IOC Report
Windows_Update.bat

loading gif

Files

File Path
Type
Category
Malicious
Windows_Update.bat
DOS batch file, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_542shvpd.4wd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1o51n3z.min.psm1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Windows_Update.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\Windows_Update.bat" MY_FLAG
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -ExecutionPolicy Bypass -File "C:\Users\user\Pictures\payload.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 5 /nobreak

URLs

Name
IP
Malicious
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFB10EC0000
trusted library allocation
page read and write
7FFB10F93000
trusted library allocation
page read and write
20BDDDCE000
heap
page read and write
20BC59D4000
trusted library allocation
page read and write
7FFB10E76000
trusted library allocation
page read and write
20BC3E1D000
heap
page read and write
41CA0FF000
stack
page read and write
7FFB10D50000
trusted library allocation
page read and write
20BC598A000
trusted library allocation
page read and write
20BC4025000
heap
page read and write
41CA17E000
stack
page read and write
7FFB10EB1000
trusted library allocation
page read and write
7FFB10EB7000
trusted library allocation
page read and write
20BDDD70000
heap
page read and write
7FFB10E72000
trusted library allocation
page read and write
20BDDE39000
heap
page read and write
7FFB10E6D000
trusted library allocation
page read and write
20BC3DB6000
heap
page read and write
7FFB10E7D000
trusted library allocation
page read and write
20BC3D8D000
heap
page read and write
7FFB10ECA000
trusted library allocation
page read and write
1BFEB560000
heap
page read and write
82B537E000
stack
page read and write
7FFB10CBC000
trusted library allocation
page read and write
20BC59C0000
trusted library allocation
page read and write
82B563A000
stack
page read and write
7FFB10E5C000
trusted library allocation
page read and write
7FFB10CB0000
trusted library allocation
page read and write
7FFB10CA2000
trusted library allocation
page read and write
1BFECD50000
heap
page read and write
82B53FF000
stack
page read and write
7FFB10DC0000
trusted library allocation
page execute and read and write
7FFB10E40000
trusted library allocation
page read and write
20BDDE14000
heap
page read and write
7FFB10D56000
trusted library allocation
page read and write
20BC5910000
heap
page read and write
7FFB10CB3000
trusted library allocation
page read and write
20BDDDC2000
heap
page read and write
7FFB10D5C000
trusted library allocation
page execute and read and write
20BC4070000
heap
page read and write
20BC5994000
trusted library allocation
page read and write
20BC5965000
trusted library allocation
page read and write
7FFB10EAB000
trusted library allocation
page read and write
20BC3C70000
heap
page read and write
7FFB10F97000
trusted library allocation
page read and write
7FFB10F35000
trusted library allocation
page read and write
7FFB10EE0000
trusted library allocation
page read and write
20BDDE17000
heap
page read and write
20BC3DBC000
heap
page read and write
7FFB10F63000
trusted library allocation
page read and write
82B4EF2000
stack
page read and write
7FFB10CAD000
trusted library allocation
page execute and read and write
20BC5984000
trusted library allocation
page read and write
20BC3D30000
heap
page read and write
20BC3F40000
heap
page read and write
20BD5990000
trusted library allocation
page read and write
82B57BF000
stack
page read and write
82B573E000
stack
page read and write
20BD592F000
trusted library allocation
page read and write
7FFB10F4E000
trusted library allocation
page read and write
20BDDDB4000
heap
page read and write
20BC3D6D000
heap
page read and write
7FFB10FD0000
trusted library allocation
page read and write
7FFB10F00000
trusted library allocation
page read and write
7FFB10FE0000
trusted library allocation
page read and write
82B4F7E000
stack
page read and write
7FFB10FA0000
trusted library allocation
page read and write
1BFECF45000
heap
page read and write
7FFB10EF0000
trusted library allocation
page read and write
20BC5921000
trusted library allocation
page read and write
82B55B4000
stack
page read and write
7FFB10EE3000
trusted library allocation
page read and write
7FFB10CB7000
trusted library allocation
page read and write
7FFB10E60000
trusted library allocation
page read and write
20BC3F80000
trusted library allocation
page read and write
20BD5931000
trusted library allocation
page read and write
7FFB11000000
trusted library allocation
page execute and read and write
7FFB10E9C000
trusted library allocation
page read and write
82B54F6000
stack
page read and write
20BC3D71000
heap
page read and write
20BC3E28000
heap
page read and write
7FFB10F90000
trusted library allocation
page read and write
20BC3E2E000
heap
page read and write
7FFB10EB9000
trusted library allocation
page read and write
7FFB10FB0000
trusted library allocation
page read and write
7FFB10F9C000
trusted library allocation
page read and write
7FFB10F20000
trusted library allocation
page read and write
7FFB10ED1000
trusted library allocation
page read and write
20BC593B000
trusted library allocation
page read and write
7FFB10EE6000
trusted library allocation
page read and write
20BC3D79000
heap
page read and write
7FFB10F70000
trusted library allocation
page read and write
7FFB10FF0000
trusted library allocation
page read and write
7FFB10EA7000
trusted library allocation
page read and write
7FFB10FC0000
trusted library allocation
page read and write
82B4FFE000
stack
page read and write
20BC4075000
heap
page read and write
20BC4020000
heap
page read and write
20BC5998000
trusted library allocation
page read and write
20BDE000000
heap
page read and write
1BFEB460000
heap
page read and write
1BFEB469000
heap
page read and write
7FFB10D60000
trusted library allocation
page execute and read and write
20BC58B0000
heap
page execute and read and write
82B553F000
stack
page read and write
7FFB10E69000
trusted library allocation
page read and write
7FFB10CA3000
trusted library allocation
page execute and read and write
7FFB10E50000
trusted library allocation
page read and write
7FFB10E90000
trusted library allocation
page read and write
7FFB10F3C000
trusted library allocation
page read and write
7FFB10EC3000
trusted library allocation
page read and write
20BC3FA0000
trusted library allocation
page read and write
20BC3D42000
heap
page read and write
20BC3D38000
heap
page read and write
7FFB10D86000
trusted library allocation
page execute and read and write
7FFB10F80000
trusted library allocation
page read and write
20BC3CF0000
heap
page read and write
20BDDF40000
heap
page execute and read and write
82B52FA000
stack
page read and write
82B527E000
stack
page read and write
20BC5968000
trusted library allocation
page read and write
20BC3FB0000
heap
page readonly
20BD5921000
trusted library allocation
page read and write
7FFB10E97000
trusted library allocation
page read and write
7FFB10F10000
trusted library allocation
page read and write
7FFB10E67000
trusted library allocation
page read and write
20BC3FC0000
trusted library allocation
page read and write
7FFB10E7B000
trusted library allocation
page read and write
20BDDD76000
heap
page read and write
7FFB10F5C000
trusted library allocation
page read and write
7FFB10CA4000
trusted library allocation
page read and write
20BC593F000
trusted library allocation
page read and write
82B547F000
stack
page read and write
82B56BE000
stack
page read and write
20BDDE56000
heap
page read and write
20BC596F000
trusted library allocation
page read and write
20BD5929000
trusted library allocation
page read and write
41CA07C000
stack
page read and write
1BFECF40000
heap
page read and write
7DF3FFC80000
trusted library allocation
page execute and read and write
7FFB10CA0000
trusted library allocation
page read and write
20BDEBB0000
heap
page read and write
20BC3F00000
heap
page read and write
1BFEB310000
heap
page read and write
There are 134 hidden memdumps, click here to show them.