analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Газпромбанк заказ.js

Full analysis: https://app.any.run/tasks/da86f541-145e-485c-b4b4-3e3776f97f5f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 14, 2018, 04:46:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF, LF line terminators
MD5:

1D5569ED565C57AE66B4D25FF86D4AA9

SHA1:

D56C09A09D27455D620919EB0C41D323BB41EA64

SHA256:

457EF810EB635795C3C0AC104A81DDE2DCEDC7256C93D6E1C6104D38FCD399AD

SSDEEP:

48:abT7sBKC7kHK7rtZDm9b8WbUbQb9GhJhJmc4Q3amWBRAnwaYmqhzlA7XLcSAIYdm:BjZcGhRCeYTfyYAnMQyCuUek84rIKj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • radB8850.tmp (PID: 3956)
    • Changes the autorun value in the registry

      • radB8850.tmp (PID: 3956)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 2004)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 2004)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 2004)
      • radB8850.tmp (PID: 3956)
    • Starts application with an unusual extension

      • cmd.exe (PID: 600)
    • Creates files in the program directory

      • radB8850.tmp (PID: 3956)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • radB8850.tmp (PID: 3956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start wscript.exe cmd.exe no specs radb8850.tmp

Process information

PID
CMD
Path
Indicators
Parent process
2004"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Газпромбанк заказ.js"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
600"C:\Windows\System32\cmd.exe" /c C:\Users\admin\AppData\Local\Temp\radB8850.tmpC:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3956C:\Users\admin\AppData\Local\Temp\radB8850.tmpC:\Users\admin\AppData\Local\Temp\radB8850.tmp
cmd.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
Command-line SCP/SFTP client
Version:
Release 0.68
Total events
156
Read events
135
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3956radB8850.tmpC:\Users\admin\AppData\Local\Temp\6893A5D897\state.tmp
MD5:
SHA256:
3956radB8850.tmpC:\Users\admin\AppData\Local\Temp\6893A5D897\unverified-microdesc-consensus.tmp
MD5:
SHA256:
3956radB8850.tmpC:\Users\admin\AppData\Local\Temp\6893A5~1\unverified-microdesc-consensustext
MD5:ABF749681BF9AAADD0FFD1B10DDA31AF
SHA256:1AA5D2CBDF22112E0C705A2C8AFC3D8C4D097371604A6438B98C2426D4BB8E4C
3956radB8850.tmpC:\ProgramData\Windows\csrss.exeexecutable
MD5:38D8C01F6843B63D7CCEFBF795243E55
SHA256:C2B777DB387E84C008EBF47CFE821EB079E36E594614C17D8A771CA95BD086AB
2004WScript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\sserv[1].jpgexecutable
MD5:38D8C01F6843B63D7CCEFBF795243E55
SHA256:C2B777DB387E84C008EBF47CFE821EB079E36E594614C17D8A771CA95BD086AB
2004WScript.exeC:\Users\admin\AppData\Local\Temp\radB8850.tmpexecutable
MD5:38D8C01F6843B63D7CCEFBF795243E55
SHA256:C2B777DB387E84C008EBF47CFE821EB079E36E594614C17D8A771CA95BD086AB
3956radB8850.tmpC:\Users\admin\AppData\Local\Temp\6893A5~1\statetext
MD5:BCC4C061A955396A038FE5C8F2FE963F
SHA256:6166EDCA6DCD87D17BF6AE7E4AC849096E73D68B7133013A06A18B5C934B6959
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2004
WScript.exe
GET
200
94.73.146.114:80
http://kamelyaetbalik.com/images/sserv.jpg
TR
executable
1.29 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3956
radB8850.tmp
86.59.21.38:443
Tele2 Telecommunication GmbH
AT
malicious
2004
WScript.exe
208.117.46.236:80
halcyonholistichealth.com
Steadfast
US
unknown
2004
WScript.exe
94.73.146.114:80
kamelyaetbalik.com
Cizgi Telekomunikasyon Anonim Sirketi
TR
suspicious
3956
radB8850.tmp
154.35.32.5:443
Rethem Hosting LLC
US
suspicious

DNS requests

Domain
IP
Reputation
halcyonholistichealth.com
  • 208.117.46.236
unknown
dns.msftncsi.com
  • 131.107.255.255
shared
kamelyaetbalik.com
  • 94.73.146.114
malicious

Threats

PID
Process
Class
Message
2004
WScript.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2004
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2
2004
WScript.exe
A Network Trojan was detected
ET TROJAN JS/WSF Downloader Dec 08 2016 M4
2004
WScript.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious behavior, PE instead image from server
2004
WScript.exe
Misc activity
POLICY [PTsecurity] PE as Image Content type mismatch
3956
radB8850.tmp
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 622
1 ETPRO signatures available at the full report
No debug info