URL:

http://cmokc.com/wp-content/themes/gaukingo/9qph4uxbvqdfzv/wrqqfxwr.php

Full analysis: https://app.any.run/tasks/7b11286a-fcc6-40d8-b699-eac9a2cd2002
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 08, 2019, 15:59:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
trojan
loader
ransomware
maze
Indicators:
MD5:

00687731AC25ED56C3E5FD86BDBE82C9

SHA1:

64352667125CAAEC965123137C3676C35034E2F2

SHA256:

5510D6366146E1825FF07378FECD56E9DC4BAD8977DEE7F203CA054E51380DA3

SSDEEP:

3:N1KdIqGvOlAQrF6FPsTGJ9MV:CKqGvOlAkFmaEU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 250608.dat (PID: 784)
      • 22191.dat (PID: 2600)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 3804)
    • Deletes shadow copies

      • 250608.dat (PID: 784)
    • Writes file to Word startup folder

      • 250608.dat (PID: 784)
    • Writes to a start menu file

      • 250608.dat (PID: 784)
    • Renames files like Ransomware

      • 250608.dat (PID: 784)
    • MAZE was detected

      • 250608.dat (PID: 784)
    • Actions looks like stealing of personal data

      • 250608.dat (PID: 784)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • msdt.exe (PID: 4056)
      • WScript.exe (PID: 3804)
      • WScript.exe (PID: 3496)
    • Executed via COM

      • sdiagnhost.exe (PID: 2888)
    • Executes scripts

      • WinRAR.exe (PID: 3572)
    • Starts application with an unusual extension

      • WScript.exe (PID: 3804)
      • WScript.exe (PID: 3496)
    • Creates files in the user directory

      • WScript.exe (PID: 3804)
      • WScript.exe (PID: 3496)
      • 250608.dat (PID: 784)
    • Creates files in the program directory

      • 250608.dat (PID: 784)
    • Creates files like Ransomware instruction

      • 250608.dat (PID: 784)
    • Reads the cookies of Mozilla Firefox

      • 250608.dat (PID: 784)
    • Connects to server without host name

      • 250608.dat (PID: 784)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 1560)
    • Changes internet zones settings

      • iexplore.exe (PID: 1560)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2556)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2556)
    • Creates files in the user directory

      • iexplore.exe (PID: 2556)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1560)
    • Dropped object may contain TOR URL's

      • 250608.dat (PID: 784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
11
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe msdt.exe sdiagnhost.exe no specs winrar.exe no specs wscript.exe #MAZE 250608.dat wscript.exe 22191.dat no specs wmic.exe no specs wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
784C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\250608.datC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\250608.dat
WScript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\templates\250608.dat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
1560"C:\Program Files\Internet Explorer\iexplore.exe" "http://cmokc.com/wp-content/themes/gaukingo/9qph4uxbvqdfzv/wrqqfxwr.php"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2080"C:\vxwq\..\Windows\wdp\npt\..\..\system32\mhnaf\bcydn\..\..\wbem\u\l\..\..\wmic.exe" shadowcopy deleteC:\Windows\system32\wbem\wmic.exe250608.dat
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
2147749908
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2456"C:\fr\atwrt\kahd\..\..\..\Windows\qsru\srnmj\eu\..\..\..\system32\r\xlsmu\w\..\..\..\wbem\a\b\..\..\wmic.exe" shadowcopy deleteC:\Windows\system32\wbem\wmic.exe250608.dat
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
2147749908
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2556"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1560 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2600C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\22191.datC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\22191.datWScript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\templates\22191.dat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
2888C:\Windows\System32\sdiagnhost.exe -EmbeddingC:\Windows\System32\sdiagnhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Scripted Diagnostics Native Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sdiagnhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3496"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa3572.40870\Camera_595934025.js" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3572"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PCD6MQLD\86798[1].zip"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3804"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa3572.39664\Camera_595934025.js" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 692
Read events
1 469
Write events
220
Delete events
3

Modification events

(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{CDF5A2F5-0240-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070B00050008000F003B0037001903
Executable files
5
Suspicious files
341
Text files
273
Unknown types
11

Dropped files

PID
Process
Filename
Type
1560iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
1560iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:
SHA256:
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
1560iexplore.exeC:\Users\admin\AppData\Local\Temp\NDF29F4.tmpbinary
MD5:
SHA256:
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:
SHA256:
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GAZWPQ24\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PCD6MQLD\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CCGJG3VU\down[1]image
MD5:555E83CE7F5D280D7454AF334571FB25
SHA256:70F316A5492848BB8242D49539468830B353DDAA850964DB4E60A6D2D7DB4880
2556iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\NWBJ6396\noConnect[1]image
MD5:3CB8FACCD5DE434D415AB75C17E8FD86
SHA256:6976C426E3AC66D66303C114B22B2B41109A7DE648BA55FFC3E5A53BD0DB09E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
48
DNS requests
5
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2556
iexplore.exe
GET
302
52.116.231.90:80
http://cmokc.com/wp-content/themes/gaukingo/9qph4uxbvqdfzv/wrqqfxwr.php
US
unknown
2556
iexplore.exe
GET
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/Photographic_bg.jpg
US
malicious
2556
iexplore.exe
GET
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/menus_li.png
US
malicious
2556
iexplore.exe
GET
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/footer_bg.png
US
malicious
2556
iexplore.exe
GET
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/img_border.png
US
malicious
2556
iexplore.exe
GET
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/home_icon.png
US
malicious
2556
iexplore.exe
GET
200
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/the_parking_pro.png
US
image
2.72 Kb
malicious
2556
iexplore.exe
GET
200
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/style.css
US
text
3.63 Kb
malicious
2556
iexplore.exe
GET
200
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/btn.png
US
image
1.25 Kb
malicious
2556
iexplore.exe
GET
200
147.139.137.244:80
http://hl19.ukparkingctrl.com/70/assets/top_bg.png
US
html
1.91 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1560
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2556
iexplore.exe
147.139.137.244:80
fy04.ukparkingctrl.com
US
malicious
1000
svchost.exe
52.116.231.90:80
cmokc.com
US
unknown
1000
svchost.exe
134.249.116.78:80
Kyivstar PJSC
UA
suspicious
3804
WScript.exe
111.90.156.64:80
www.highlevelsuccess.monster
MY
malicious
3496
WScript.exe
111.90.156.64:80
www.highlevelsuccess.monster
MY
malicious
784
250608.dat
91.218.114.25:80
Mir Telematiki Ltd
RU
malicious
784
250608.dat
91.218.114.11:80
Mir Telematiki Ltd
RU
malicious
784
250608.dat
91.218.114.26:80
Mir Telematiki Ltd
RU
malicious
784
250608.dat
91.218.114.4:80
Mir Telematiki Ltd
RU
malicious

DNS requests

Domain
IP
Reputation
cmokc.com
  • 52.116.231.90
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
fy04.ukparkingctrl.com
  • 147.139.137.244
malicious
hl19.ukparkingctrl.com
  • 147.139.137.244
malicious
www.highlevelsuccess.monster
  • 111.90.156.64
malicious

Threats

PID
Process
Class
Message
2556
iexplore.exe
Misc activity
ET INFO SUSPICIOUS Single JS file inside of ZIP Download (Observed as lure in malspam campaigns)
3804
WScript.exe
A Network Trojan was detected
ET TROJAN Possible Malicious Macro DL EXE Feb 2016
3804
WScript.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3804
WScript.exe
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
3496
WScript.exe
A Network Trojan was detected
ET TROJAN Possible Malicious Macro DL EXE Feb 2016
784
250608.dat
A Network Trojan was detected
MALWARE [PTsecurity] Maze Ransomware
784
250608.dat
A Network Trojan was detected
MALWARE [PTsecurity] Maze Ransomware
784
250608.dat
A Network Trojan was detected
MALWARE [PTsecurity] Maze Ransomware
784
250608.dat
A Network Trojan was detected
MALWARE [PTsecurity] Maze Ransomware
784
250608.dat
A Network Trojan was detected
MALWARE [PTsecurity] Maze Ransomware
2 ETPRO signatures available at the full report
No debug info