download:

nijtkikjkkkhkhklkpkpjtkikjklkkkokpknjtlwjtkikjkkkhkhklkpkpjtkikjklkkkokpknjtkhjtkikpkqknkmkqov

Full analysis: https://app.any.run/tasks/fbd576df-48eb-438d-a393-8b3b5e836f80
Verdict: Malicious activity
Analysis date: June 04, 2019, 21:10:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5:

CF0547F87055D97CE56986FCCC2B66D9

SHA1:

541D4CBCBCE0C9C8BEE3A8DDC22FEA473868EA28

SHA256:

70210F34EE310467044D7CFD00856BBD1E530DB5B69DBCBBA0AE57FA1536ECF5

SSDEEP:

96:GfuC58VULmDfjvKn2tAcyQgsVkMt/TbApEpquRlXtr2Z9AHgQ75ozpz0YRv:G2C2VrDfzw2ycyQg6kuT1/rG9m7529n1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • ehRec.exe (PID: 2884)
      • ehshell.exe (PID: 3032)
  • SUSPICIOUS

    • Creates files in the Windows directory

      • ehRec.exe (PID: 2884)
    • Executed via COM

      • ehRec.exe (PID: 2884)
    • Creates files in the program directory

      • ehshell.exe (PID: 3032)
    • Creates files in the user directory

      • EhTray.exe (PID: 1928)
      • ehshell.exe (PID: 3032)
      • wmplayer.exe (PID: 792)
    • Executed as Windows Service

      • ehsched.exe (PID: 2604)
  • INFO

    • Manual execution by user

      • EhTray.exe (PID: 1928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

EXIF

HTML

Title: Opt-Out
Robots: noindex,nofollow,noarchive
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start rundll32.exe no specs ehshell.exe wmplayer.exe ehsched.exe no specs ehtray.exe no specs ehrec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
792"C:\Program Files\Windows Media Player\wmplayer.exe" /SkipFUE /RemoteOCXLaunch /SuppressDialogsC:\Program Files\Windows Media Player\wmplayer.exe
ehshell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmplayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1928"C:\Windows\eHome\EhTray.exe" /nav:-2C:\Windows\eHome\EhTray.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Center
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\ehome\ehtray.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2604C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Media Center Scheduler Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\ehome\ehsched.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2884C:\Windows\ehome\ehRec.exe -EmbeddingC:\Windows\ehome\ehRec.exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Media Center Host Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\ehome\ehrec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3032"C:\Windows\eHome\ehshell.exe" "C:\Users\admin\AppData\Local\Temp\nijtkikjkkkhkhklkpkpjtkikjklkkkokpknjtlwjtkikjkkkhkhklkpkpjtkikjklkkkokpknjtkhjtkikpkqknkmkqov"C:\Windows\eHome\ehshell.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Center
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\ehome\ehshell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3372"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\nijtkikjkkkhkhklkpkpjtkikjklkkkokpknjtlwjtkikjkkkhkhklkpkpjtkikjklkkkokpknjtkhjtkikpkqknkmkqovC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
1 484
Read events
1 113
Write events
371
Delete events
0

Modification events

(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\mspaint.exe
Value:
Paint
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\NOTEPAD.EXE
Value:
Notepad
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\PROGRA~1\MICROS~1\Office14\OIS.EXE
Value:
Microsoft Office 2010
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Opera\Opera.exe
Value:
Opera Internet Browser
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Windows Photo Viewer\PhotoViewer.dll
Value:
Windows Photo Viewer
(PID) Process:(3372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\VideoLAN\VLC\vlc.exe
Value:
VLC media player
Executable files
0
Suspicious files
4
Text files
20
Unknown types
3

Dropped files

PID
Process
Filename
Type
1928EhTray.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S8HM27G5Z6EWQ4ZMJZ7O.temp
MD5:
SHA256:
792wmplayer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CNOHLLE9N309AG1XPAK7.temp
MD5:
SHA256:
1928EhTray.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3W0WTI9BNBA46D882YY5.temp
MD5:
SHA256:
3032ehshell.exeC:\ProgramData\Microsoft\eHome\logs\FirstRun.logxml
MD5:
SHA256:
792wmplayer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-msbinary
MD5:
SHA256:
3032ehshell.exeC:\ProgramData\Microsoft\eHome\logs\~ehshell.exe.3032.sqmsqm
MD5:
SHA256:
792wmplayer.exeC:\Users\Public\Music\Sample Music\AlbumArtSmall.jpgimage
MD5:
SHA256:
792wmplayer.exeC:\Users\Public\Music\Sample Music\Folder.jpgimage
MD5:
SHA256:
792wmplayer.exeC:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Large.jpgimage
MD5:
SHA256:
792wmplayer.exeC:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Small.jpgimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
792
wmplayer.exe
GET
302
2.16.186.41:80
http://redir.metaservices.microsoft.com/redir/allservices/?sv=5&locale=409&geoid=f4&version=12.0.7601.17514&userlocale=409
unknown
whitelisted
792
wmplayer.exe
GET
200
2.16.186.90:80
http://onlinestores.metaservices.microsoft.com/serviceswitching/AllServices.aspx?sv=5&locale=409&geoid=f4&version=12.0.7601.17514&userlocale=409
unknown
xml
546 b
whitelisted
792
wmplayer.exe
GET
200
2.16.186.90:80
http://onlinestores.metaservices.microsoft.com/bing/bing.xml?locale=409&geoid=f4&version=12.0.7601.17514&userlocale=409
unknown
text
523 b
whitelisted
792
wmplayer.exe
GET
200
2.16.186.64:80
http://images.windowsmedia.com/svcswitch/media_guide_16x16.png
unknown
image
897 b
whitelisted
792
wmplayer.exe
GET
200
2.16.186.64:80
http://images.windowsmedia.com/svcswitch/mg4_wmp12_30x30_2.png
unknown
image
2.00 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
792
wmplayer.exe
2.16.186.41:80
redir.metaservices.microsoft.com
Akamai International B.V.
whitelisted
792
wmplayer.exe
2.16.186.90:80
onlinestores.metaservices.microsoft.com
Akamai International B.V.
whitelisted
792
wmplayer.exe
2.16.186.64:80
images.windowsmedia.com
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
redir.metaservices.microsoft.com
  • 2.16.186.41
  • 2.16.186.11
whitelisted
onlinestores.metaservices.microsoft.com
  • 2.16.186.90
  • 2.16.186.98
whitelisted
images.windowsmedia.com
  • 2.16.186.64
  • 2.16.186.99
whitelisted

Threats

No threats detected
Process
Message
ehshell.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
ehshell.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cppĒ
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
ehshell.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
ehshell.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144