IOC Report
new.cmd

loading gif

Files

File Path
Type
Category
Malicious
new.cmd
DOS batch file, ASCII text, with CRLF line terminators
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wo3hzfje.uuq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xc45uhss.xtb.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -ExecutionPolicy Bypass -File "C:\Users\user\Pictures\install.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://go.microsoft.coP
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7DF4E3D30000
trusted library allocation
page execute and read and write
17773401000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page execute and read and write
1A012BE000
stack
page read and write
17761800000
trusted library allocation
page read and write
7FFB4B2C7000
trusted library allocation
page read and write
7FFB4B11D000
trusted library allocation
page execute and read and write
17761770000
heap
page read and write
17773411000
trusted library allocation
page read and write
1776344A000
trusted library allocation
page read and write
7FFB4B120000
trusted library allocation
page read and write
1A014BE000
stack
page read and write
17773473000
trusted library allocation
page read and write
17763452000
trusted library allocation
page read and write
1776330C000
heap
page read and write
7FFB4B12C000
trusted library allocation
page read and write
177632E8000
heap
page read and write
7FFB4B230000
trusted library allocation
page execute and read and write
1776349A000
trusted library allocation
page read and write
17763294000
heap
page read and write
7FFB4B123000
trusted library allocation
page read and write
7FFB4B1CC000
trusted library allocation
page execute and read and write
7FFB4B1C6000
trusted library allocation
page read and write
17761820000
trusted library allocation
page read and write
17763412000
trusted library allocation
page read and write
177615A0000
heap
page read and write
17761830000
heap
page readonly
17763200000
heap
page read and write
1A0117E000
stack
page read and write
1A01337000
stack
page read and write
177632A0000
heap
page read and write
17761934000
heap
page read and write
1A00F7E000
stack
page read and write
177618F0000
heap
page execute and read and write
1A0107D000
stack
page read and write
1A0153E000
stack
page read and write
1A013BE000
stack
page read and write
1776169C000
heap
page read and write
7FFB4B1C0000
trusted library allocation
page read and write
177615CF000
heap
page read and write
17761686000
heap
page read and write
177618B0000
trusted library allocation
page read and write
7FFB4B2D0000
trusted library allocation
page execute and read and write
1776341B000
trusted library allocation
page read and write
177633F0000
heap
page execute and read and write
1A00FFE000
stack
page read and write
177615A8000
heap
page read and write
17763290000
heap
page read and write
177615DE000
heap
page read and write
1A00BD6000
stack
page read and write
177615C9000
heap
page read and write
1A00EFF000
stack
page read and write
177615DC000
heap
page read and write
17761930000
heap
page read and write
7FFB4B2C1000
trusted library allocation
page read and write
1A010FF000
stack
page read and write
1A00E7E000
stack
page read and write
1776346A000
trusted library allocation
page read and write
17763455000
trusted library allocation
page read and write
17761790000
heap
page read and write
17763401000
trusted library allocation
page read and write
7FFB4B112000
trusted library allocation
page read and write
7FFB4B1F6000
trusted library allocation
page execute and read and write
17761580000
heap
page read and write
177615FC000
heap
page read and write
17761625000
heap
page read and write
7FFB4B113000
trusted library allocation
page execute and read and write
1A0143A000
stack
page read and write
17773407000
trusted library allocation
page read and write
1A011FE000
stack
page read and write
1776333A000
heap
page read and write
1777B7D1000
heap
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
177617C0000
heap
page read and write
7FFB4B114000
trusted library allocation
page read and write
1A01279000
stack
page read and write
7FFB4B2C5000
trusted library allocation
page read and write
There are 67 hidden memdumps, click here to show them.