File name: | TNT_Collection_Request_BH7_178845.zip |
Full analysis: | https://app.any.run/tasks/0d1becea-e9ee-4c56-b0df-c2a4aea9da9b |
Verdict: | Malicious activity |
Analysis date: | September 19, 2019, 07:09:48 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 62D4932BBA98708223CB31987DF59390 |
SHA1: | F0E54C1998FBB34F9BBD9971DE80D17CA57E6FD6 |
SHA256: | A34435D2621A56F97738527F1E86C49E50C558F593B8192DC032E2ED0D887C6F |
SSDEEP: | 1536:pSa/Id/5/dh1o89V9ozmMJQn0yD8k8n2MOLWSc9mFLCi1WqCDb35suGLUVXn7LkZ:pSgIrVjb5MSnl8nQp7Wz35suGZ/EA/ |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | - |
ZipCompression: | Deflated |
ZipModifyDate: | 2019:09:18 23:02:08 |
ZipCRC: | 0x7114714f |
ZipCompressedSize: | 95122 |
ZipUncompressedSize: | 238855 |
ZipFileName: | TNT Collection Request BH7 178845.js |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2908 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\TNT_Collection_Request_BH7_178845.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
3020 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\TNT Collection Request BH7 178845.js" | C:\Windows\System32\WScript.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
2368 | "C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\YLFuizCVuT.js" | C:\Windows\System32\wscript.exe | WScript.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 | ||||
3928 | "C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\TNT Collection Request BH7 178845.js" | C:\Windows\System32\wscript.exe | WScript.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 | ||||
3336 | "C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\YLFuizCVuT.js" | C:\Windows\System32\wscript.exe | — | wscript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 1 Version: 5.8.7600.16385 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2908 | WinRAR.exe | C:\Users\admin\Desktop\TNT Collection Request BH7 178845.js | text | |
MD5:B28DED06BD8BF831365F48823C0B06F6 | SHA256:382A31D812736E03A8F6310EF0C6CF0864610C4E4AF103F298E1594C357EC09A | |||
3928 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat | dat | |
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862 | SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A | |||
3928 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TNT Collection Request BH7 178845.js | text | |
MD5:B28DED06BD8BF831365F48823C0B06F6 | SHA256:382A31D812736E03A8F6310EF0C6CF0864610C4E4AF103F298E1594C357EC09A | |||
2368 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YLFuizCVuT.js | text | |
MD5:2643400553598F91F4B38591042083EC | SHA256:DB9CAE56ED65104978DCBB62BB92A3FFC11FD78F14871A5E53B277258571AC9B | |||
3020 | WScript.exe | C:\Users\admin\AppData\Roaming\YLFuizCVuT.js | text | |
MD5:2643400553598F91F4B38591042083EC | SHA256:DB9CAE56ED65104978DCBB62BB92A3FFC11FD78F14871A5E53B277258571AC9B | |||
3020 | WScript.exe | C:\Users\admin\AppData\Local\Temp\TNT Collection Request BH7 178845.js | text | |
MD5:B28DED06BD8BF831365F48823C0B06F6 | SHA256:382A31D812736E03A8F6310EF0C6CF0864610C4E4AF103F298E1594C357EC09A | |||
3020 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TNT Collection Request BH7 178845.js | text | |
MD5:B28DED06BD8BF831365F48823C0B06F6 | SHA256:382A31D812736E03A8F6310EF0C6CF0864610C4E4AF103F298E1594C357EC09A |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3928 | wscript.exe | 185.194.141.58:80 | ip-api.com | netcup GmbH | DE | unknown |
3928 | wscript.exe | 43.252.213.38:2813 | 2813.noip.me | Exa Bytes Network Sdn.Bhd. | MY | unknown |
2368 | wscript.exe | 45.79.48.200:7757 | pluginsrv1.duckdns.org | Linode, LLC | US | malicious |
Domain | IP | Reputation |
---|---|---|
pluginsrv1.duckdns.org |
| malicious |
ip-api.com |
| shared |
2813.noip.me |
| malicious |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |