analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

JitsiMeetOutlook-install-script.bat

Full analysis: https://app.any.run/tasks/900c8aa3-b996-4751-a3e2-fb45b2b09d51
Verdict: Malicious activity
Analysis date: October 20, 2020, 10:17:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text
MD5:

A7ABB1A8DCE9390D894675EBAE1F81F3

SHA1:

740DBA459CF67677534DE118C4CFEAE0B460D974

SHA256:

8D64D0230CC3121030665F9A016A202828D6DF5C5A1ACCCEE9A25CD4F7E51631

SSDEEP:

24:jmq96ol2SbBltDwEdlnE0+AFP0+ME0++Yu/t/WTYQTRWWgP9iLXnY3K23A5pcXDw:Kq95H5du5S5v5G9WcQT4WgliLXnY3BUz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 1700)
      • cmd.exe (PID: 2284)
  • SUSPICIOUS

    • Starts Microsoft Installer

      • cmd.exe (PID: 2284)
      • cmd.exe (PID: 1700)
    • Creates files in the user directory

      • powershell.exe (PID: 3644)
      • powershell.exe (PID: 2636)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 1700)
      • OUTLOOK.EXE (PID: 860)
    • Reads internet explorer settings

      • OUTLOOK.EXE (PID: 860)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 860)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 860)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 860)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs powershell.exe no specs msiexec.exe no specs msiexec.exe no specs cmd.exe powershell.exe no specs msiexec.exe no specs outlook.exe

Process information

PID
CMD
Path
Indicators
Parent process
2284cmd /c ""C:\Users\admin\Desktop\JitsiMeetOutlook-install-script.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2636Powershell -ExecutionPolicy Bypass -Command "& 'C:\Users\admin\AppData\Local\Temp\~tmpDlFile.ps1'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2368msiexec /i "C:\Users\admin\AppData\Local\Temp\jmo.msi" TARGETDIR="C:\Program Files\Jitsi Meet Outlook" DOMAIN="domain:port" ROOMID="default_room" REQNAME="False" NOAUDIO="False" NOVIDEO="False" LANG="en" /passiveC:\Windows\system32\msiexec.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1619
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3744C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
1700"C:\Windows\System32\cmd.exe" /C "C:\Users\admin\Desktop\JitsiMeetOutlook-install-script.bat" C:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3644Powershell -ExecutionPolicy Bypass -Command "& 'C:\Users\admin\AppData\Local\Temp\~tmpDlFile.ps1'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3292msiexec /i "C:\Users\admin\AppData\Local\Temp\jmo.msi" TARGETDIR="C:\Program Files\Jitsi Meet Outlook" DOMAIN="domain:port" ROOMID="default_room" REQNAME="False" NOAUDIO="False" NOVIDEO="False" LANG="en" /passiveC:\Windows\system32\msiexec.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
1619
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
860"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Total events
2 617
Read events
1 849
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
38
Unknown types
2

Dropped files

PID
Process
Filename
Type
2636powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2H7EWUCUE7MJ0IAF6JKO.temp
MD5:
SHA256:
3644powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GJMT3FP2QBRTID31VVL8.temp
MD5:
SHA256:
860OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR96A7.tmp.cvr
MD5:
SHA256:
860OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CYWUP4P6X3UZVF64SPT8.temp
MD5:
SHA256:
2636powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
860OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:E461C001266383987ACC9AC96A407F0E
SHA256:C8ED3C48FF871AA9EB315D0C36D29B185BEE8DE010134BCC260D498E6C1E2276
3644powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2d6e4f.TMPbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
2636powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2d3fad.TMPbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
2284cmd.exeC:\Users\admin\AppData\Local\Temp\~tmpDlFile.ps1text
MD5:FB57B4BD34385CCB320E3A716B5559FB
SHA256:A62ED25D7DC537E4AA822976148CE09BA5500F431E44A0365CF371CF635CA25E
3644powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
860
OUTLOOK.EXE
GET
404
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
xml
345 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info