File name:

update.ps1

Full analysis: https://app.any.run/tasks/641bfde1-4654-4170-8de0-409a2ca4b5ad
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 05, 2024, 19:41:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with CRLF line terminators
MD5:

40474667513999E07D67B52B491C5A82

SHA1:

CCDC58CAADD82DC46DB778692A13D459367F7238

SHA256:

32E48AD1DB82AD17BD5B566A4A89F01D0AE0BCC2B54CA5B543699E12F68B3100

SSDEEP:

24:7nAMKqgQBeNvZ1k0V6W7Zy6WLS9Bf3P3vTRU:7n4qRsh1k0V6Wly6WLSff//1U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • powershell.exe (PID: 3672)
  • SUSPICIOUS

    • Unusual connection from system programs

      • powershell.exe (PID: 3672)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 3672)
    • Reads the Internet Settings

      • powershell.exe (PID: 3672)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 3672)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3672)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 3672)
    • Connects to the server without a host name

      • powershell.exe (PID: 3672)
  • INFO

    • Reads the computer name

      • wmpnscfg.exe (PID: 3304)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3304)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3304"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3672"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\update.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
6 001
Read events
5 939
Write events
62
Delete events
0

Modification events

(PID) Process:(3672) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3672) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3672) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3672) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3672) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
2
Suspicious files
6
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3672powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
3672powershell.exeC:\Users\admin\AppData\Local\Temp\iceqqln4.zwl.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3672powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:6675EDE59684F4A119D2E5DA282AFBE6
SHA256:5026C5EE8FA9ACB21718BF1FAD563C0A3FD5BC79327611FDF9C4ABD2647CE829
3672powershell.exeC:\Users\admin\AppData\Local\Temp\1wpqlxp4.4zs.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3672powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1V29TI4F1WY8I5HN8UZ5.tempbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
3672powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF17f2eb.TMPbinary
MD5:0268C3470C936E6FBAC2945B9E1C2099
SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9
3672powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
3672powershell.exeC:\Users\admin\AppData\Local\SumatraPDF-3.5.2-64-install.exeexecutable
MD5:D3269F0F422D36F24E62BD30AE722BFD
SHA256:2BE4A27B83830EA07C6671C3557673D509544E5F70FC6B2DC8CC4388B302C1F2
3672powershell.exeC:\Users\admin\AppData\Local\dbgcore.dllexecutable
MD5:46D6B9DC3A80C496F11288824838C9E6
SHA256:F2F9FE34DE411872E89CAB8F8576B3A3AD91DAFCBEAA78F7D2EEA0E9AB645518
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
0
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3672
powershell.exe
GET
200
24.199.107.91:80
http://24.199.107.91/dbgcore.dll
unknown
executable
140 Kb
unknown
3672
powershell.exe
GET
200
24.199.107.91:80
http://24.199.107.91/SumatraPDF-3.5.2-64-install.exe
unknown
executable
7.86 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3672
powershell.exe
24.199.107.91:80
US
unknown

DNS requests

No data

Threats

PID
Process
Class
Message
3672
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3672
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
3672
powershell.exe
Misc activity
ET INFO Request for EXE via Powershell
3672
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3672
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
3672
powershell.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
3672
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
3672
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info