| File name: | Delivery_Notification_00000126783.doc.wsf |
| Full analysis: | https://app.any.run/tasks/f196e488-105f-4133-aafb-0142071949eb |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | February 25, 2019, 14:49:15 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/html |
| File info: | HTML document, ASCII text, with very long lines, with no line terminators |
| MD5: | 1CC1132E8997AE16CBC75B3EC1F3187D |
| SHA1: | 4CF071A3E6F1B4AB80CBF49532E68FA1430C201F |
| SHA256: | 35E4CED515B33A2A68C391D2D63C36B236B35E7E2230169FCBAC0DD778D409C8 |
| SSDEEP: | 96:mCrOBaGZXa3lkGRt4Q+dNgEUbOqrkvwF29jt9vPhznJ2sUrI4px:mCWXWlhRuQuNgDmIF29PtJJX0x |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 588 | "C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted" | C:\Windows\system32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2056 | REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\admin\AppData\Local\Temp\a.txt" | C:\Windows\system32\reg.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2232 | notepad.exe "C:\Users\admin\AppData\Local\Temp\a.txt" | C:\Windows\system32\notepad.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2280 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex $env:otyj | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2324 | "C:\Users\admin\AppData\Local\Temp\a2.exe" | C:\Users\admin\AppData\Local\Temp\a2.exe | — | a2.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2344 | "C:\Windows\system32\mshta.exe" javascript:zkCD2p5vy="oqzqmy";cE6=new%20ActiveXObject("WScript.Shell");izh8UMN="PwFCYJ";qIG5h=cE6.RegRead("HKCU\\software\\W6s5zY0G\\rJ20nB9Y");krB7BJ="FK0kFPVR";eval(qIG5h);bNn5DI="S"; | C:\Windows\system32\mshta.exe | — | wmiprvse.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2392 | C:\Users\admin\AppData\Local\Temp\a.exe "C:\Users\admin\AppData\Local\Temp\a.php" | C:\Users\admin\AppData\Local\Temp\a.exe | — | cmd.exe | |||||||||||
User: admin Company: The PHP Group Integrity Level: MEDIUM Description: PHP Script Interpreter Exit code: 0 Version: 4.4.9.9 Modules
| |||||||||||||||
| 2408 | "C:\Windows\system32\regsvr32.exe" | C:\Windows\system32\regsvr32.exe | — | regsvr32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2564 | "C:\Users\admin\AppData\Local\Temp\a1.exe" | C:\Users\admin\AppData\Local\Temp\a1.exe | — | a1.exe | |||||||||||
User: admin Company: FlashMod inc. Integrity Level: MEDIUM Description: Our motto "Endo - Easy - Efficient" is the result of over 100 years' experience in providing dentists with endodontic products. VDW offers high quality, innovative ... Exit code: 0 Version: 1.00.0168 Modules
| |||||||||||||||
| 2588 | regsvr32.exe | C:\Windows\system32\regsvr32.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (2944) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\d[1].png | executable | |
MD5:— | SHA256:— | |||
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\35f2769bed5e37[1].png | executable | |
MD5:— | SHA256:— | |||
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Temp\a1.exe | executable | |
MD5:— | SHA256:— | |||
| 3452 | a2.exe | C:\Users\admin\AppData\Local\Temp\wordpress-hosting | html | |
MD5:— | SHA256:— | |||
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\666f05a[1].png | executable | |
MD5:— | SHA256:— | |||
| 3452 | a2.exe | C:\Users\admin\AppData\Local\Temp\feed212565215.rss+xml | xml | |
MD5:— | SHA256:— | |||
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Temp\a2.exe | executable | |
MD5:— | SHA256:— | |||
| 3452 | a2.exe | C:\Users\admin\AppData\Local\Temp\home1496213447.html | html | |
MD5:— | SHA256:— | |||
| 2944 | WScript.exe | C:\Users\admin\AppData\Local\Temp\a.exe | executable | |
MD5:— | SHA256:— | |||
| 3452 | a2.exe | C:\Users\admin\AppData\Local\Temp\public363103015.css | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2944 | WScript.exe | GET | 200 | 217.97.216.17:80 | http://kppspgrojec.internetdsl.pl/counter/?ad=13TsQUPWC4BsQfc7GPPmtx4RZyz6iSM5GC&id=rZUH9RUqgN7qAPNhizR6ft3c_43tJzJDAPXwSwjwfjXd4fmZJ6WQyI91hPn7ExxXkJjKH2oSdEsNaxI&rnd=05 | PL | text | 3.07 Kb | malicious |
2588 | regsvr32.exe | POST | — | 200.9.23.235:80 | http://200.9.23.235/ | BR | — | — | malicious |
2944 | WScript.exe | GET | 200 | 217.97.216.17:80 | http://kppspgrojec.internetdsl.pl/counter/?ad=13TsQUPWC4BsQfc7GPPmtx4RZyz6iSM5GC&id=rZUH9RUqgN7qAPNhizR6ft3c_43tJzJDAPXwSwjwfjXd4fmZJ6WQyI91hPn7ExxXkJjKH2oSdEsNaxI&rnd=03 | PL | executable | 44.0 Kb | malicious |
2944 | WScript.exe | GET | 200 | 217.97.216.17:80 | http://kppspgrojec.internetdsl.pl/counter/?ad=13TsQUPWC4BsQfc7GPPmtx4RZyz6iSM5GC&id=rZUH9RUqgN7qAPNhizR6ft3c_43tJzJDAPXwSwjwfjXd4fmZJ6WQyI91hPn7ExxXkJjKH2oSdEsNaxI&rnd=02 | PL | executable | 176 Kb | malicious |
2588 | regsvr32.exe | POST | — | 200.9.23.235:80 | http://200.9.23.235/ | BR | — | — | malicious |
2588 | regsvr32.exe | POST | — | 200.9.23.235:80 | http://200.9.23.235/ | BR | — | — | malicious |
2944 | WScript.exe | GET | 200 | 217.97.216.17:80 | http://kppspgrojec.internetdsl.pl/counter/?ad=13TsQUPWC4BsQfc7GPPmtx4RZyz6iSM5GC&id=rZUH9RUqgN7qAPNhizR6ft3c_43tJzJDAPXwSwjwfjXd4fmZJ6WQyI91hPn7ExxXkJjKH2oSdEsNaxI&rnd=04 | PL | executable | 1.35 Mb | malicious |
2588 | regsvr32.exe | POST | — | 200.9.23.235:80 | http://200.9.23.235/ | BR | — | — | malicious |
2944 | WScript.exe | GET | 200 | 217.97.216.17:80 | http://kppspgrojec.internetdsl.pl/counter/?ad=13TsQUPWC4BsQfc7GPPmtx4RZyz6iSM5GC&id=rZUH9RUqgN7qAPNhizR6ft3c_43tJzJDAPXwSwjwfjXd4fmZJ6WQyI91hPn7ExxXkJjKH2oSdEsNaxI&rnd=01 | PL | executable | 286 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2588 | regsvr32.exe | 4.49.142.40:443 | — | Level 3 Communications, Inc. | US | malicious |
2588 | regsvr32.exe | 72.44.146.148:80 | — | ATX Telecommunications Services | US | unknown |
2588 | regsvr32.exe | 71.31.208.29:80 | — | Windstream Communications Inc | US | unknown |
2944 | WScript.exe | 217.97.216.17:80 | kppspgrojec.internetdsl.pl | Orange Polska Spolka Akcyjna | PL | malicious |
2588 | regsvr32.exe | 114.234.65.223:80 | — | No.31,Jin-rong Street | CN | unknown |
2588 | regsvr32.exe | 145.76.102.128:80 | — | SURFnet bv | NL | unknown |
2588 | regsvr32.exe | 23.56.40.226:80 | — | Akamai International B.V. | NL | whitelisted |
2588 | regsvr32.exe | 203.198.92.24:80 | — | PCCW Limited | HK | unknown |
2588 | regsvr32.exe | 5.195.175.63:80 | — | Emirates Telecommunications Corporation | AE | unknown |
2588 | regsvr32.exe | 25.234.107.31:80 | — | — | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
kppspgrojec.internetdsl.pl |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2944 | WScript.exe | A Network Trojan was detected | ET TROJAN JS/Nemucod requesting EXE payload 2016-03-31 |
2944 | WScript.exe | A Network Trojan was detected | ET TROJAN WS/JS Downloader Mar 07 2017 M1 |
2944 | WScript.exe | Misc activity | SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7) |
2944 | WScript.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2944 | WScript.exe | A Network Trojan was detected | ET TROJAN JS/Nemucod.M.gen downloading EXE payload |
2944 | WScript.exe | A Network Trojan was detected | ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2 |
2944 | WScript.exe | A Network Trojan was detected | ET TROJAN JS/WSF Downloader Dec 08 2016 M3 |
2944 | WScript.exe | A Network Trojan was detected | ET TROJAN JS/WSF Downloader Dec 08 2016 M4 |
2944 | WScript.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2944 | WScript.exe | Misc activity | SUSPICIOUS [PTsecurity] PE as Image Content type mismatch |