File name: | new 1.js |
Full analysis: | https://app.any.run/tasks/e1d45298-21f2-46d6-89ca-1251a29fe53c |
Verdict: | Malicious activity |
Analysis date: | March 21, 2019, 16:37:31 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/x-c |
File info: | C source, ASCII text, with CRLF line terminators |
MD5: | BE3540796CD83AC58DF19411ED3365FA |
SHA1: | 7F7A3E8F0DDBE733A0563A49586CEAE1036011D4 |
SHA256: | 863A3D845F81A6FA5FDC56B0C6518F12C1661F5599C6E34FD172E33C4B269F14 |
SSDEEP: | 24:TBL3g7PZlQfCA899n+4RuWh0uZ+PSQqjf750uqvIDEO0Ypv0KT9:VkZY8RQWP+aQqjf7kwDEO1z9 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2824 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\new 1.js" | C:\Windows\System32\WScript.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
3612 | attrib -H "C:\Users\admin\AppData\Roaming\stub.exe" | C:\Windows\System32\attrib.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3588 | attrib +H "C:\Users\admin\AppData\Roaming\stub.exe" | C:\Windows\System32\attrib.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3668 | cmd /Q /V:OFF /C call "C:\Users\admin\AppData\Roaming\stub.exe" >nul | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3176 | "C:\Windows\system32\ntvdm.exe" | C:\Windows\system32\ntvdm.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: NTVDM.EXE Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3176 | ntvdm.exe | C:\Users\admin\AppData\Local\Temp\scsB2D.tmp | — | |
MD5:— | SHA256:— | |||
3176 | ntvdm.exe | C:\Users\admin\AppData\Local\Temp\scsB3E.tmp | — | |
MD5:— | SHA256:— | |||
2824 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@discordapp[1].txt | text | |
MD5:2919259021262D75E75B227CCF6E270D | SHA256:155F83C1C5F70FF51873888402085539169F510CDD2386980865C52D946F48BE | |||
2824 | WScript.exe | C:\Users\admin\AppData\Roaming\stub.exe | xml | |
MD5:B8881A7614D909FB4A540CD68CA9BA13 | SHA256:4887CB5ABEEE80F7933EB85FC53704676432552E88FC3B106C90CB165AF50871 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2824 | WScript.exe | 104.16.10.231:443 | cdn.discordapp.com | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
cdn.discordapp.com |
| shared |