File name:

psc.ps1

Full analysis: https://app.any.run/tasks/04513c1b-2a32-448b-af06-1c7c7f247706
Verdict: Malicious activity
Analysis date: May 15, 2025, 14:35:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pentagon
Indicators:
MIME: text/plain
File info: ASCII text
MD5:

F518BB1D7C29733E33FDA16B6C901D7F

SHA1:

0AC259BDCA52290FB7EFFEB40C8592D2E29B647E

SHA256:

ABDB52EB4C6B01CDE5D2040A824613911176DC32E5F980CDDA3CA1824C190B50

SSDEEP:

24:DtDdnQA0daQD1V8fayVTfkuomF+BSVa3JB47lRXw4n+x:DtDdnQA0daQD1YaOfbD+BYmJaRXVn6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4688)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 4688)
    • PENTAGON has been detected (SURICATA)

      • svchost.exe (PID: 2196)
  • SUSPICIOUS

    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 4688)
    • Process drops python dynamic module

      • powershell.exe (PID: 4688)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 4688)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 4688)
    • Checks proxy server information

      • powershell.exe (PID: 4688)
    • Reads the software policy settings

      • slui.exe (PID: 5964)
    • The sample compiled with english language support

      • powershell.exe (PID: 4688)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe #PENTAGON svchost.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1184\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4688"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\psc.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5964"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6964C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
5 892
Read events
5 892
Write events
0
Delete events
0

Modification events

No data
Executable files
63
Suspicious files
650
Text files
863
Unknown types
0

Dropped files

PID
Process
Filename
Type
4688powershell.exeC:\Users\admin\AppData\Local\Temp\packaged_py.zip
MD5:
SHA256:
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\ccompiler.pytext
MD5:5016BC3AA3F657AD3A372C457A5A5256
SHA256:14A563AB3189EDCF85B68B8D8E12E268C3E6E4B28C6471C0AEE5DFF0B536D7A7
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\archive_util.pytext
MD5:F5062DBEC8D8D95430887B6AEEC52293
SHA256:430DB3F8FB7E355F2535442BCE3B375C31960961CC3E7A872F2B7C4E20F65C40
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\command\bdist_rpm.pytext
MD5:7965900898F3BD4F599E7E779D746A2C
SHA256:9F17175EFE5AEC1FB59ED5AEE036C6982B444B810120DAC968141C44D0180892
4688powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF10fb59.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
4688powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_sl4of4lg.vl5.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\command\bdist_dumb.pytext
MD5:B1E7582AB4F7D4E705160979124B860C
SHA256:1F1D6302AA19371608CB83794CBCD4A7A2797E2F0BB35F29CBB5252CD1613B61
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\command\build_clib.pytext
MD5:A05AB1F8947411CA54DC6D9A956B1AE4
SHA256:68CA997147C26CE02EFF1AFE03D896F90F58647CE90C62D14DECCE80C4099924
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\command\build.pytext
MD5:0CDF0DCC75985413F30921C9291B6BA0
SHA256:4A91E56A07F488D68A572221C437E13C567C5F5F8B0163824000B2FB2B762B4C
4688powershell.exeC:\Users\admin\AppData\Roaming\brudilamborschini\Data\pythonkampf\Lib\distutils\command\build_ext.pytext
MD5:C3C34017E1A23CAED328990B0C7E13D4
SHA256:CEBAECBBD1D79F357A6D761B26E6422B84B05593232A7978A46D68DDB35CC6D7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1300
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1300
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4688
powershell.exe
185.178.208.160:443
stealer.cy
Ddos-guard Ltd
RU
malicious
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4784
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
stealer.cy
  • 185.178.208.160
malicious
login.live.com
  • 40.126.31.71
  • 40.126.31.129
  • 20.190.159.2
  • 20.190.159.129
  • 20.190.159.71
  • 20.190.159.128
  • 40.126.31.67
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Pentagon Malware (stealer .cy)
No debug info