| File name: | SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF.js |
| Full analysis: | https://app.any.run/tasks/9cfe8411-bbf6-4f9d-88ff-7885eb3b9180 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 12, 2019, 09:22:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines |
| MD5: | B9C748A0CFF4AE3E47A3F734529E1A17 |
| SHA1: | DCC1079ACD595F3F3B8A8088C39DE331CAEB353C |
| SHA256: | F4D115A7239BCEACFD13F2E1E5970EF8EE02214E346BE25CCED59BF5D564B43E |
| SSDEEP: | 1536:76iLr7FvFJjn3GRcQOGcpIh4jqhFMtGEY2GTqpP0AHOfH32ufWV1wBwCOTc:7/7Jj3GFOGUGmchX97w7c |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 544 | taskkill /F /IM cmdc.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 692 | "C:\Windows\system32\cmd.exe" /c taskkill /F /IM cmdc.exe | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 772 | "C:\Windows\system32\cmd.exe" /c taskkill /F /IM cmdc.exe | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 988 | "C:\Users\admin\AppData\Roaming\cmdc.exe" /stext C:\Users\admin\AppData\Roaming\cmdc.exedata | C:\Users\admin\AppData\Roaming\cmdc.exe | — | wscript.exe | |||||||||||
User: admin Company: WSH Inc Integrity Level: MEDIUM Description: bpvpl Exit code: 0 Version: 8.3.3.4 Modules
| |||||||||||||||
| 1728 | "C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\ieLnblHVdD.js" | C:\Windows\System32\wscript.exe | WScript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 1816 | "C:\Windows\system32\cmd.exe" /c taskkill /F /IM cmdc.exe | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1888 | "C:\Users\admin\AppData\Roaming\cmdc.exe" /stext C:\Users\admin\AppData\Roaming\cmdc.exedata | C:\Users\admin\AppData\Roaming\cmdc.exe | — | wscript.exe | |||||||||||
User: admin Company: WSH Inc Integrity Level: MEDIUM Description: bpvpl Exit code: 0 Version: 8.3.3.4 Modules
| |||||||||||||||
| 2036 | "C:\Windows\system32\cmd.exe" /c taskkill /F /IM cmdc.exe | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2188 | taskkill /F /IM kl-plugin.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2196 | "C:\Windows\system32\cmd.exe" /c taskkill /F /IM cmdc.exe | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3324) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3324) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1728) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\IELNBLHVDD |
| Operation: | write | Name: | |
Value: false - 12/6/2019 | |||
| (PID) Process: | (1728) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | ieLnblHVdD |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\ieLnblHVdD.js" | |||
| (PID) Process: | (1728) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | ieLnblHVdD |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\ieLnblHVdD.js" | |||
| (PID) Process: | (3324) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF |
| Operation: | write | Name: | |
Value: false - 12/6/2019 | |||
| (PID) Process: | (3324) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF.js" | |||
| (PID) Process: | (3324) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\SWIFT_AMENDMENT_POLICY_PAYMENT_SOLUTION_PDF.js" | |||
| (PID) Process: | (3896) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3896) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\js3u_xa7.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\jpx-fdrx.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\yzowbpsa.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\jwrkhg8x.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\mqhonbx_.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\9o0xdlqg.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\mqczniwy.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\u127i3jl.newcfg | — | |
MD5:— | SHA256:— | |||
| 2860 | kl-plugin.exe | C:\Users\admin\AppData\Local\WSHRat_Plugin\kl-plugin.exe_Url_jaxmfvxjr5veege4korvji5hcwi3t2rj\1.1.0.0\7dtvhpen.newcfg | — | |
MD5:— | SHA256:— | |||
| 3324 | WScript.exe | C:\Users\admin\AppData\Roaming\ieLnblHVdD.js | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3896 | wscript.exe | POST | — | 185.247.228.49:1986 | http://www.tcoolsoul.com:1986/is-ready | unknown | — | — | malicious |
3896 | wscript.exe | GET | 200 | 172.245.14.10:80 | http://doughnut-snack.live/bpvpl.tar.gz | US | executable | 3.11 Mb | malicious |
3896 | wscript.exe | GET | 200 | 172.245.14.10:80 | http://doughnut-snack.live/mapv.tar.gz | US | executable | 2.42 Mb | malicious |
3896 | wscript.exe | POST | 200 | 185.247.228.49:1986 | http://www.tcoolsoul.com:1986/is-ready | unknown | text | 95 b | malicious |
3896 | wscript.exe | GET | 200 | 172.245.14.10:80 | http://doughnut-snack.live/klplu.tar.gz | US | executable | 25.5 Kb | malicious |
3896 | wscript.exe | POST | — | 185.247.228.49:1986 | http://www.tcoolsoul.com:1986/is-ready | unknown | — | — | malicious |
3896 | wscript.exe | POST | — | 185.247.228.49:1986 | http://www.tcoolsoul.com:1986/is-ready | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3896 | wscript.exe | 185.247.228.49:1986 | www.tcoolsoul.com | — | — | malicious |
3896 | wscript.exe | 172.245.14.10:80 | doughnut-snack.live | ColoCrossing | US | malicious |
Domain | IP | Reputation |
|---|---|---|
brothersjoy.nl |
| unknown |
www.tcoolsoul.com |
| malicious |
doughnut-snack.live |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN WSHRAT CnC Checkin |
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1 |
3896 | wscript.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN WSHRAT CnC Checkin |
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1 |
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN WSHRAT Credential Dump Module Download Command Inbound |
3896 | wscript.exe | A Network Trojan was detected | MALWARE [PTsecurity] WSHRat Plugin |
3896 | wscript.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3896 | wscript.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3896 | wscript.exe | A Network Trojan was detected | ET TROJAN WSHRAT CnC Checkin |
Process | Message |
|---|---|
kl-plugin.exe | SetWindowsHookEx WH_KEYBOARD_LL
|
kl-plugin.exe | SetWindowsHookEx WH_MOUSE_LL
|
kl-plugin.exe | 06/12/2019 10:23:23>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1186, y=673, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:25>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1091, y=595, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:26>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1256, y=430, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:26>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1174, y=442, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:26>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1138, y=433, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:26>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1068, y=388, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:27>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1062, y=436, mouseData=0, flags=0, dwExtraInfo=0
|
kl-plugin.exe | 06/12/2019 10:23:34>MouseChange: nCode=0, wParam=WM_MOUSEMOVE, x=1256, y=670, mouseData=0, flags=0, dwExtraInfo=0
|