analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1click.cmd

Full analysis: https://app.any.run/tasks/277e49f4-ffe9-4772-b4d0-3eecf8c74816
Verdict: Malicious activity
Analysis date: January 11, 2019, 11:07:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with very long lines, with CRLF line terminators
MD5:

94C3F6B998627923D7869277E6FFDEE1

SHA1:

7B7F366DFF9655543E146E4950F2AB9B85B77987

SHA256:

ADE548F8424282341FB2E5FAAD4D0CC206898983D3E62107635A653E5BA9727C

SSDEEP:

48:Wigr61lOqoXucXuuAh4qhKgzq1zpHD17Pp5xfmxbZlT/8ZxGg0q4Y:jgr61lOqKumuDvsJJP1MZlAP0LY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 2980)
    • Executes scripts

      • cmd.exe (PID: 2980)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2980)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3336)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
19
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs cmd.exe no specs cmd.exe no specs cscript.exe no specs cscript.exe no specs cscript.exe no specs cscript.exe no specs cscript.exe no specs cscript.exe no specs cscript.exe no specs find.exe no specs cscript.exe no specs cscript.exe no specs find.exe no specs cscript.exe no specs cscript.exe no specs find.exe no specs winword.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2980cmd /c ""C:\Users\admin\AppData\Local\Temp\1click.cmd" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3792C:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses16\proplusvl_kms*.xrm-msC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4072C:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses16\proplusvl_mak*.xrm-msC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2252cscript //nologo ospp.vbs /unpkey:WFG99 C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
2872cscript //nologo ospp.vbs /unpkey:DRTFM C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
3360cscript //nologo ospp.vbs /unpkey:BTDRB C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
3844cscript //nologo ospp.vbs /unpkey:CPQVG C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
2228cscript //nologo ospp.vbs /inpkey:XQNVK-8JYDB-WJ9W3-YJ8YR-WFG99 C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
2728cscript //nologo ospp.vbs /sethst:kms7.MSGuides.com C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
3232cscript //nologo ospp.vbs /act C:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
1
Version:
5.8.7600.16385
Total events
722
Read events
666
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
3336WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR2C8F.tmp.cvr
MD5:
SHA256:
3336WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\federalgod.rtf.LNK
MD5:
SHA256:
3336WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9731030F-DFC8-405B-AB60-C461802A78A6}.tmp
MD5:
SHA256:
3336WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{76182A57-D995-48B2-851D-9E4853DEB758}.tmp
MD5:
SHA256:
3336WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:98E066A106EE14906E27F057AEF5FAC3
SHA256:DD495FD4F06BA75556CABBC168FCA9D69BB7BAB7B330B683ABB9E17BC102A804
3336WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:F0C084EA295C7E7D1C71A0F7E8398365
SHA256:8EE42AD614ED6C9075C99B68488D359C0C60ADAB004169D49B20887F62A30D9B
3336WINWORD.EXEC:\Users\admin\Desktop\~$deralgod.rtfpgc
MD5:346746B55A4BB81868CCED72925E92F4
SHA256:280989EF31175B442466F6CB15793B0333FB0C4BE602792E24BB6012A88D4662
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info