analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1.bat

Full analysis: https://app.any.run/tasks/6b2eba81-92b8-41b9-a272-7109b3cdfd07
Verdict: Malicious activity
Analysis date: June 16, 2019, 16:21:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ISO-8859 text, with CRLF line terminators
MD5:

F65D2D9F5063DF04193D11182C21D53B

SHA1:

BB93F26FC4ECDE755F68FFDB12959ABF4EC72B80

SHA256:

FAB0F8423BB4B64DB0526E9B4D356CB705AE84DAA2428C714FCE877DAF43FB53

SSDEEP:

48:dJZk7y4GaDvK9TweGaTweGOveCBrTJWeG5TJe+NGjxyfviocf/jJZOkpoVVYDNvC:dwZGajKZkykOvX8llsjxACHoAJC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Rar.exe (PID: 3272)
      • Rar.exe (PID: 4048)
      • Rar.exe (PID: 3280)
      • Rar.exe (PID: 2940)
      • Rar.exe (PID: 2700)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 3820)
      • cmd.exe (PID: 2928)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 2928)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2928)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • cmd.exe (PID: 3088)
    • Application launched itself

      • cmd.exe (PID: 2928)
    • Executes scripts

      • cmd.exe (PID: 2928)
  • INFO

    • Reads internet explorer settings

      • mshta.exe (PID: 3820)
    • Manual execution by user

      • NOTEPAD.EXE (PID: 2688)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
27
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start cmd.exe no specs mshta.exe no specs cmd.exe more.com no specs more.com no specs cmd.exe no specs cmd.exe no specs rar.exe no specs wscript.exe no specs more.com no specs more.com no specs more.com no specs more.com no specs rar.exe no specs more.com no specs more.com no specs more.com no specs rar.exe no specs more.com no specs more.com no specs more.com no specs rar.exe no specs more.com no specs more.com no specs more.com no specs rar.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3088cmd /c ""C:\Users\admin\Desktop\1.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3820mshta vbscript:createobject("wscript.shell").run("""1.bat"" h",0)(window.close)C:\Windows\system32\mshta.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2928cmd /c ""C:\Users\admin\Desktop\1.bat" h"C:\Windows\system32\cmd.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4044more +103 0.txt C:\Windows\system32\more.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3964more +125 0.txt C:\Windows\system32\more.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2628C:\Windows\system32\cmd.exe /c dir h /a-d /b /s *.exe *.jpgC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2984C:\Windows\system32\cmd.exe /c "dir /a/s/b/on *.exe *.jpg"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3272rar.exe a -hp8npwhhfezlvlltuvflsssqmo7wbsnvkvicgagt4w ╜Γ├▄lucknum-ftjgdp.rar 4.txt 0.bat rar.exeC:\Users\admin\Desktop\Rar.execmd.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
Command line RAR
Exit code:
0
Version:
5.60.0
2608"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\1.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2756more +1 5.txt C:\Windows\system32\more.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
322
Read events
310
Write events
12
Delete events
0

Modification events

(PID) Process:(3820) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3820) mshta.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2928) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2928) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2688) NOTEPAD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
66
(PID) Process:(2688) NOTEPAD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
66
(PID) Process:(2688) NOTEPAD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDX
Value:
960
(PID) Process:(2688) NOTEPAD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDY
Value:
501
Executable files
1
Suspicious files
5
Text files
38
Unknown types
0

Dropped files

PID
Process
Filename
Type
2928cmd.exeC:\Users\admin\Desktop\a.tmp
MD5:
SHA256:
2928cmd.exeC:\Users\admin\Desktop\1.vbstext
MD5:F3D33E78CC6B8A13AADCB802D9A05B0E
SHA256:339BDC6EE550CE9A8E05008068DDC1903CDE79AF4956DC1615BFF57289E9C194
2928cmd.exeC:\Users\admin\Desktop\0.txttext
MD5:C007864E27067DA8595F2CF68651E840
SHA256:60C476F0CE9B0FA6BA40BC2A36D15ED205A06DF725697FE736654C30329C68C2
2928cmd.exeC:\Users\admin\Desktop\2.txttext
MD5:E421D285D7FC286F5129630527F71920
SHA256:AC69C835D475752CC19CE31342B24A1D548E5590AE4C91254B556C5AF87912CF
2928cmd.exeC:\Users\admin\Desktop\0.battext
MD5:C007864E27067DA8595F2CF68651E840
SHA256:60C476F0CE9B0FA6BA40BC2A36D15ED205A06DF725697FE736654C30329C68C2
2928cmd.exeC:\Users\admin\Desktop\4.txttext
MD5:27C774A56038A46141B5DDD6CB06D395
SHA256:C2281BCEC1FE84C756263DC17B2EADFDD110BDFB4AAC7816290C0D0D89111D8A
2928cmd.exeC:\Users\admin\Desktop\3.txttext
MD5:5163D32B7C71E117BE13F5C351792C63
SHA256:0594A1306E98DBCA0EF8993CAD3348B45056B1A2F17E61DCB14B43380E0FF5D3
2928cmd.exeC:\Users\admin\Desktop\1.txttext
MD5:A014C0C0D28C66D122006EE410A8CABA
SHA256:448DBFEE9876C65D4B8DDC5C5C8DD8CB9CC37A09ED4B55A8B9A656CD8C9EC030
2928cmd.exeC:\Users\admin\Desktop\5.txttext
MD5:640AFFFC0B7DBC05B53837755F064E9E
SHA256:E3A197ACCDB99EEC4AC2FC659C71B8930929DA26798049E890E413E28D0E6C39
2928cmd.exeC:\Users\admin\Desktop\╜Γ╤╣lucknum╘╦╨╨0bat╜Γ├▄.txttext
MD5:E5455CCC46B9A25506A2834E41CE60C4
SHA256:74CA8E139277F8C11125B7C39AB978B9CACF97232BBD8E431E4421A41A4A5575
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info