| File name: | f6597572cd577de124af8d5f24ef52edcf238468220aa3080d589c9afe77c436.js |
| Full analysis: | https://app.any.run/tasks/9aa881d9-cebe-44eb-9b7b-c7a900a4bca0 |
| Verdict: | Malicious activity |
| Analysis date: | December 06, 2020, 21:31:05 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | text/plain |
| File info: | UTF-8 Unicode text, with very long lines, with CRLF line terminators |
| MD5: | 6047EFC8DA11FEE9B5FC861286054AC7 |
| SHA1: | 2858F65A1F872A2D88A4D45F8AC6E3349E7345D6 |
| SHA256: | F6597572CD577DE124AF8D5F24EF52EDCF238468220AA3080D589C9AFE77C436 |
| SSDEEP: | 24576:Rr4xcLKSp44J/NaKUWyDN1kBGhWZBTFZS+PrL18CRHmJHQ:YujT |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 960 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\f6597572cd577de124af8d5f24ef52edcf238468220aa3080d589c9afe77c436.js" | C:\Windows\System32\WScript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
960 | WScript.exe | 131.153.97.130:9059 | gensamogh.myq-see.com | — | US | malicious |
Domain | IP | Reputation |
|---|---|---|
gensamogh.myq-see.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
1052 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |