| File name: | Winhance.ps1 |
| Full analysis: | https://app.any.run/tasks/b4cadba3-e670-41ae-b29c-60496cf9815c |
| Verdict: | Malicious activity |
| Analysis date: | February 14, 2025, 18:28:13 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with CRLF line terminators |
| MD5: | F96CB921FD8E27EAB044A76D33B5CCD7 |
| SHA1: | 1FD8EAA1626931F15ACB56D9327173B8EAE301D7 |
| SHA256: | E66A699BCC7BB9368C6E9D86DCF0CA7B589D2006AEB5590A8227400C1E2D00F8 |
| SSDEEP: | 6144:+Qy8DgVcvPbksVuEKVfGdnZnVn6aWBul3G:+Qy8f1Gv |
| .xaml | | | Microsoft Extensible Application Markup Language (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 596 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\Desktop\Winhance.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2032 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES1633.tmp" "c:\Users\admin\AppData\Local\Temp\CSCC4C9D8ABAD53426BA1757B2642355A.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 2700 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\uy512rl2\uy512rl2.cmdline" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 3256 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3664 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES22F5.tmp" "c:\Users\admin\AppData\Local\Temp\uy512rl2\CSC1E1866CC36AE4AA7AAB7F66D358CB2B.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 4012 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES15A7.tmp" "c:\Users\admin\AppData\Local\Temp\CSCF5F3DAAB1ABB473B9570AEDDCD311559.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 4168 | C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.795_none_047def894cac2b60\TiWorker.exe -Embedding | C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.795_none_047def894cac2b60\TiWorker.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Modules Installer Worker Exit code: 0 Version: 10.0.22000.795 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4176 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\admin\Desktop\Winhance.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4260 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES2278.tmp" "c:\Users\admin\AppData\Local\Temp\e3utysyt\CSC8B6E4FFBA5B54B0BACBC63A1B3FA5A.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 5232 | C:\Users\admin\AppData\Local\Temp\BFF8DFCD-61BA-487F-AB1C-2236BB088B70\dismhost.exe {B1FB260C-C1D8-43C8-8AC9-E8D500F59176} | C:\Users\admin\AppData\Local\Temp\BFF8DFCD-61BA-487F-AB1C-2236BB088B70\DismHost.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Host Servicing Process Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (596) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (596) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (596) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (596) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (4176) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (4176) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (4176) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (4176) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (4168) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdHigh |
Value: 31162126 | |||
| (PID) Process: | (4168) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdLow |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4012 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RES15A7.tmp | binary | |
MD5:ABEBB2BF0685A93F5D348DF74520693B | SHA256:59698907EC5E31B15AC3B4AA7C9F4D355159995D31DAA9676E17F25E136AC870 | |||
| 596 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zrwl3zvk.lgq.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7128 | csc.exe | C:\Users\admin\AppData\Local\Temp\g0gccfer.out | text | |
MD5:A06614A76F38ED09743BCBEFC6F9DF95 | SHA256:7737E6845483DB128009554B0C1292A9EDDD43C4CB8F805082407E256BAC6407 | |||
| 596 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wksnqbfe.ns0.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 596 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF25078d.TMP | binary | |
MD5:237E19DC75ACC63ACE8E9AEE22F875F4 | SHA256:D7FDDF203D2B28EC578D77014357A3CE17C5A0277875D74FEE62FF89ABEEC253 | |||
| 596 | powershell.exe | C:\Users\admin\AppData\Local\Temp\g0gccfer.0.cs | text | |
MD5:0E2CDC2657BE537834C77429EC55CF02 | SHA256:3817813F399AD49DA2ED1F1FF3B044D8E80934C6E83E9FFFE06E6ECDFE1195AE | |||
| 6380 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSCC4C9D8ABAD53426BA1757B2642355A.TMP | binary | |
MD5:EEE88BBFF2E33AB174A336828A6F9DFA | SHA256:7788181112F30260367B5AAEF6C3A69DD3764A05CFA2F8359A435E8FF4B3E228 | |||
| 7128 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSCF5F3DAAB1ABB473B9570AEDDCD311559.TMP | binary | |
MD5:0D991CB8DB9416A108A697201BEC773E | SHA256:7155467F31DC3C45038069CB42E25E97121DE0586A1BB297B3E4A0B2B83425CC | |||
| 7128 | csc.exe | C:\Users\admin\AppData\Local\Temp\g0gccfer.dll | executable | |
MD5:9F0A002025B470DA5F9190E25C4DEC99 | SHA256:824CCF8892C45F68007A58079808A879EE5068B8C7DDC2B57D938318BC83D65F | |||
| 596 | powershell.exe | C:\Users\admin\AppData\Local\Temp\onmpebyt.cmdline | text | |
MD5:5F52115B5C4B1B8CEF5C04C7CF0FCF8E | SHA256:FA615B7AC84E62E01F762096F9E6B8574B3E1FD5FE3523E67B2CB405EB5E06E8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 104.124.11.219:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | — | — | whitelisted |
2932 | MoUsoCoreWorker.exe | GET | 200 | 217.20.57.19:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ece3e531bf08729f | unknown | — | — | whitelisted |
— | — | HEAD | 200 | 23.35.236.109:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
2860 | svchost.exe | GET | 200 | 88.221.110.91:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0b3de69d37a33f41 | unknown | — | — | whitelisted |
2860 | svchost.exe | GET | 200 | 88.221.110.91:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?d427199d7579a766 | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.236.109:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | binary | 55 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 104.124.11.219:80 | — | Akamai International B.V. | DE | unknown |
2932 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2932 | MoUsoCoreWorker.exe | 217.20.57.19:80 | ctldl.windowsupdate.com | — | US | whitelisted |
5552 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4592 | svchost.exe | 92.123.18.162:443 | fs.microsoft.com | AKAMAI-AS | AT | whitelisted |
2860 | svchost.exe | 88.221.110.91:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Microsoft Connection Test |
Process | Message |
|---|---|
powershell.exe | PID=4176 TID=4152 DismApi.dll: <----- Starting DismApi.dll session -----> - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 Input parameters: LogLevel: 2, LogFilePath: C:\Windows\Logs\DISM\dism.log, ScratchDirectory: (null) - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 DismApi.dll: - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 DismApi.dll: - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 DismApi.dll: Host machine information: OS Version=10.0.22000, Running architecture=amd64, Number of processors=4 - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 DismApi.dll: Parent process command line: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\admin\Desktop\Winhance.ps1" - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 DismApi.dll: API Version 10.0.22000.653 - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 Enter - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 Initialized SessionTable - DismInitializeInternal
|
powershell.exe | PID=4176 TID=4152 Lookup in table by path failed for: DummyPath-2BA51B78-C7F7-4910-B99D-BB7345357CDC - CTransactionalImageTable::LookupImagePath
|