| File name: | _N0O01l8BO0O8381.cmd |
| Full analysis: | https://app.any.run/tasks/c9539278-e433-4848-81b1-ae2b00d77147 |
| Verdict: | Malicious activity |
| Analysis date: | May 15, 2019, 17:45:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/x-msdos-batch |
| File info: | DOS batch file, ISO-8859 text, with very long lines, with CRLF line terminators |
| MD5: | B0E1DE528DE66B8814B592F59D369BC4 |
| SHA1: | 279EF267EA431AC45C010219116F2656F1ADF072 |
| SHA256: | A6B73FD48EFB5D1A39E66F82E1A3E54A7D8B3B358C9E2670F0C362287B72FA1E |
| SSDEEP: | 192:xbHzAH3Igua29yM3U3pkmO+mfha7CW+xVZnnY3lnKqygEV5bvyy+gmS14wcMtwlR:9ToYJLWkA6xVKMqPEVpLvAGbZXmX9 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 344 | "C:\Windows\system32\cmd.exe" /c start C:\Users\admin\admin\gChqsp_33134.exe C:\Users\admin\admin\hiFLdjE_148548 C:\Users\admin\admin\itdMAktY_0507336 | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1256 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2104 | cmd /c ""C:\Users\admin\AppData\Local\Temp\_N0O01l8BO0O8381.cmd" " | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2556 | chcp 708 | C:\Windows\system32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3108 | cmd /c ""C:\Users\admin\AppData\Local\Temp\_N0O01l8BO0O8381.cmd" " | C:\Windows\system32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3208 | ping 127.0.0.1 -n 1 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3460 | C:\Users\admin\admin\gChqsp_33134.exe C:\Users\admin\admin\hiFLdjE_148548 C:\Users\admin\admin\itdMAktY_0507336 | C:\Users\admin\admin\gChqsp_33134.exe | — | cmd.exe | |||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script Exit code: 0 Version: 3, 3, 14, 2 Modules
| |||||||||||||||
| 3772 | wscript //Nologo "C:\Users\admin\admin.vbs" nVvUo8U5ZJXzmCWyhoZ9tR4kXZG25gdHhu8c1NKtFl3yQNOERm | C:\Windows\system32\wscript.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3832 | C:\Windows\system32\cmd.exe /c chcp | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 4040 | chcp | C:\Windows\system32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1256) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\62\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1256) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\62\52C64B7E |
| Operation: | write | Name: | @C:\Windows\System32\wshext.dll,-4802 |
Value: VBScript Script File | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3772 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\eVVSdDaSAMLJNC07JJB08NJJIKH955D72Aa6D8[1].txt | — | |
MD5:— | SHA256:— | |||
| 2104 | cmd.exe | C:\Users\admin\admin.vbs | text | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\admin\hiFLdjE_148548 | a3x | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\admin\LSMNAIIRK6WISVSMG584YPOM9X9MCRSGK | a3x | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\admin\XIJDZQOK15QMCL052M2XKV7ISVEOZ3MLZAQ | executable | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\admin\itdMAktY_0507336.dll | executable | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cHVlFvgtaM0aA971JBa0HCIA32H3N8MHI8IF59.LNK | lnk | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\Gr0t1ll[1].zip | compressed | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\fhfj5nriop.zip | compressed | |
MD5:— | SHA256:— | |||
| 3772 | wscript.exe | C:\Users\admin\admin\JP7475XSM7AOESQL0BD3ZLQQBZ5QFCSQPIGQN6 | executable | |
MD5:B06E67F9767E5023892D9698703AD098 | SHA256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3772 | wscript.exe | GET | 200 | 91.242.161.63:80 | http://cond.ib-a.ru//sites/default/private/Gr0t1ll.zip | RU | compressed | 8.14 Mb | malicious |
3772 | wscript.exe | POST | 200 | 91.242.161.63:80 | http://cond.ib-a.ru//sites/default/private/eVVSdDaSAMLJNC07JJB08NJJIKH955D72Aa6D8.txt | RU | text | 313 b | malicious |
3772 | wscript.exe | POST | 200 | 13.211.188.17:80 | http://13.211.188.17/c/conta.php | AU | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3772 | wscript.exe | 91.242.161.63:80 | cond.ib-a.ru | Web3tel msk OOO | RU | malicious |
3772 | wscript.exe | 13.211.188.17:80 | — | Amazon.com, Inc. | AU | unknown |
Domain | IP | Reputation |
|---|---|---|
cond.ib-a.ru |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3772 | wscript.exe | A Network Trojan was detected | MALWARE [PTsecurity] Virus.vbs.qexvmc (N40/KLBanker) |