File name:

ransom_full.ps1

Full analysis: https://app.any.run/tasks/27cf95d9-3a89-4ba3-8139-d9d53b92be30
Verdict: Malicious activity
Analysis date: May 26, 2025, 13:44:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text
MD5:

432B0DD915AE7AAC516F6499E3510E3A

SHA1:

E2D605AC670C8DFEA73C208A6305F2071470FC08

SHA256:

6EC7395D45B58665E9FBC0EE6D3A67F9B6D6E74CAA934020FFFC2A188053A4F2

SSDEEP:

192:we2FxI8OeO2EcenE/v8fFUiiVc5rtfNjxZex4Cy7KRgTKc:t2FZO7cb3yrxnZuRRgOc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7512)
    • Gets or sets the symmetric key that is used for encryption and decryption (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Gets or sets the initialization vector for the symmetric algorithm (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 7512)
  • SUSPICIOUS

    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 7512)
    • The process creates files with name similar to system file names

      • wermgr.exe (PID: 8120)
    • Uses sleep to delay execution (POWERSHELL)

      • powershell.exe (PID: 7512)
  • INFO

    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 7512)
    • Creates files in the program directory

      • powershell.exe (PID: 7512)
    • Checks proxy server information

      • wermgr.exe (PID: 8120)
    • Reads the software policy settings

      • wermgr.exe (PID: 8120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs conhost.exe no specs wermgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
7512"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\ransom_full.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\gdi32.dll
7520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
8120"C:\WINDOWS\system32\wermgr.exe" "-outproc" "0" "7512" "2876" "2900" "2880" "0" "0" "1140" "0" "0" "0" "0" "0" C:\Windows\System32\wermgr.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wermgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
Total events
8 313
Read events
8 313
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
17
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
7512powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ixoprnpd.a4b.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7512powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qyouxsqg.qay.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8120wermgr.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_cd6b96918c74ad6ac44ab8fec58e6dc57a9c95f6_00000000_983a933a-c5b6-450d-b9ff-da66e9d41d0f\Report.wer
MD5:
SHA256:
7512powershell.exeC:\Users\admin\Desktop\actionsrequired.png.encbinary
MD5:1E7289BC7C39CC292C0B4FDB00A3187F
SHA256:D78632439C96D5DD8ED97088BB0B7A9136FAC947BB42697ECF516C384EB27F1E
7512powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:60CDA96DF71F60243177CC009A0BDDDF
SHA256:7CBF401895A87C58BC48B0E543824D34F4F3E050EF2E4174050C43B81E1FEC2D
7512powershell.exeC:\Users\admin\Desktop\appliedspecies.png.encbinary
MD5:5F45986772741E508D4C87E90913B309
SHA256:DF57E5A764A4A29EDC5382C07A057B2A03F40F5680FD4F9BE070CC10636CC306
7512powershell.exeC:\Users\admin\Desktop\boysact.rtf.encbinary
MD5:F43302437C75A9820D638B5A7952A59E
SHA256:2454F0FE44DFFECE8458AF0E7C95E58EBAED0CC6F0D0D62C6255495A4B70FCEF
7512powershell.exeC:\Users\admin\Desktop\articlesell.rtf.encbinary
MD5:19CCEEAA505988F63E6E91D50DE6C18B
SHA256:D04F7D59C41469FAC2DA12606B13E4B99D526CEB26D7C5B2C1ECBAAA089714AC
7512powershell.exeC:\Users\admin\Desktop\findenvironmental.jpg.encbinary
MD5:549B1360C4BB9BB4EB55BD52EDBFB2EE
SHA256:72F60AE25F81BCF15A0A71D47A7EF4E11D386BDED9402375FD4108FC81FBE036
7512powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ADJHHLK1N8JUU7RWU0VA.tempbinary
MD5:60CDA96DF71F60243177CC009A0BDDDF
SHA256:7CBF401895A87C58BC48B0E543824D34F4F3E050EF2E4174050C43B81E1FEC2D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
29
DNS requests
11
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7844
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7844
SIHClient.exe
40.69.42.241:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8120
wermgr.exe
20.42.73.29:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.4
  • 20.190.160.5
  • 20.190.160.132
  • 20.190.160.2
  • 20.190.160.130
  • 20.190.160.67
  • 40.126.32.68
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
  • 2603:1030:7::106
whitelisted
241.42.69.40.in-addr.arpa
unknown
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
watson.events.data.microsoft.com
  • 20.42.73.29
whitelisted

Threats

No threats detected
No debug info