| File name: | AXCralfuUl.js |
| Full analysis: | https://app.any.run/tasks/02e429f5-2a3b-4ad4-84a7-9ec23aee1965 |
| Verdict: | Malicious activity |
| Analysis date: | September 19, 2019, 09:53:06 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines |
| MD5: | 8204B3DC0C80C1703D04FD83B14626F1 |
| SHA1: | 97B3220145FA2B4860D9F0AD2FBAF96726DD367E |
| SHA256: | BB0F0870B12FDB461135DA0CDBBAD24AFB77EAFD63E678758C909A48CD936575 |
| SSDEEP: | 768:Byu6Ozip5vYauc/N0vtnXaqL4wH+bJf2uNv0o0R1KmWCbFXG:Yuhz4nqvtnXaqL4w022co0vKmWCbFXG |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3320 | "C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\AXCralfuUl.js" | C:\Windows\System32\wscript.exe | WScript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3420 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\AXCralfuUl.js" | C:\Windows\System32\WScript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| (PID) Process: | (3420) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\AXCralfuUl |
| Operation: | write | Name: | |
Value: false - 19/9/2019 | |||
| (PID) Process: | (3420) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | AXCralfuUl |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\AXCralfuUl.js" | |||
| (PID) Process: | (3420) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | AXCralfuUl |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\AXCralfuUl.js" | |||
| (PID) Process: | (3420) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3420) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3320) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | AXCralfuUl |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\AXCralfuUl.js" | |||
| (PID) Process: | (3320) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | AXCralfuUl |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\AXCralfuUl.js" | |||
| (PID) Process: | (3320) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3320) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3320) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3420 | WScript.exe | C:\Users\admin\AppData\Roaming\AXCralfuUl.js | text | |
MD5:— | SHA256:— | |||
| 3420 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXCralfuUl.js | text | |
MD5:— | SHA256:— | |||
| 3320 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXCralfuUl.js | text | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3320 | wscript.exe | 45.79.48.200:7757 | pluginsrv1.duckdns.org | Linode, LLC | US | malicious |
Domain | IP | Reputation |
|---|---|---|
pluginsrv1.duckdns.org |
| malicious |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
1060 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |