| File name: | ransom_full.ps1 |
| Full analysis: | https://app.any.run/tasks/27cf95d9-3a89-4ba3-8139-d9d53b92be30 |
| Verdict: | Malicious activity |
| Analysis date: | May 26, 2025, 13:44:48 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | text/plain |
| File info: | Unicode text, UTF-8 text |
| MD5: | 432B0DD915AE7AAC516F6499E3510E3A |
| SHA1: | E2D605AC670C8DFEA73C208A6305F2071470FC08 |
| SHA256: | 6EC7395D45B58665E9FBC0EE6D3A67F9B6D6E74CAA934020FFFC2A188053A4F2 |
| SSDEEP: | 192:we2FxI8OeO2EcenE/v8fFUiiVc5rtfNjxZex4Cy7KRgTKc:t2FZO7cb3yrxnZuRRgOc |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 7512 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\ransom_full.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7520 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
| 8120 | "C:\WINDOWS\system32\wermgr.exe" "-outproc" "0" "7512" "2876" "2900" "2880" "0" "0" "1140" "0" "0" "0" "0" "0" | C:\Windows\System32\wermgr.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7512 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ixoprnpd.a4b.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7512 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qyouxsqg.qay.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 8120 | wermgr.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_cd6b96918c74ad6ac44ab8fec58e6dc57a9c95f6_00000000_983a933a-c5b6-450d-b9ff-da66e9d41d0f\Report.wer | — | |
MD5:— | SHA256:— | |||
| 7512 | powershell.exe | C:\Users\admin\Desktop\actionsrequired.png.enc | binary | |
MD5:1E7289BC7C39CC292C0B4FDB00A3187F | SHA256:D78632439C96D5DD8ED97088BB0B7A9136FAC947BB42697ECF516C384EB27F1E | |||
| 7512 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | binary | |
MD5:60CDA96DF71F60243177CC009A0BDDDF | SHA256:7CBF401895A87C58BC48B0E543824D34F4F3E050EF2E4174050C43B81E1FEC2D | |||
| 7512 | powershell.exe | C:\Users\admin\Desktop\appliedspecies.png.enc | binary | |
MD5:5F45986772741E508D4C87E90913B309 | SHA256:DF57E5A764A4A29EDC5382C07A057B2A03F40F5680FD4F9BE070CC10636CC306 | |||
| 7512 | powershell.exe | C:\Users\admin\Desktop\boysact.rtf.enc | binary | |
MD5:F43302437C75A9820D638B5A7952A59E | SHA256:2454F0FE44DFFECE8458AF0E7C95E58EBAED0CC6F0D0D62C6255495A4B70FCEF | |||
| 7512 | powershell.exe | C:\Users\admin\Desktop\articlesell.rtf.enc | binary | |
MD5:19CCEEAA505988F63E6E91D50DE6C18B | SHA256:D04F7D59C41469FAC2DA12606B13E4B99D526CEB26D7C5B2C1ECBAAA089714AC | |||
| 7512 | powershell.exe | C:\Users\admin\Desktop\findenvironmental.jpg.enc | binary | |
MD5:549B1360C4BB9BB4EB55BD52EDBFB2EE | SHA256:72F60AE25F81BCF15A0A71D47A7EF4E11D386BDED9402375FD4108FC81FBE036 | |||
| 7512 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ADJHHLK1N8JUU7RWU0VA.temp | binary | |
MD5:60CDA96DF71F60243177CC009A0BDDDF | SHA256:7CBF401895A87C58BC48B0E543824D34F4F3E050EF2E4174050C43B81E1FEC2D | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2112 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6544 | svchost.exe | 20.190.160.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7844 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7844 | SIHClient.exe | 40.69.42.241:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
8120 | wermgr.exe | 20.42.73.29:443 | watson.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
241.42.69.40.in-addr.arpa |
| unknown |
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa |
| unknown |
watson.events.data.microsoft.com |
| whitelisted |