File name:

test.txt

Full analysis: https://app.any.run/tasks/6a6b90de-7b24-4c29-966a-0f191f3af786
Verdict: Malicious activity
Analysis date: December 18, 2018, 09:08:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: text/plain
File info: ASCII text, with no line terminators
MD5:

24FA96F5E9F37377C1C7FAE80BCF7655

SHA1:

09BAABE881A55F4497D63F8CCDAD411721378F47

SHA256:

85D746D7AF0229B33B3C153FBCE99611E17BBC726D43FE4D5FBB93BC896A5F75

SSDEEP:

3:N8Ck3CTwKblLRUFHwFMHEAphvF0OrV:2CkST/ZSSGpp4S

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • xhd.exe (PID: 3268)
      • xhd.exe (PID: 3408)
      • $20,000PDF.exe (PID: 2484)
      • $20,000PDF.exe (PID: 2404)
      • $20,000PDF.exe (PID: 4040)
      • xhd.exe (PID: 2732)
      • xhd.exe (PID: 3276)
      • xhd.exe (PID: 2364)
      • xhd.exe (PID: 3640)
      • $20,000PDF.exe (PID: 2952)
      • $20,000PDF.exe (PID: 3208)
      • xhd.exe (PID: 2808)
      • xhd.exe (PID: 1904)
      • xhd.exe (PID: 4076)
      • xhd.exe (PID: 2632)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2472)
      • $20,000PDF.exe (PID: 2404)
    • Starts CMD.EXE for commands execution

      • chkdsk.exe (PID: 2276)
    • Application launched itself

      • xhd.exe (PID: 2808)
      • WinRAR.exe (PID: 3064)
    • Drop AutoIt3 executable file

      • $20,000PDF.exe (PID: 2404)
  • INFO

    • Reads Internet Cache Settings

      • chrome.exe (PID: 2612)
    • Dropped object may contain Bitcoin addresses

      • xhd.exe (PID: 3408)
      • xhd.exe (PID: 2632)
      • xhd.exe (PID: 2364)
      • xhd.exe (PID: 2808)
      • xhd.exe (PID: 3276)
      • $20,000PDF.exe (PID: 2404)
    • Application launched itself

      • chrome.exe (PID: 2612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
78
Monitored processes
44
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start drop and start notepad.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs chrome.exe no specs winrar.exe chrome.exe no specs winrar.exe no specs $20,000pdf.exe xhd.exe no specs xhd.exe no specs regsvcs.exe no specs chkdsk.exe no specs cmd.exe no specs $20,000pdf.exe no specs xhd.exe no specs xhd.exe no specs regsvcs.exe no specs chkdsk.exe no specs chrome.exe no specs $20,000pdf.exe no specs xhd.exe no specs xhd.exe no specs regsvcs.exe no specs spoolsv.exe no specs $20,000pdf.exe xhd.exe no specs xhd.exe no specs regsvcs.exe no specs help.exe no specs $20,000pdf.exe no specs xhd.exe no specs xhd.exe no specs regsvcs.exe no specs chrome.exe no specs napstat.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Windows\System32\NAPSTAT.EXE"C:\Windows\System32\NAPSTAT.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Access Protection Client UI
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\napstat.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
1904C:\Users\admin\AppData\Local\Temp\12781533\xhd.exe C:\Users\admin\AppData\Local\Temp\12781533\TBQJWC:\Users\admin\AppData\Local\Temp\12781533\xhd.exexhd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\12781533\xhd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2276"C:\Windows\System32\chkdsk.exe"C:\Windows\System32\chkdsk.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Check Disk Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chkdsk.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2348"C:\Windows\System32\chkdsk.exe"C:\Windows\System32\chkdsk.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Check Disk Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chkdsk.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2364"C:\Users\admin\AppData\Local\Temp\12781533\xhd.exe" lst=cjd C:\Users\admin\AppData\Local\Temp\12781533\xhd.exe$20,000PDF.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\12781533\xhd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2400"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa3064.13434\$20,000PDF.zipC:\Program Files\WinRAR\WinRAR.exeWinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2404"C:\Users\admin\AppData\Local\Temp\Rar$EXa2472.13962\$20,000PDF.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2472.13962\$20,000PDF.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2472.13962\$20,000pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2472"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa3064.13147\$20,000PDF.zipC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2484"C:\Users\admin\Desktop\$20,000PDF.exe" C:\Users\admin\Desktop\$20,000PDF.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
10
Modules
Images
c:\users\admin\desktop\$20,000pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2548"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exexhd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
Total events
3 921
Read events
3 812
Write events
106
Delete events
3

Modification events

(PID) Process:(2684) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2612-13189597715130250
Value:
259
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3516-13180984670829101
Value:
0
(PID) Process:(2612) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
(PID) Process:(2612) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2612-13189597715130250
Value:
259
Executable files
2
Suspicious files
60
Text files
131
Unknown types
0

Dropped files

PID
Process
Filename
Type
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\482f4e35-356e-4d9d-a4b2-20e99cb2c8d0.tmp
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\9b1c76dc-94b4-4708-9a6f-b0a9e76a37bd.tmp
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\e6622492fa163609ddd4212f54512baa07929ed3\caecb3bd-7969-4305-84d6-3a376453ec73\index-dir\temp-index
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF2475fc.TMPtext
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.oldtext
MD5:
SHA256:
2612chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF24760b.TMPtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
23
DNS requests
15
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2612
chrome.exe
216.58.206.3:443
www.google.de
Google Inc.
US
whitelisted
2612
chrome.exe
172.217.22.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2612
chrome.exe
172.217.16.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2612
chrome.exe
216.58.207.35:443
www.gstatic.com
Google Inc.
US
whitelisted
2612
chrome.exe
13.107.42.13:443
onedrive.live.com
Microsoft Corporation
US
malicious
2612
chrome.exe
64.233.166.196:443
apis.google.com
Google Inc.
US
unknown
2612
chrome.exe
13.107.42.12:443
jthsfw.am.files.1drv.com
Microsoft Corporation
US
suspicious
2612
chrome.exe
172.217.22.68:443
www.google.com
Google Inc.
US
whitelisted
2612
chrome.exe
172.217.22.78:443
sb-ssl.google.com
Google Inc.
US
whitelisted
2612
chrome.exe
172.217.18.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.22.3
whitelisted
www.google.de
  • 216.58.206.3
whitelisted
www.gstatic.com
  • 216.58.207.35
whitelisted
safebrowsing.googleapis.com
  • 172.217.16.202
whitelisted
accounts.google.com
  • 172.217.21.237
shared
ssl.gstatic.com
  • 216.58.206.3
whitelisted
apis.google.com
  • 64.233.166.196
whitelisted
onedrive.live.com
  • 13.107.42.13
shared
jthsfw.am.files.1drv.com
  • 13.107.42.12
whitelisted
www.google.com
  • 172.217.22.68
malicious

Threats

No threats detected
No debug info