| 4320 | Dashboard.exe | C:\Users\admin\AppData\Roaming\KIIupload\flagellator.msg | — | |
MD5:— | SHA256:— | |||
| 4716 | Dashboard.exe | C:\Users\admin\AppData\Local\Temp\1e559a90 | — | |
MD5:— | SHA256:— | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fluzhay1.mef.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4980 | cmd.exe | C:\Users\admin\AppData\Local\Temp\sixunihixgpb | — | |
MD5:— | SHA256:— | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF143d27.TMP | binary | |
MD5:D040F64E9E7A2BB91ABCA5613424598E | SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670 | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | binary | |
MD5:FCE558C30EEBADBA45FAE1BC291EE241 | SHA256:68D20C4F375217909CEA429009DA73192E4E4931FD8F2D6D6C269F4CDF0A9B30 | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zig32u4q.04n.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.166:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2380 | svchost.exe | GET | 200 | 23.48.23.166:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2380 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7116 | powershell.exe | GET | 200 | 89.23.96.207:80 | http://89.23.96.207/HGUETURW.exe | unknown | — | — | unknown |
6224 | backgroundTaskHost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.166:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2380 | svchost.exe | 23.48.23.166:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2380 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5064 | SearchApp.exe | 104.126.37.178:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
1076 | svchost.exe | 184.30.18.9:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7116 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
7116 | powershell.exe | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
7116 | powershell.exe | Misc activity | ET INFO Request for EXE via Powershell |
7116 | powershell.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
7116 | powershell.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2996 | Dashboard.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |
2996 | Dashboard.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Danabot TCP Packet |