download:

/lawndoc/RanSim/blob/main/RanSim.ps1

Full analysis: https://app.any.run/tasks/49772c9a-e71d-4fb2-af24-78fd7bf32262
Verdict: Malicious activity
Analysis date: October 23, 2023, 10:34:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/json
File info: JSON data
MD5:

69BC66F8309C64BE87999DC4C5A9F218

SHA1:

45C924ABA4E8C1468CD977B18489644F9F61EDF9

SHA256:

05867A57E0ACAE8458E62245B4A176959B4F646E5D12EBF1D9D4132489D99D55

SSDEEP:

384:dUoZw6OftwblUeCSbBOiPlZrNpGViZkSgz9Fze6xzo:dJKb1wOS15ZNZ69FzeD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CCleaner.exe (PID: 1628)
    • Loads dropped or rewritten executable

      • CCleaner.exe (PID: 1628)
    • Steals credentials from Web Browsers

      • taskhost.exe (PID: 3496)
      • CCleaner.exe (PID: 1628)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 1628)
  • SUSPICIOUS

    • Reads the Internet Settings

      • powershell.exe (PID: 3628)
      • CCleaner.exe (PID: 1628)
    • Powershell version downgrade attack

      • powershell.exe (PID: 3628)
    • The process executes via Task Scheduler

      • CCleaner.exe (PID: 1628)
    • Checks Windows Trust Settings

      • CCleaner.exe (PID: 1628)
    • Reads security settings of Internet Explorer

      • CCleaner.exe (PID: 1628)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 1628)
    • Executes as Windows Service

      • taskhost.exe (PID: 3496)
    • Searches for installed software

      • CCleaner.exe (PID: 1628)
    • The process verifies whether the antivirus software is installed

      • CCleaner.exe (PID: 1628)
    • Starts application from unusual location

      • CCleaner.exe (PID: 1628)
    • Reads browser cookies

      • CCleaner.exe (PID: 1628)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 1628)
  • INFO

    • Manual execution by a user

      • WINWORD.EXE (PID: 2328)
      • CCleaner.exe (PID: 2704)
    • Reads the computer name

      • CCleaner.exe (PID: 2704)
      • CCleaner.exe (PID: 1628)
    • Checks supported languages

      • CCleaner.exe (PID: 1628)
      • CCleaner.exe (PID: 2704)
    • Reads Environment values

      • CCleaner.exe (PID: 2704)
      • CCleaner.exe (PID: 1628)
    • Reads the machine GUID from the registry

      • CCleaner.exe (PID: 1628)
    • Reads CPU info

      • CCleaner.exe (PID: 1628)
    • Reads product name

      • CCleaner.exe (PID: 1628)
    • Creates files in the program directory

      • CCleaner.exe (PID: 1628)
    • Checks proxy server information

      • CCleaner.exe (PID: 1628)
    • Creates files or folders in the user directory

      • CCleaner.exe (PID: 1628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

EXIF

JSON

PayloadAllShortcutsEnabled: -
PayloadBlobCsv: null
PayloadBlobCsvError: null
PayloadBlobDependabotInfoConfigFilePath: null
PayloadBlobDependabotInfoConfigurationNoticeDismissed: null
PayloadBlobDependabotInfoCurrentUserCanAdminRepo: -
PayloadBlobDependabotInfoDismissConfigurationNoticePath: /settings/dismiss-notice/dependabot_configuration_notice
PayloadBlobDependabotInfoNetworkDependabotPath: /lawndoc/RanSim/network/updates
PayloadBlobDependabotInfoRepoAlertsPath: /lawndoc/RanSim/security/dependabot
PayloadBlobDependabotInfoRepoOwnerIsOrg: -
PayloadBlobDependabotInfoRepoSecurityAndAnalysisPath: /lawndoc/RanSim/settings/security_analysis
PayloadBlobDependabotInfoShowConfigurationBanner: -
PayloadBlobDiscussionTemplate: null
PayloadBlobDisplayName: RanSim.ps1
PayloadBlobDisplayUrl: https://github.com/lawndoc/RanSim/blob/main/RanSim.ps1?raw=true
PayloadBlobHeaderInfoBlobSize: 2.69 KB
PayloadBlobHeaderInfoDeleteInfoDeleteTooltip: You must be signed in to make or propose changes
PayloadBlobHeaderInfoEditInfoEditTooltip: You must be signed in to make or propose changes
PayloadBlobHeaderInfoGhDesktopPath: https://desktop.github.com
PayloadBlobHeaderInfoGitLfsPath: null
PayloadBlobHeaderInfoIsCSV: -
PayloadBlobHeaderInfoIsRichtext: -
PayloadBlobHeaderInfoLineInfoTruncatedLoc: 71
PayloadBlobHeaderInfoLineInfoTruncatedSloc: 55
PayloadBlobHeaderInfoMode: file
PayloadBlobHeaderInfoOnBranch:
PayloadBlobHeaderInfoShortPath: 3bdbba0
PayloadBlobHeaderInfoSiteNavLoginPath: /login?return_to=https%3A%2F%2Fgithub.com%2Flawndoc%2FRanSim%2Fblob%2Fmain%2FRanSim.ps1
PayloadBlobHeaderInfoToc: null
PayloadBlobImage: -
PayloadBlobIsCodeownersFile: null
PayloadBlobIsPlain: -
PayloadBlobIsValidLegacyIssueTemplate: -
PayloadBlobIssueTemplate: null
PayloadBlobIssueTemplateHelpUrl: https://docs.github.com/articles/about-issue-and-pull-request-templates
PayloadBlobLanguage: PowerShell
PayloadBlobLanguageID: 293
PayloadBlobLarge: -
PayloadBlobLoggedIn: -
PayloadBlobNewDiscussionPath: /lawndoc/RanSim/discussions/new
PayloadBlobNewIssuePath: /lawndoc/RanSim/issues/new
PayloadBlobPlanSupportInfoRepoIsFork: null
PayloadBlobPlanSupportInfoRepoOwnedByCurrentUser: null
PayloadBlobPlanSupportInfoRequestFullPath: /lawndoc/RanSim/blob/main/RanSim.ps1
PayloadBlobPlanSupportInfoShowFreeOrgGatedFeatureMessage: null
PayloadBlobPlanSupportInfoShowPlanSupportBanner: null
PayloadBlobPlanSupportInfoUpgradeDataAttributes: null
PayloadBlobPlanSupportInfoUpgradePath: null
PayloadBlobPublishBannersInfoDismissActionNoticePath: /settings/dismiss-notice/publish_action_from_dockerfile
PayloadBlobPublishBannersInfoDismissStackNoticePath: /settings/dismiss-notice/publish_stack_from_file
PayloadBlobPublishBannersInfoReleasePath: /lawndoc/RanSim/releases/new?marketplace=true
PayloadBlobPublishBannersInfoShowPublishActionBanner: -
PayloadBlobPublishBannersInfoShowPublishStackBanner: -
PayloadBlobRawBlobUrl: https://github.com/lawndoc/RanSim/raw/main/RanSim.ps1
PayloadBlobRawLines:
  • <#
  • .SYNOPSIS
  • Ransomware Simulator using AES to recursively encrypt or decrypt files at a given path
  • .DESCRIPTION
  • This script is intended to be used to test your defenses and backups against ransomware in a controlled environment. You can encrypt fake data for
  • your simulation, but you also have the option to decrypt the files with the same script if you need to.
  • .EXAMPLE
  • .\RanSim.ps1 -mode encrypt
  • or
  • .\RanSim.ps1 -mode decrypt
  • .PARAMETER Target File Path
  • This optional parameter specifies the path that the recursive encryption will start in. A default path is provided.
  • .PARAMETER File Extension
  • This optional parameter defines the extension that will be added to the encrypted files once attacked. A default extension is provided.
  • .PARAMETER Encryption key
  • This optional parameter is the plain-text AES encryption key used for both encryption and decryption. A default key is provided.
  • .NOTES
  • This script uses the FileCryptopgraphy module from Tyler Siegrist - https://gallery.technet.microsoft.com/scriptcenter/EncryptDecrypt-files-use-65e7ae5d
  • #>
  • # Define parameters and their defaults
  • param([string]$Mode,
  • [string]$TargetPath = "C:\RanSim",
  • [string]$Extension = ".encrypted",
  • [string]$Key = "Q5KyUru6wn82hlY9k8xUjJOPIC9da41jgRkpt21jo2L="
  • )
  • # Define target file types
  • $TargetFiles = '*.pdf','*.xls*','*.ppt*','*.doc*','*.accd*','*.rtf','*.txt','*.csv','*.jpg','*.jpeg','*.png','*.gif','*.avi','*.midi','*.mov','*.mp3','*.mp4','*.mpeg','*.mpeg2','*.mpeg3','*.mpg','*.ogg'
  • # Import FileCryptography module
  • Import-Module "$PSScriptRoot\FileCryptography.psm1"
  • if ($mode -eq "encrypt") {
  • # Gather all files from the target path and its subdirectories
  • $FilesToEncrypt = get-childitem -path $TargetPath\* -Include $TargetFiles -Exclude *$Extension -Recurse -force | where { ! $_.PSIsContainer }
  • $NumFiles = $FilesToEncrypt.length
  • # Encrypt the files
  • foreach ($file in $FilesToEncrypt)
  • {
  • Write-Host "Encrypting $file"
  • Protect-File $file -Algorithm AES -KeyAsPlainText $key -Suffix $Extension -RemoveSource
  • }
  • Write-Host "Encrypted $NumFiles files." | Start-Sleep -Seconds 10
  • }
  • elseif ($mode -eq "decrypt") {
  • # Gather all files from the target path and its subdirectories
  • $FilestoDecrypt = get-childitem -path $TargetPath\* -Include *$Extension -Recurse -force | where { ! $_.PSIsContainer }
  • # Encrypt the files
  • foreach ($file in $FilestoDecrypt)
  • {
  • Write-Host "Decrypting $file"
  • Unprotect-File $file -Algorithm AES -KeyAsPlainText $key -Suffix $Extension -RemoveSource
  • }
  • }
  • else {
  • write-host "ERROR: must choose a mode (encrypt or decrypt). Example usage: .\RanSim.ps1 -mode encrypt"
  • }
  • exit
PayloadBlobRenderImageOrRaw: -
PayloadBlobRenderedFileInfo: null
PayloadBlobRichText: null
PayloadBlobShortPath: null
PayloadBlobStylingDirectivesCssClass:
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c1
  • pl-k
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-c
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-c
  • pl-c
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-c
  • pl-c
  • pl-c1
  • pl-s
  • pl-pds
  • pl-c1
  • pl-pds
  • pl-k
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-c
  • pl-c
  • pl-smi
  • pl-k
  • pl-c1
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-k
  • pl-k
  • pl-k
  • pl-c1
  • pl-smi
  • pl-smi
  • pl-k
  • pl-smi
  • pl-smi
  • pl-c
  • pl-c
  • pl-k
  • pl-smi
  • pl-k
  • pl-smi
  • pl-c1
  • pl-s
  • pl-pds
  • pl-smi
  • pl-pds
  • pl-c1
  • pl-smi
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-smi
  • pl-k
  • pl-c1
  • pl-s
  • pl-pds
  • pl-smi
  • pl-pds
  • pl-k
  • pl-c1
  • pl-k
  • pl-c1
  • pl-k
  • pl-smi
  • pl-k
  • pl-s
  • pl-pds
  • pl-pds
  • pl-c
  • pl-c
  • pl-smi
  • pl-k
  • pl-c1
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-k
  • pl-k
  • pl-k
  • pl-c1
  • pl-smi
  • pl-c
  • pl-c
  • pl-k
  • pl-smi
  • pl-k
  • pl-smi
  • pl-c1
  • pl-s
  • pl-pds
  • pl-smi
  • pl-pds
  • pl-c1
  • pl-smi
  • pl-k
  • pl-k
  • pl-smi
  • pl-k
  • pl-smi
  • pl-k
  • pl-k
  • pl-c1
  • pl-s
  • pl-pds
  • pl-pds
  • pl-k
PayloadBlobStylingDirectivesEnd:
  • 3
  • 3
  • 0
  • 9
  • 9
  • 1
  • 9
  • 90
  • 0
  • 12
  • 12
  • 1
  • 12
  • 150
  • 103
  • 0
  • 8
  • 8
  • 1
  • 8
  • 30
  • 6
  • 30
  • 0
  • 27
  • 27
  • 1
  • 10
  • 27
  • 119
  • 1
  • 25
  • 25
  • 1
  • 10
  • 25
  • 139
  • 0
  • 25
  • 25
  • 1
  • 10
  • 25
  • 133
  • 0
  • 6
  • 6
  • 1
  • 6
  • 156
  • 0
  • 2
  • 2
  • 38
  • 1
  • 5
  • 13
  • 19
  • 20
  • 13
  • 25
  • 27
  • 39
  • 29
  • 39
  • 40
  • 13
  • 24
  • 26
  • 39
  • 28
  • 39
  • 40
  • 13
  • 18
  • 20
  • 67
  • 22
  • 67
  • 26
  • 1
  • 12
  • 14
  • 22
  • 16
  • 22
  • 23
  • 31
  • 24
  • 31
  • 32
  • 40
  • 33
  • 40
  • 41
  • 49
  • 42
  • 49
  • 50
  • 59
  • 51
  • 59
  • 60
  • 67
  • 61
  • 67
  • 68
  • 75
  • 69
  • 75
  • 76
  • 83
  • 77
  • 83
  • 84
  • 91
  • 85
  • 91
  • 92
  • 100
  • 93
  • 100
  • 101
  • 108
  • 102
  • 108
  • 109
  • 116
  • 110
  • 116
  • 117
  • 124
  • 118
  • 124
  • 125
  • 133
  • 126
  • 133
  • 134
  • 141
  • 135
  • 141
  • 142
  • 149
  • 143
  • 149
  • 150
  • 157
  • 151
  • 157
  • 158
  • 166
  • 159
  • 166
  • 167
  • 176
  • 168
  • 176
  • 177
  • 186
  • 178
  • 186
  • 187
  • 194
  • 188
  • 194
  • 195
  • 202
  • 196
  • 202
  • 32
  • 1
  • 13
  • 51
  • 15
  • 28
  • 51
  • 2
  • 9
  • 13
  • 23
  • 15
  • 23
  • 66
  • 5
  • 19
  • 21
  • 35
  • 37
  • 53
  • 55
  • 57
  • 77
  • 79
  • 88
  • 98
  • 100
  • 109
  • 116
  • 122
  • 126
  • 143
  • 143
  • 13
  • 15
  • 38
  • 38
  • 23
  • 5
  • 11
  • 18
  • 21
  • 37
  • 18
  • 37
  • 20
  • 36
  • 37
  • 20
  • 26
  • 28
  • 43
  • 62
  • 64
  • 81
  • 83
  • 14
  • 43
  • 16
  • 35
  • 43
  • 45
  • 57
  • 59
  • 69
  • 6
  • 13
  • 17
  • 27
  • 19
  • 27
  • 66
  • 5
  • 19
  • 21
  • 35
  • 37
  • 53
  • 55
  • 57
  • 66
  • 76
  • 78
  • 87
  • 94
  • 100
  • 104
  • 121
  • 121
  • 23
  • 5
  • 11
  • 18
  • 21
  • 37
  • 18
  • 37
  • 20
  • 36
  • 37
  • 22
  • 28
  • 30
  • 45
  • 64
  • 66
  • 83
  • 86
  • 4
  • 14
  • 106
  • 16
  • 106
  • 4
PayloadBlobStylingDirectivesStart:
  • 1
  • 1
  • 0
  • 0
  • 0
  • 0
  • 1
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 0
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 0
  • 0
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 11
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 11
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 11
  • 0
  • 0
  • 0
  • 0
  • 0
  • 1
  • 0
  • 0
  • 0
  • 0
  • 0
  • 0
  • 0
  • 7
  • 14
  • 19
  • 7
  • 14
  • 26
  • 28
  • 28
  • 38
  • 39
  • 7
  • 14
  • 25
  • 27
  • 27
  • 38
  • 39
  • 7
  • 14
  • 19
  • 21
  • 21
  • 66
  • 0
  • 0
  • 0
  • 13
  • 15
  • 15
  • 21
  • 22
  • 23
  • 23
  • 30
  • 31
  • 32
  • 32
  • 39
  • 40
  • 41
  • 41
  • 48
  • 49
  • 50
  • 50
  • 58
  • 59
  • 60
  • 60
  • 66
  • 67
  • 68
  • 68
  • 74
  • 75
  • 76
  • 76
  • 82
  • 83
  • 84
  • 84
  • 90
  • 91
  • 92
  • 92
  • 99
  • 100
  • 101
  • 101
  • 107
  • 108
  • 109
  • 109
  • 115
  • 116
  • 117
  • 117
  • 123
  • 124
  • 125
  • 125
  • 132
  • 133
  • 134
  • 134
  • 140
  • 141
  • 142
  • 142
  • 148
  • 149
  • 150
  • 150
  • 156
  • 157
  • 158
  • 158
  • 165
  • 166
  • 167
  • 167
  • 175
  • 176
  • 177
  • 177
  • 185
  • 186
  • 187
  • 187
  • 193
  • 194
  • 195
  • 195
  • 201
  • 0
  • 0
  • 0
  • 14
  • 14
  • 15
  • 50
  • 0
  • 4
  • 10
  • 14
  • 14
  • 22
  • 4
  • 4
  • 4
  • 20
  • 22
  • 36
  • 42
  • 54
  • 56
  • 65
  • 78
  • 87
  • 88
  • 99
  • 108
  • 115
  • 117
  • 125
  • 127
  • 129
  • 4
  • 14
  • 16
  • 31
  • 4
  • 4
  • 4
  • 13
  • 19
  • 22
  • 8
  • 19
  • 19
  • 31
  • 36
  • 8
  • 21
  • 27
  • 42
  • 58
  • 63
  • 71
  • 82
  • 4
  • 15
  • 15
  • 26
  • 42
  • 44
  • 46
  • 58
  • 67
  • 0
  • 8
  • 14
  • 18
  • 18
  • 26
  • 4
  • 4
  • 4
  • 20
  • 22
  • 36
  • 42
  • 54
  • 56
  • 65
  • 66
  • 77
  • 86
  • 93
  • 95
  • 103
  • 105
  • 107
  • 4
  • 4
  • 4
  • 13
  • 19
  • 22
  • 8
  • 19
  • 19
  • 31
  • 36
  • 8
  • 23
  • 29
  • 44
  • 60
  • 65
  • 73
  • 85
  • 0
  • 4
  • 15
  • 15
  • 105
  • 0
PayloadBlobSymbolsNotAnalyzed:
PayloadBlobSymbolsTimedOut: -
PayloadBlobTabSize: 8
PayloadBlobTopBannersInfoActionsOnboardingTip: null
PayloadBlobTopBannersInfoCitationHelpUrl: https://docs.github.com/en/github/creating-cloning-and-archiving-repositories/creating-a-repository-on-github/about-citation-files
PayloadBlobTopBannersInfoGlobalPreferredFundingPath: null
PayloadBlobTopBannersInfoOverridingGlobalFundingFile: -
PayloadBlobTopBannersInfoRepoName: RanSim
PayloadBlobTopBannersInfoRepoOwner: lawndoc
PayloadBlobTopBannersInfoShowDependabotConfigurationBanner: -
PayloadBlobTopBannersInfoShowInvalidCitationWarning: -
PayloadBlobTruncated: -
PayloadBlobViewable:
PayloadBlobWorkflowRedirectUrl: null
PayloadCopilotAccessAllowed: -
PayloadCopilotInfo: null
PayloadCsrf_tokenslawndocRanSimbranchesPost: 3QPI8vbtioBhxFNdwAXEEi7leL0fSSEuURDRTgCjoN4hml9HGiHCrMIb9fiyfSe0lSo8wzJDxi9H3PaWC_mPqw
PayloadCsrf_tokensrepospreferencesPost: d0HO3V40Yhm5AzwGZC12YRZweL1N8ThpdkY00q1QqP_86u-3GhCOEAClPgkPRLaqQAuwZJkeD6L1r-2cRFLNDA
PayloadCurrentUser: null
PayloadFileTreeItemsContentType:
  • directory
  • file
  • file
  • file
  • file
  • file
PayloadFileTreeItemsName:
  • .github
  • FileCryptography.psm1
  • LICENSE
  • README.md
  • RanSim.png
  • RanSim.ps1
PayloadFileTreeItemsPath:
  • .github
  • FileCryptography.psm1
  • LICENSE
  • README.md
  • RanSim.png
  • RanSim.ps1
PayloadFileTreeTotalCount: 6
PayloadFileTreeProcessingTime: 2.6629359999999997
PayloadPath: RanSim.ps1
PayloadReducedMotionEnabled: null
PayloadRefInfoCanEdit: -
PayloadRefInfoCurrentOid: 16503ecdd9b4626fab3a38ef0a89b353b13e3aae
PayloadRefInfoListCacheKey: v0:1656618379.686621
PayloadRefInfoName: main
PayloadRefInfoRefType: branch
PayloadRepoCreatedAt: 2021-09-17T15:53:40.000Z
PayloadRepoCurrentUserCanPush: -
PayloadRepoDefaultBranch: main
PayloadRepoId: 407598870
PayloadRepoIsEmpty: -
PayloadRepoIsFork: -
PayloadRepoIsOrgOwned: -
PayloadRepoName: RanSim
PayloadRepoOwnerAvatar: https://avatars.githubusercontent.com/u/24688343?v=4
PayloadRepoOwnerLogin: lawndoc
PayloadRepoPrivate: -
PayloadRepoPublic:
PayloadSymbolsExpanded: -
PayloadTreeExpanded:
Title: RanSim/RanSim.ps1 at main · lawndoc/RanSim
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs winword.exe no specs PhotoViewer.dll no specs ccleaner.exe no specs ccleaner.exe taskhost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1628"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
taskeng.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
2212C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\dllhost.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
2328"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\framemaster.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\gdi32.dll
2704"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
3496"taskhost.exe"C:\Windows\System32\taskhost.exe
services.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3628"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\RanSim.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
24 777
Read events
24 353
Write events
219
Delete events
205

Modification events

(PID) Process:(3628) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3628) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3628) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3628) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3628) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2328) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2328) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(2328) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(2328) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(2328) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
Executable files
4
Suspicious files
36
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2328WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFA7B.tmp.cvr
MD5:
SHA256:
2328WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:E05B022AB5E19BAD2FE93C7BE3FAFB9B
SHA256:58D3D647E62AB4FB6D97C3D6D5055D57703962D8841658B93AFC4DE9173E549F
2328WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{FF0E4172-E7C1-4C6F-BE60-EB9BC8D7F65A}.tmpbinary
MD5:FF79CE16FEA4FDA498916D8A77F3E387
SHA256:2FC5982CA4EBCBFFF1614B9E598DFA5D4E371E386F70FCA6DB4F06DBDD5791FA
3628powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:CAEA3B1F09925DA2A47C2B8B890AB890
SHA256:66F29B00CBB7B1DED878F96AAC6F52907C088DE194A1FD0CD6E1FF1916047549
3628powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RHCOBQ5IZQ0OFMP8DQ9W.tempbinary
MD5:CAEA3B1F09925DA2A47C2B8B890AB890
SHA256:66F29B00CBB7B1DED878F96AAC6F52907C088DE194A1FD0CD6E1FF1916047549
2328WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:95763447D8A83A910209A45B388E770A
SHA256:376424B835CEBFE578C730870D964D51B68CDAC6BFCC3D273D76107E6FE34D4B
2328WINWORD.EXEC:\Users\admin\Desktop\~$amemaster.rtfbinary
MD5:4F43780A31436FD13BF17E4A4164256D
SHA256:D94DEEABF8DC0593FBA0F3FE8FBBDCA5E861A83DBDF55DCC837CF09683570DC7
2328WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{63E46891-05EF-4ACF-8DC1-8F7E16C1AD0B}.tmpbinary
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
2328WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\framemaster.rtf.LNKbinary
MD5:8F47977E1DCBDA96209ED67505EF86D4
SHA256:AF1AC5E724C204B0AC7A6ED8F315DAF572601F97F29488A886E7876B0C2D3E57
2328WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{59CA3AC7-9E9F-4C2F-B066-CB86D5E543D3}.tmpbinary
MD5:E64F5A033ACD89DF8EC15FFE822C6603
SHA256:FEC3D8A868B370E7B8A5F16095C7D3EA4F03EA0754F9B7444E6427CEB8AFBC8F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
26
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1628
CCleaner.exe
GET
200
2.19.198.72:80
http://ncc.avast.com/ncc.txt
unknown
text
26 b
unknown
1628
CCleaner.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?bdbb001089eff8e2
unknown
compressed
4.66 Kb
unknown
1628
CCleaner.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c4e99be422a1cd6e
unknown
compressed
4.66 Kb
unknown
1628
CCleaner.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1c0df5e8080b02d0
unknown
compressed
4.66 Kb
unknown
1628
CCleaner.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a2ab061e691abfe8
unknown
compressed
4.66 Kb
unknown
1628
CCleaner.exe
GET
200
172.217.169.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
unknown
binary
724 b
unknown
1628
CCleaner.exe
GET
200
172.217.169.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
1628
CCleaner.exe
GET
200
172.217.169.131:80
http://ocsp.pki.goog/s/gts1d4/EZ_Epm5ijiI/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDl6izFG5X1chDPk3g1%2BZDG
unknown
binary
472 b
unknown
484
lsass.exe
GET
200
18.66.142.79:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
binary
1.39 Kb
unknown
1628
CCleaner.exe
GET
200
172.217.169.131:80
http://ocsp.pki.goog/s/gts1d4/ApQzOF39EDk/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDomrJT6Y%2FrFhKE4gUosvin
unknown
binary
472 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
1628
CCleaner.exe
2.19.198.72:80
ncc.avast.com
Akamai International B.V.
DE
unknown
1628
CCleaner.exe
34.117.223.223:443
analytics.ff.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1628
CCleaner.exe
2.16.97.131:443
www.ccleaner.com
Akamai International B.V.
NL
unknown
1628
CCleaner.exe
34.111.24.1:443
ipm-provider.ff.avast.com
GOOGLE
US
unknown
1628
CCleaner.exe
34.160.176.28:443
shepherd.ff.avast.com
GOOGLE
US
unknown
1628
CCleaner.exe
34.149.149.62:443
ip-info.ff.avast.com
GOOGLE
US
unknown
1628
CCleaner.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted

DNS requests

Domain
IP
Reputation
ncc.avast.com
  • 2.19.198.72
  • 2.19.198.59
whitelisted
analytics.ff.avast.com
  • 34.117.223.223
whitelisted
www.ccleaner.com
  • 2.16.97.131
whitelisted
ipm-provider.ff.avast.com
  • 34.111.24.1
whitelisted
shepherd.ff.avast.com
  • 34.160.176.28
whitelisted
ip-info.ff.avast.com
  • 34.149.149.62
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.pki.goog
  • 172.217.169.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
healthcheck.ccleaner.com
  • 40.71.11.133
unknown

Threats

No threats detected
Process
Message
CCleaner.exe
[2023-10-23 10:35:04.235] [error ] [settings ] [ 1628: 3928] [6000C4: 356] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
Failed to open log file 'C:\Program Files\CCleaner'
CCleaner.exe
OnLanguage - en
CCleaner.exe
[2023-10-23 10:35:04.688] [error ] [settings ] [ 1628: 3912] [9434E9: 359] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
[2023-10-23 10:35:04.703] [error ] [Burger ] [ 1628: 3912] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
[2023-10-23 10:35:04.703] [error ] [Burger ] [ 1628: 3912] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
startCheckingLicense()
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en