analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

new 1.js

Full analysis: https://app.any.run/tasks/c505b68d-9a47-4472-a816-d25629558989
Verdict: Malicious activity
Analysis date: March 22, 2019, 10:57:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

FA9FF48989DBF7306D4F27E8CAD98120

SHA1:

0F23888E4C01D17A31FC1581955BE41DE747B9A3

SHA256:

43BBDF589DB9D532FD420C639B7ECB2141A2FB54E2C81FE4CAB012F7DC68FFE7

SSDEEP:

24:MB/cdYciIN+iAUx/e5YFu3FVPi+U010/+jHoarzSGG+8y5/A/XS2:dwIQiTSYePP/5EaD8y5Id

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • WScript.exe (PID: 1524)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 1524)
    • Creates files in the user directory

      • WScript.exe (PID: 1524)
    • Uses ATTRIB.EXE to modify file attributes

      • WScript.exe (PID: 1524)
    • Adds / modifies Windows certificates

      • WScript.exe (PID: 1524)
    • Executes application which crashes

      • cmd.exe (PID: 2444)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wscript.exe attrib.exe no specs attrib.exe no specs cmd.exe no specs ntvdm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1524"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\new 1.js"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2960attrib -H "C:\Users\admin\AppData\Roaming\stub.exe"C:\Windows\System32\attrib.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
964attrib +H "C:\Users\admin\AppData\Roaming\stub.exe"C:\Windows\System32\attrib.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2444cmd /Q /V:OFF /C call "C:\Users\admin\AppData\Roaming\stub.exe" >nulC:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1296"C:\Windows\system32\ntvdm.exe" C:\Windows\system32\ntvdm.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
93
Read events
59
Write events
32
Delete events
2

Modification events

(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1524) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1296ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs8D33.tmp
MD5:
SHA256:
1296ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs8D44.tmp
MD5:
SHA256:
1524WScript.exeC:\Users\admin\AppData\Roaming\stub.exexml
MD5:B8881A7614D909FB4A540CD68CA9BA13
SHA256:4887CB5ABEEE80F7933EB85FC53704676432552E88FC3B106C90CB165AF50871
1524WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@discordapp[1].txttext
MD5:B7AD39CEC74073570BA7ABE61D1362CB
SHA256:7D98A00CAC281B0C1AE6C6397374CBAA24117AF0C974A25E872CFF4743015B63
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1524
WScript.exe
104.16.13.231:443
cdn.discordapp.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
cdn.discordapp.com
  • 104.16.13.231
  • 104.16.10.231
  • 104.16.12.231
  • 104.16.9.231
  • 104.16.11.231
shared

Threats

No threats detected
No debug info