File name:

CXK-NMSL V3.3.1.bat

Full analysis: https://app.any.run/tasks/6113b71b-3b82-4e3d-872b-a464ea660a01
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: September 04, 2024, 03:32:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
stealer
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

702D5BE9C8323BA0436D8CB9BA3D60A9

SHA1:

0676F6D52318CA2AB99E67A5492F711C2AA0B284

SHA256:

273B208DA1F82A00613B0F484501B28A9398A550427C4C5A4D36CE6B58E6DDF6

SSDEEP:

49152:mC3jPDJj7gPD4VAs6IZdW9X2HcfclCtkDvW0Ic0kzeWKnCSKgtDuv7zTfLVkr+C7:HRjUiAp3t0jzeVC2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BROWSER STEALER has been detected

      • cmd.exe (PID: 3644)
    • Renames files like ransomware

      • cmd.exe (PID: 3644)
    • Actions looks like stealing of personal data

      • cmd.exe (PID: 3644)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • cmd.exe (PID: 3644)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 2280)
    • Reads the Internet Settings

      • mshta.exe (PID: 2280)
      • taskmgr.exe (PID: 2936)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2280)
    • Application launched itself

      • taskmgr.exe (PID: 2936)
    • Executing commands from a ".bat" file

      • mshta.exe (PID: 2280)
  • INFO

    • Checks proxy server information

      • mshta.exe (PID: 2280)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3484)
      • taskmgr.exe (PID: 2936)
    • Reads security settings of Internet Explorer

      • taskmgr.exe (PID: 2936)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3484)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3484)
    • The process uses the downloaded file

      • taskmgr.exe (PID: 2936)
      • mshta.exe (PID: 2280)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.bib/bibtex/txt | BibTeX references (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
38
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs mshta.exe no specs cmd.exe certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs taskmgr.exe no specs wmpnscfg.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
976certutil -encode "primarytesting.png.cxkdata" "primarytesting.png.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
1488C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\CXK-NMSL V3.3.1.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1632certutil -encode "usfat.jpg.cxkdata" "usfat.jpg.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
1852certutil -encode "unlessindia.rtf.cxkdata" "unlessindia.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2156certutil -encode "Desktop.lnk.cxkdata" "Desktop.lnk.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2280mshta vbscript:createobject("wscript.shell").run("""CXK-NMSL V3.3.1.bat"" h",0)(window.close)C:\Windows\System32\mshta.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2376certutil -encode "sevenbelow.rtf.cxkdata" "sevenbelow.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2552certutil -encode "componentsmonthly.jpg.cxkdata" "componentsmonthly.jpg.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2600certutil -encode "casinothey.rtf.cxkdata" "casinothey.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
2704certutil -encode "transportationstudio.rtf.cxkdata" "transportationstudio.rtf.cxk_nmsl"C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
Total events
6 221
Read events
6 193
Write events
24
Delete events
4

Modification events

(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2280) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
Executable files
0
Suspicious files
3
Text files
61
Unknown types
0

Dropped files

PID
Process
Filename
Type
3644cmd.exeC:\Users\admin\Desktop\jackmorning.png.cxkdataimage
MD5:5CB10D5C30A76BE731679C33CA10B7AE
SHA256:A27ED6F7471189A2496D8EC0A84ABF5B5EF9F2FE559FCEB1DC83D54A27EF1B06
3644cmd.exeC:\Users\admin\Desktop\republiccouncil.png.cxkdataimage
MD5:8B156E4950DB872E21C61F1D175E1CF6
SHA256:5105AB7D81327AED5A4CE354003801BD8023478896E718A956108966E75B0797
2600certutil.exeC:\Users\admin\Desktop\casinothey.rtf.cxk_nmsltext
MD5:D8B8264FDF5B78A9C3AA4CB915ABFE9C
SHA256:5750AD5B05B47A3FB22E763D8682B253DBB1B5D6B597BC294AE98BEECBC89708
3448certutil.exeC:\Users\admin\Desktop\additionalmy.rtf.cxk_nmsltext
MD5:9845E710C0077935C52986B8D3088030
SHA256:F2C05F3D51909AE49791128CF78E6B64CB7A2A818BF54CD3BE2827588C6FBF43
3644cmd.exeC:\Users\admin\Desktop\ncmuch.jpg.cxkdataimage
MD5:F5B638D213B1F2E33EBE084419F4A9BC
SHA256:61227049238BC44233358D1CA75DECF20E2D968F3B38FDEE34F80E73A46DA5F3
3644cmd.exeC:\Users\admin\Desktop\significantalthough.rtf.cxkdatatext
MD5:75ACCEC8AC160D36ED3CA0D41E029EB6
SHA256:11EFB4663F7C0090ADDFB960CAFE506F166E2C2A41A03987DF3C60DAE92F610F
3496certutil.exeC:\Users\admin\Desktop\liketuesday.png.cxk_nmsltext
MD5:0E77F9F33A9369DE775E4D89763CAA90
SHA256:138C4644DF400D6D9E00458FF354DADBF04946DA11D55B60524F4B0DE3B533B3
3644cmd.exeC:\Users\admin\Desktop\transportationstudio.rtf.cxkdatatext
MD5:5C1BE9221BE6409E3F3BAC0998D003FF
SHA256:0ABB8FBEA7ED7A8F567045608081AB2941CCAF3C7920DF268731245A2113C6CD
2552certutil.exeC:\Users\admin\Desktop\componentsmonthly.jpg.cxk_nmsltext
MD5:2834CEA747D90EED3CDC63052B6FD3CC
SHA256:AC0B8E43C544F101F4F3825B0B8D74D316A12745FE82D245EA35EB3A093590AD
3644cmd.exeC:\Users\admin\Desktop\liketuesday.png.cxkdataimage
MD5:6E843537CDE5B12D3B7703BF4D5D65AC
SHA256:548042F181E3B840501D48C4F2E978ECF80516D4CD70A12C7D52EE642F082F2A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
9
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
218.98.12.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
218.98.12.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?11acddbe1ebd82b3
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1372
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
52.137.106.217:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1372
svchost.exe
218.98.12.35:80
ctldl.windowsupdate.com
UNICOM JiangSu Suzhou IDC network
CN
whitelisted
1372
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1060
svchost.exe
218.98.12.35:80
ctldl.windowsupdate.com
UNICOM JiangSu Suzhou IDC network
CN
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 52.137.106.217
whitelisted
ctldl.windowsupdate.com
  • 218.98.12.35
  • 60.221.222.1
  • 121.22.239.35
  • 119.188.176.35
  • 112.65.203.35
  • 101.72.203.35
  • 101.72.199.35
  • 61.163.9.35
  • 211.97.82.35
  • 218.68.136.35
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info