File name:

CXK-NMSL V3.3.1.bat

Full analysis: https://app.any.run/tasks/6113b71b-3b82-4e3d-872b-a464ea660a01
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: September 04, 2024, 03:32:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
stealer
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

702D5BE9C8323BA0436D8CB9BA3D60A9

SHA1:

0676F6D52318CA2AB99E67A5492F711C2AA0B284

SHA256:

273B208DA1F82A00613B0F484501B28A9398A550427C4C5A4D36CE6B58E6DDF6

SSDEEP:

49152:mC3jPDJj7gPD4VAs6IZdW9X2HcfclCtkDvW0Ic0kzeWKnCSKgtDuv7zTfLVkr+C7:HRjUiAp3t0jzeVC2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Renames files like ransomware

      • cmd.exe (PID: 3644)
    • Actions looks like stealing of personal data

      • cmd.exe (PID: 3644)
    • BROWSER STEALER has been detected

      • cmd.exe (PID: 3644)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • mshta.exe (PID: 2280)
    • Creates file in the systems drive root

      • cmd.exe (PID: 3644)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 2280)
    • Reads the Internet Settings

      • mshta.exe (PID: 2280)
      • taskmgr.exe (PID: 2936)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2280)
    • Application launched itself

      • taskmgr.exe (PID: 2936)
  • INFO

    • Checks proxy server information

      • mshta.exe (PID: 2280)
    • Manual execution by a user

      • taskmgr.exe (PID: 2936)
      • wmpnscfg.exe (PID: 3484)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2280)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3484)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3484)
    • The process uses the downloaded file

      • taskmgr.exe (PID: 2936)
      • mshta.exe (PID: 2280)
    • Reads security settings of Internet Explorer

      • taskmgr.exe (PID: 2936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.bib/bibtex/txt | BibTeX references (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
38
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs mshta.exe no specs cmd.exe certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs taskmgr.exe no specs wmpnscfg.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
976certutil -encode "primarytesting.png.cxkdata" "primarytesting.png.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
1488C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\CXK-NMSL V3.3.1.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1632certutil -encode "usfat.jpg.cxkdata" "usfat.jpg.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
1852certutil -encode "unlessindia.rtf.cxkdata" "unlessindia.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2156certutil -encode "Desktop.lnk.cxkdata" "Desktop.lnk.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2280mshta vbscript:createobject("wscript.shell").run("""CXK-NMSL V3.3.1.bat"" h",0)(window.close)C:\Windows\System32\mshta.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2376certutil -encode "sevenbelow.rtf.cxkdata" "sevenbelow.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2552certutil -encode "componentsmonthly.jpg.cxkdata" "componentsmonthly.jpg.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2600certutil -encode "casinothey.rtf.cxkdata" "casinothey.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2704certutil -encode "transportationstudio.rtf.cxkdata" "transportationstudio.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
Total events
6 221
Read events
6 193
Write events
24
Delete events
4

Modification events

(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
Executable files
0
Suspicious files
3
Text files
61
Unknown types
0

Dropped files

PID
Process
Filename
Type
3644cmd.exeC:\Users\admin\Desktop\saidtrading.jpg.cxkdataimage
MD5:95064D2936964515B9EE7FEA87906B20
SHA256:C71C99763A6A28823868EEF1EBABCE0BC4D9C4FF977A14996B06B4DF0B64E719
3644cmd.exeC:\Users\admin\Desktop\additionalmy.rtf.cxkdatatext
MD5:E0486459CF0A396268930DDAD4B8364A
SHA256:085C10B233FE70117DEEA4F6CA07BD3A32DE5619AF9873BD842F70747E9C4BB9
3644cmd.exeC:\Users\admin\Desktop\casinothey.rtf.cxkdatatext
MD5:BA8D6131983A1B315A095F6D79A66FE9
SHA256:2EBAB4FB02B72032BFA1EC31D97DA17B2887F5985A2D0C2991893A1E41D2F74A
3644cmd.exeC:\Users\admin\Desktop\jackmorning.png.cxkdataimage
MD5:5CB10D5C30A76BE731679C33CA10B7AE
SHA256:A27ED6F7471189A2496D8EC0A84ABF5B5EF9F2FE559FCEB1DC83D54A27EF1B06
3644cmd.exeC:\Users\admin\Desktop\primarytesting.png.cxkdataimage
MD5:88A06D6706C290BB7D7C0AD2D8563F4E
SHA256:2C79D05948B0FACCC6D249A72162B2EA153B41F37DD5BB0BD36A736A79E54114
3644cmd.exeC:\Users\admin\Desktop\ncmuch.jpg.cxkdataimage
MD5:F5B638D213B1F2E33EBE084419F4A9BC
SHA256:61227049238BC44233358D1CA75DECF20E2D968F3B38FDEE34F80E73A46DA5F3
3644cmd.exeC:\Users\admin\Desktop\componentsmonthly.jpg.cxkdataimage
MD5:A9F1F5FEDF76EF1B57670367F29DB719
SHA256:E8FC33A75A776C26638599F49A5F99A8761A4C06B0867506799BA41F16CE0073
3644cmd.exeC:\Users\admin\Desktop\progressenglish.rtf.cxkdatatext
MD5:33CA4ECE588CDAE92DCD63B39C885D2A
SHA256:C5F86DE08B773E54D01C0042D1833C0AD2C0F1888D5241CAA9874B0FA7BADB0B
3644cmd.exeC:\Users\admin\Desktop\significantalthough.rtf.cxkdatatext
MD5:75ACCEC8AC160D36ED3CA0D41E029EB6
SHA256:11EFB4663F7C0090ADDFB960CAFE506F166E2C2A41A03987DF3C60DAE92F610F
3644cmd.exeC:\Users\admin\Desktop\transportationstudio.rtf.cxkdatatext
MD5:5C1BE9221BE6409E3F3BAC0998D003FF
SHA256:0ABB8FBEA7ED7A8F567045608081AB2941CCAF3C7920DF268731245A2113C6CD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
9
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
218.98.12.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
218.98.12.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?11acddbe1ebd82b3
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1372
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
52.137.106.217:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1372
svchost.exe
218.98.12.35:80
ctldl.windowsupdate.com
UNICOM JiangSu Suzhou IDC network
CN
whitelisted
1372
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1060
svchost.exe
218.98.12.35:80
ctldl.windowsupdate.com
UNICOM JiangSu Suzhou IDC network
CN
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 52.137.106.217
whitelisted
ctldl.windowsupdate.com
  • 218.98.12.35
  • 60.221.222.1
  • 121.22.239.35
  • 119.188.176.35
  • 112.65.203.35
  • 101.72.203.35
  • 101.72.199.35
  • 61.163.9.35
  • 211.97.82.35
  • 218.68.136.35
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info