analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://drive.google.com/uc?id=1pixgO0gnuvNCaE0OSGZ2isAEWzCQ0835&export=download&authuser=0

Full analysis: https://app.any.run/tasks/9580d42d-1a3c-426c-b520-745a7f698914
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: March 21, 2019, 21:59:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
dunihi
Indicators:
MD5:

03E7D004BA8D0723C678DEB094C25EB4

SHA1:

C27C2B74C23320CA44201031BD431A16FA161C3A

SHA256:

9F5426179ED69967E53CB9B2F0616328514ECF86949ACEA05D0C95336B936D69

SSDEEP:

3:N8PMMtZJu2NMu6Nkmbq2wHWYKX1CaIn:2A2H+j2XKXMjn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • WScript.exe (PID: 764)
      • wscript.exe (PID: 3952)
      • wscript.exe (PID: 2532)
    • Writes to a start menu file

      • WScript.exe (PID: 764)
      • wscript.exe (PID: 3952)
      • wscript.exe (PID: 2532)
    • DUNIHI was detected

      • wscript.exe (PID: 2532)
    • Connects to CnC server

      • wscript.exe (PID: 2532)
  • SUSPICIOUS

    • Executes scripts

      • WinRAR.exe (PID: 2716)
      • WScript.exe (PID: 764)
      • wscript.exe (PID: 2532)
    • Creates files in the user directory

      • WScript.exe (PID: 764)
      • wscript.exe (PID: 3952)
    • Application launched itself

      • WScript.exe (PID: 764)
      • wscript.exe (PID: 2532)
    • Connects to unusual port

      • wscript.exe (PID: 2532)
      • wscript.exe (PID: 3952)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 1880)
    • Changes internet zones settings

      • iexplore.exe (PID: 1880)
    • Creates files in the user directory

      • iexplore.exe (PID: 2236)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2236)
      • iexplore.exe (PID: 1880)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2236)
      • iexplore.exe (PID: 1880)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1880)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe winrar.exe no specs wscript.exe wscript.exe #DUNIHI wscript.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1880"C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/uc?id=1pixgO0gnuvNCaE0OSGZ2isAEWzCQ0835&export=download&authuser=0C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2236"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1880 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2716"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MPR3OMNE\copia_en_PDF_del_ESTADO_N__11_del_21_de_marzo_del_2019[1].rar"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
764"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa2716.11112\copia en PDF del ESTADO Nº 11 del 21 de marzo del 2019.vbs" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3952"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\hiPtwUXMlP.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
2532"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\copia en PDF del ESTADO Nº 11 del 21 de marzo del 2019.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
1896"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\hiPtwUXMlP.vbs"C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.8.7600.16385
Total events
1 557
Read events
1 391
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
20
Unknown types
5

Dropped files

PID
Process
Filename
Type
1880iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
1880iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2236iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@google[1].txt
MD5:
SHA256:
1880iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF3B03781C0FE66826.TMP
MD5:
SHA256:
1880iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF33984557F0588A2E.TMP
MD5:
SHA256:
1880iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{A0BD3E65-4C24-11E9-A302-5254004A04AF}.dat
MD5:
SHA256:
2236iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:C1386CACCC332050D6201FBDF2C3A88C
SHA256:6B53A870CCDC0F4EBB7D0ED6F3516038C339991F70831108A7E983DDD091E14A
2236iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:52AC91AF23AE8D56A55B5D6DE049E2BE
SHA256:A4045691F6DD7BE2B7E3A275A14853A27ACF57F8292B18096D18FB09C434DB08
1880iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{A0BD3E66-4C24-11E9-A302-5254004A04AF}.datbinary
MD5:C7449F0FE1FF653D54223FB7FDD70F9D
SHA256:8A26F4B7E5E90D130C2CA317F39C9049742951A41C489299AC45DB02CFC4579B
2236iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@google[2].txttext
MD5:3EE8B982630092DF796703CF11CC5DBB
SHA256:D3DE88FD38774B3E328F11F5759761E3CD4AFE393436A2B9DC901899BA11C167
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
27
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2532
wscript.exe
POST
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
2532
wscript.exe
POST
200
186.85.86.77:2012
http://marzo12.duckdns.org:2012/is-ready
CO
text
12 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2236
iexplore.exe
172.217.18.174:443
drive.google.com
Google Inc.
US
whitelisted
1880
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2532
wscript.exe
186.85.86.77:2012
marzo12.duckdns.org
Telmex Colombia S.A.
CO
malicious
3952
wscript.exe
194.5.98.150:7789
brothersjoy.nl
FR
malicious
2236
iexplore.exe
172.217.18.97:443
doc-14-4c-docs.googleusercontent.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
drive.google.com
  • 172.217.18.174
shared
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
doc-14-4c-docs.googleusercontent.com
  • 172.217.18.97
shared
marzo12.duckdns.org
  • 186.85.86.77
malicious
brothersjoy.nl
  • 194.5.98.150
unknown

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2532
wscript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2532
wscript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
2532
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2532
wscript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
No debug info