File name:

iex(New-Object Net.WebClient).Downl.txt

Full analysis: https://app.any.run/tasks/154a1524-7201-49c5-bb55-b93cfa42ab7d
Verdict: Malicious activity
Analysis date: April 24, 2024, 11:30:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

9E25CDA7F09A351A453B479228D9EC38

SHA1:

9284B5AAF544FE1043E9A8DCFAC83D37EC2ADA73

SHA256:

89F38469943CD04A0E08D7EDA9342CFE02053FC66918D8BA51976C8A88442C0D

SSDEEP:

12:ZrOIMGaKKbEDuyZznolekZKYGqHWjr33mJyGHWz81PKCvVYts3Lgd3pjJywADpX:gIMGzmyZclP0YbHW3WfHW41PKC9db2x0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Starts Visual C# compiler

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Drops the executable file immediately after the start

      • csc.exe (PID: 3432)
      • csc.exe (PID: 2184)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3956)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Reads the Internet Settings

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
      • powershell_ise.exe (PID: 1392)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Unusual connection from system programs

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 3432)
      • csc.exe (PID: 2184)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
    • Deletes system .NET executable

      • dialer.exe (PID: 3772)
      • dialer.exe (PID: 3500)
    • Reads settings of System Certificates

      • powershell_ise.exe (PID: 1392)
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 392)
      • csc.exe (PID: 3432)
      • cvtres.exe (PID: 2056)
      • csc.exe (PID: 2184)
      • cvtres.exe (PID: 4044)
      • AddInProcess32.exe (PID: 4020)
      • AddInProcess32.exe (PID: 3516)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 392)
      • explorer.exe (PID: 2296)
      • powershell.exe (PID: 2240)
      • powershell.exe (PID: 3956)
      • powershell_ise.exe (PID: 1392)
    • Reads the computer name

      • wmpnscfg.exe (PID: 392)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 3432)
      • cvtres.exe (PID: 2056)
      • csc.exe (PID: 2184)
      • cvtres.exe (PID: 4044)
    • Create files in a temporary directory

      • csc.exe (PID: 3432)
      • cvtres.exe (PID: 2056)
      • csc.exe (PID: 2184)
      • cvtres.exe (PID: 4044)
      • powershell_ise.exe (PID: 1392)
    • Creates files or folders in the user directory

      • powershell_ise.exe (PID: 1392)
    • Reads the software policy settings

      • powershell_ise.exe (PID: 1392)
    • Reads security settings of Internet Explorer

      • powershell_ise.exe (PID: 1392)
    • Checks current location (POWERSHELL)

      • powershell_ise.exe (PID: 1392)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
14
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start notepad.exe no specs wmpnscfg.exe no specs explorer.exe no specs powershell.exe csc.exe cvtres.exe no specs addinprocess32.exe dialer.exe no specs powershell.exe csc.exe cvtres.exe no specs addinprocess32.exe dialer.exe no specs powershell_ise.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
324"C:\Windows\system32\NOTEPAD.EXE" "C:\Users\admin\AppData\Local\Temp\iex(New-Object Net.WebClient).Downl.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
392"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1392"C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" "C:\Users\admin\AppData\Local\Temp\iex(New-Object Net.WebClient).Downl.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell ISE
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell_ise.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2056C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESD0B5.tmp" "c:\Users\admin\AppData\Local\Temp\CSC99DBCD719DBF48808B87A2D47DA8A6F6.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.10.25028.0 built by: VCTOOLSD15RTM
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\vcruntime140_clr0400.dll
c:\windows\system32\ucrtbase_clr0400.dll
2184"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\ttfj2q4w.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\vcruntime140_clr0400.dll
c:\windows\system32\ucrtbase_clr0400.dll
2240"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\iex(New-Object Net.WebClient).Downl.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2296"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3432"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\hvg4wehb.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\vcruntime140_clr0400.dll
c:\windows\system32\ucrtbase_clr0400.dll
3500"C:\Windows\system32\dialer.exe"C:\Windows\System32\dialer.exeAddInProcess32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Phone Dialer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dialer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3516#cmdC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AddInProcess.exe
Exit code:
3221225477
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
Total events
24 090
Read events
23 909
Write events
181
Delete events
0

Modification events

(PID) Process:(324) notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
218
(PID) Process:(324) notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
80
(PID) Process:(324) notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDX
Value:
960
(PID) Process:(324) notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDY
Value:
501
(PID) Process:(2240) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2240) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2240) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2240) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2240) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(4020) AddInProcess32.exeKey:HKEY_CURRENT_USER\Software\SibCode
Operation:writeName:sn
Value:
Executable files
2
Suspicious files
18
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2240powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\M93HAOJYKEVQDWHPDJA4.tempbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
2240powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1cc4de.TMPbinary
MD5:0268C3470C936E6FBAC2945B9E1C2099
SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9
2056cvtres.exeC:\Users\admin\AppData\Local\Temp\RESD0B5.tmpo
MD5:9B42E657D537E6C740534B06E78A2F7D
SHA256:5202D1F1A0D75DE0D44C769CC150B2F54C0829D1FC8D3D676716D8B48BAD682A
2240powershell.exeC:\Users\admin\AppData\Local\Temp\ua33fj21.o1z.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3956powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AS33ZDS8QOQBCKTVAMHR.tempbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
3956powershell.exeC:\Users\admin\AppData\Local\Temp\ne3wcxpl.shc.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3956powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
3956powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1f9f65.TMPbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
1392powershell_ise.exeC:\Users\admin\AppData\Local\Microsoft_Corporation\powershell_ise.exe_StrongName_lw2v2vm3wmtzzpebq33gybmeoxukb04w\3.0.0.0\user.config
MD5:
SHA256:
4044cvtres.exeC:\Users\admin\AppData\Local\Temp\RESA716.tmpo
MD5:23C383652B6A1A0B591925F731CF0F8C
SHA256:4DE7781C4CEE098F12F65F81C112E2BD67C2801F3DD2971EDEE0D64DD3ED5A9C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
8
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
whitelisted
2240
powershell.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
unknown
2240
powershell.exe
149.154.164.13:443
telegra.ph
Telegram Messenger Inc
GB
unknown
2240
powershell.exe
78.24.180.93:443
eshoradebitcoin.com
RU
unknown
3956
powershell.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
unknown
3956
powershell.exe
149.154.164.13:443
telegra.ph
Telegram Messenger Inc
GB
unknown
3956
powershell.exe
78.24.180.93:443
eshoradebitcoin.com
RU
unknown

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
shared
telegra.ph
  • 149.154.164.13
malicious
eshoradebitcoin.com
  • 78.24.180.93
unknown

Threats

No threats detected
No debug info