File name: | _N0O01l8BO0O8381.cmd |
Full analysis: | https://app.any.run/tasks/c9539278-e433-4848-81b1-ae2b00d77147 |
Verdict: | Malicious activity |
Analysis date: | May 15, 2019, 17:45:37 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/x-msdos-batch |
File info: | DOS batch file, ISO-8859 text, with very long lines, with CRLF line terminators |
MD5: | B0E1DE528DE66B8814B592F59D369BC4 |
SHA1: | 279EF267EA431AC45C010219116F2656F1ADF072 |
SHA256: | A6B73FD48EFB5D1A39E66F82E1A3E54A7D8B3B358C9E2670F0C362287B72FA1E |
SSDEEP: | 192:xbHzAH3Igua29yM3U3pkmO+mfha7CW+xVZnnY3lnKqygEV5bvyy+gmS14wcMtwlR:9ToYJLWkA6xVKMqPEVpLvAGbZXmX9 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3108 | cmd /c ""C:\Users\admin\AppData\Local\Temp\_N0O01l8BO0O8381.cmd" " | C:\Windows\system32\cmd.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3832 | C:\Windows\system32\cmd.exe /c chcp | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
4040 | chcp | C:\Windows\system32\chcp.com | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2556 | chcp 708 | C:\Windows\system32\chcp.com | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2104 | cmd /c ""C:\Users\admin\AppData\Local\Temp\_N0O01l8BO0O8381.cmd" " | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3208 | ping 127.0.0.1 -n 1 | C:\Windows\system32\PING.EXE | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3772 | wscript //Nologo "C:\Users\admin\admin.vbs" nVvUo8U5ZJXzmCWyhoZ9tR4kXZG25gdHhu8c1NKtFl3yQNOERm | C:\Windows\system32\wscript.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
4060 | chcp 437 | C:\Windows\system32\chcp.com | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1256 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Version: 7.00.7600.16385 (win7_rtm.090713-1255) | ||||
344 | "C:\Windows\system32\cmd.exe" /c start C:\Users\admin\admin\gChqsp_33134.exe C:\Users\admin\admin\hiFLdjE_148548 C:\Users\admin\admin\itdMAktY_0507336 | C:\Windows\system32\cmd.exe | — | wscript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
(PID) Process: | (1256) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\62\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (1256) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\62\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\wshext.dll,-4802 |
Value: VBScript Script File | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3772) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2104 | cmd.exe | C:\Users\admin\admin.vbs | text | |
MD5:CB114CF9BA426A3492ECD785FA70802D | SHA256:BD42331E5FF6199505480E831EC5A52A73FA51EA31AFBC5DC5CFB280B47275AC | |||
3772 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\eVVSdDaSAMLJNC07JJB08NJJIKH955D72Aa6D8[1].txt | — | |
MD5:— | SHA256:— | |||
3772 | wscript.exe | C:\Users\admin\admin\hiFLdjE_148548 | a3x | |
MD5:103E4C6F7BCDFF479D475FBD38DCB3A8 | SHA256:0B949CDB817573AF7D0C1971F769E75166B7BDC3DA60EC8183EF7E268E6940ED | |||
3772 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cHVlFvgtaM0aA971JBa0HCIA32H3N8MHI8IF59.LNK | lnk | |
MD5:90697DDD309CB30E5544E62D8AAA8E85 | SHA256:79574EB73DCF605EDFF28831FFD399DF8B65A4C8C70F50790141C7AEC8F47783 | |||
3772 | wscript.exe | C:\Users\admin\admin\LSMNAIIRK6WISVSMG584YPOM9X9MCRSGK | a3x | |
MD5:103E4C6F7BCDFF479D475FBD38DCB3A8 | SHA256:0B949CDB817573AF7D0C1971F769E75166B7BDC3DA60EC8183EF7E268E6940ED | |||
3772 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat | dat | |
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862 | SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A | |||
3772 | wscript.exe | C:\Users\admin\admin\itdMAktY_0507336.dll | executable | |
MD5:0BC596581080DFBC0F2E34FE17F27CED | SHA256:2548715C2B628D1AB08BF192A4EF33DF45F9B41AA2799004FED7A26603B3BBB7 | |||
3772 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\Gr0t1ll[1].zip | compressed | |
MD5:70C0C1486FBA4B6F7649A720A55FB0C7 | SHA256:FD651384EBD6B4E067F1827317B5FF5EE1A16DE25BB9CF9D31E30233C9A8A61C | |||
3772 | wscript.exe | C:\Users\admin\admin\XIJDZQOK15QMCL052M2XKV7ISVEOZ3MLZAQ | executable | |
MD5:0BC596581080DFBC0F2E34FE17F27CED | SHA256:2548715C2B628D1AB08BF192A4EF33DF45F9B41AA2799004FED7A26603B3BBB7 | |||
3772 | wscript.exe | C:\Users\admin\fhfj5nriop.zip | compressed | |
MD5:70C0C1486FBA4B6F7649A720A55FB0C7 | SHA256:FD651384EBD6B4E067F1827317B5FF5EE1A16DE25BB9CF9D31E30233C9A8A61C |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3772 | wscript.exe | POST | 200 | 13.211.188.17:80 | http://13.211.188.17/c/conta.php | AU | — | — | unknown |
3772 | wscript.exe | POST | 200 | 91.242.161.63:80 | http://cond.ib-a.ru//sites/default/private/eVVSdDaSAMLJNC07JJB08NJJIKH955D72Aa6D8.txt | RU | text | 313 b | malicious |
3772 | wscript.exe | GET | 200 | 91.242.161.63:80 | http://cond.ib-a.ru//sites/default/private/Gr0t1ll.zip | RU | compressed | 8.14 Mb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3772 | wscript.exe | 13.211.188.17:80 | — | Amazon.com, Inc. | AU | unknown |
3772 | wscript.exe | 91.242.161.63:80 | cond.ib-a.ru | Web3tel msk OOO | RU | malicious |
Domain | IP | Reputation |
---|---|---|
cond.ib-a.ru |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3772 | wscript.exe | A Network Trojan was detected | MALWARE [PTsecurity] Virus.vbs.qexvmc (N40/KLBanker) |