File name:

po1.vbs

Full analysis: https://app.any.run/tasks/9f4e6b6a-1106-4895-8977-79c8efb0d645
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 19, 2019, 06:41:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
dunihi
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

E4D0D415849A72A4A6791F3A75C333BC

SHA1:

4CFF20165D1CB336A0193F597AAC10616E31F2B5

SHA256:

CFE4094FA8131E32E23658B77C8E221B887AF56010F328A772A1FBB11F3AC556

SSDEEP:

1536:zqU5+TuTkzgqFL3BMr5F/kLUGmm7auF2y9AdWisg+:jWsYOrPflm7bAsd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DUNIHI was detected

      • WScript.exe (PID: 3052)
      • wscript.exe (PID: 2212)
    • Writes to a start menu file

      • wscript.exe (PID: 2212)
      • WScript.exe (PID: 3052)
    • Connects to CnC server

      • wscript.exe (PID: 2212)
      • WScript.exe (PID: 3052)
    • Changes the autorun value in the registry

      • wscript.exe (PID: 2212)
      • WScript.exe (PID: 3052)
  • SUSPICIOUS

    • Executes scripts

      • WScript.exe (PID: 3052)
    • Creates files in the user directory

      • WScript.exe (PID: 3052)
      • wscript.exe (PID: 2212)
    • Application launched itself

      • WScript.exe (PID: 3052)
    • Connects to unusual port

      • wscript.exe (PID: 2212)
      • WScript.exe (PID: 3052)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DUNIHI wscript.exe #DUNIHI wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
2212"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\eDdUCtzNWK.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3052"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\po1.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
350
Read events
272
Write events
78
Delete events
0

Modification events

(PID) Process:(3052) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3052) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3052) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\po1
Operation:writeName:
Value:
false - 2/19/2019
(PID) Process:(3052) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:po1
Value:
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\po1.vbs"
(PID) Process:(3052) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:po1
Value:
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\po1.vbs"
(PID) Process:(2212) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\EDDUCTZNWK
Operation:writeName:
Value:
false - 2/19/2019
(PID) Process:(2212) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:eDdUCtzNWK
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\eDdUCtzNWK.vbs"
(PID) Process:(2212) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:eDdUCtzNWK
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\eDdUCtzNWK.vbs"
(PID) Process:(2212) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2212) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
0
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3052WScript.exeC:\Users\admin\AppData\Roaming\eDdUCtzNWK.vbstext
MD5:
SHA256:
2212wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eDdUCtzNWK.vbstext
MD5:
SHA256:
3052WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\po1.vbstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
5
DNS requests
1
Threats
72

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
2212
wscript.exe
POST
404
185.247.228.122:2021
http://brothersjoy.nl:2021/is-ready
unknown
xml
345 b
malicious
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
2212
wscript.exe
POST
404
185.247.228.122:2021
http://brothersjoy.nl:2021/is-ready
unknown
xml
345 b
malicious
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
2212
wscript.exe
POST
404
185.247.228.122:2021
http://brothersjoy.nl:2021/is-ready
unknown
xml
345 b
malicious
2212
wscript.exe
POST
404
185.247.228.122:2021
http://brothersjoy.nl:2021/is-ready
unknown
xml
345 b
malicious
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
3052
WScript.exe
POST
404
185.247.228.122:1991
http://brothersjoy.nl:1991/is-ready
unknown
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3052
WScript.exe
185.247.228.122:1991
brothersjoy.nl
malicious
2212
wscript.exe
185.247.228.122:2021
brothersjoy.nl
malicious

DNS requests

Domain
IP
Reputation
brothersjoy.nl
  • 185.247.228.122
unknown

Threats

PID
Process
Class
Message
2212
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
2212
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2212
wscript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
3052
WScript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
3052
WScript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3052
WScript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
3052
WScript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
3052
WScript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3052
WScript.exe
A Network Trojan was detected
MALWARE [PTsecurity] Dunihi VBS.Downloader.Trojan
2212
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
No debug info