| File name: | obamka.js |
| Full analysis: | https://app.any.run/tasks/27eb2089-5df2-4b56-ab86-b0150ec382cb |
| Verdict: | Malicious activity |
| Analysis date: | September 18, 2021, 21:40:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines, with no line terminators |
| MD5: | EEF977108C7A7AEF512532CC6E2F49CC |
| SHA1: | 7273BF0DB30A12428F7046EF99EBE3E7472CDFBE |
| SHA256: | 884E96A75DC568075E845CCAC2D4B4CCEC68017E6EF258C7C03DA8C88A597534 |
| SSDEEP: | 6144:9ifWwIb7L3vMTk69b9wwU5oyISUiuH4CgzO/NAgpD8TAVL3QGGv14nzUmviNu:cWwIb7ATki9wwyoVSUQCgwNdwML3K2 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 724 | C:\Windows\system32\net1 session | C:\Windows\system32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 760 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.2.9200.16398 (win8_gdr_oobssr.120820-1900) Modules
| |||||||||||||||
| 796 | "C:\Windows\System32\wscript.exe" C:\Users\admin\AppData\Local\Temp\obamka.js | C:\Windows\System32\wscript.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft � Windows Based Script Host Exit code: 1 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 892 | "C:\Windows\System32\sc.exe" config upnphost start= auto | C:\Windows\System32\sc.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 996 | "C:\Windows\System32\sc.exe" config SstpSvc start= disabled | C:\Windows\System32\sc.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1032 | "C:\Windows\System32\cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin | C:\Windows\System32\cmd.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1076 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Get-CimInstance Win32_ShadowCopy | Remove-CimInstance | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.2.9200.16398 (win8_gdr_oobssr.120820-1900) Modules
| |||||||||||||||
| 1164 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft� Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1224 | "C:\Windows\System32\sc.exe" config fdPHost start= auto | C:\Windows\System32\sc.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1448 | "mountvol.exe" | C:\Windows\System32\mountvol.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Mount Volume Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (796) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (796) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (796) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (796) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2516) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2516) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2516) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2516) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2516) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework |
| Operation: | write | Name: | ETWEnabled |
Value: 0 | |||
| (PID) Process: | (2208) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1656 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESF1D9.tmp | o | |
MD5:— | SHA256:— | |||
| 1940 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC3B5622821D547FBA98D8E54AB4DA0C.TMP | res | |
MD5:— | SHA256:— | |||
| 2908 | cscript.exe | C:\Users\admin\AppData\Local\Temp\svfuyzqv.cmdline | text | |
MD5:— | SHA256:— | |||
| 1940 | csc.exe | C:\Users\admin\AppData\Local\Temp\svfuyzqv.dll | executable | |
MD5:— | SHA256:— | |||
| 1940 | csc.exe | C:\Users\admin\AppData\Local\Temp\svfuyzqv.out | text | |
MD5:— | SHA256:— | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YWKLCTJIK70V019MD6WV.temp | binary | |
MD5:— | SHA256:— | |||
| 2908 | cscript.exe | C:\Users\admin\AppData\Local\Temp\svfuyzqv.0.cs | text | |
MD5:42BE26B2C8233637DA81DE8E467FDEA3 | SHA256:45DC235FED868D5710F0B37D699A2D35E22F727EA8EEB3175B5092D77AEB8FFD | |||
| 2516 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Google.url | text | |
MD5:1E7E5E93C2A5AADAF932F93D25C57F3E | SHA256:8B94D04FECE582E4182E8E73F46FB86EB8E965C69C526C42805ABB9E43641E35 | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFff63e.TMP | binary | |
MD5:— | SHA256:— | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2908 | cscript.exe | GET | — | 45.9.148.114:80 | http://45.9.148.114/forest.png | unknown | — | — | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2908 | cscript.exe | 45.9.148.114:80 | — | — | — | suspicious |
PID | Process | Class | Message |
|---|---|---|---|
2908 | cscript.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 2 |