IOC Report
encryptor.ps1

loading gif

Files

File Path
Type
Category
Malicious
encryptor.ps1
Unicode text, UTF-8 (with BOM) text, with very long lines (2495), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\hn0ifsok\hn0ifsok.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (549), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES87BF.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Fri May 24 03:38:14 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0numvd2g.1dw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqutyshx.tn0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hn0ifsok\CSC1C7F141CDCAE40F4922864A98F7AF3A0.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\hn0ifsok\hn0ifsok.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hn0ifsok\hn0ifsok.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\hn0ifsok\hn0ifsok.out
Unicode text, UTF-8 (with BOM) text, with very long lines (631), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2MD3KK9MAOKNR60S1YOC.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\encryptor.ps1"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hn0ifsok\hn0ifsok.cmdline"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES87BF.tmp" "c:\Users\user\AppData\Local\Temp\hn0ifsok\CSC1C7F141CDCAE40F4922864A98F7AF3A0.TMP"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 4 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D2567C000
stack
page read and write
1C5D0602000
heap
page read and write
1C5D059A000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2117A400000
heap
page read and write
1C5D0794000
heap
page read and write
1C5D35C0000
direct allocation
page read and write
2D2517E000
stack
page read and write
1C5D1F80000
direct allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
134C24CA000
trusted library allocation
page read and write
1C5D05E7000
heap
page read and write
1C5D3540000
direct allocation
page read and write
134CA48C000
heap
page read and write
1C5D057B000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1C5D35A0000
direct allocation
page read and write
1C5D05F0000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
134B21C0000
heap
page execute and read and write
7FFD9BA10000
trusted library allocation
page read and write
134B3FB7000
trusted library allocation
page read and write
1C5D05EE000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1C5D057F000
heap
page read and write
1C5D1FDB000
direct allocation
page read and write
1C5D20B0000
direct allocation
page read and write
134B225A000
trusted library allocation
page read and write
134B03A0000
heap
page read and write
134B01F2000
heap
page read and write
134B1D55000
heap
page read and write
2117A444000
heap
page read and write
1C5D058F000
heap
page read and write
2D2604F000
stack
page read and write
134CA23A000
heap
page read and write
1C5D20D0000
direct allocation
page read and write
1AE85FF000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
134CA2CC000
heap
page read and write
134B398F000
trusted library allocation
page read and write
1C5D20F0000
direct allocation
page read and write
134B3C36000
trusted library allocation
page read and write
1C5D058A000
heap
page read and write
2117A50A000
heap
page read and write
2D24BFE000
stack
page read and write
134B1D50000
heap
page read and write
134B3692000
trusted library allocation
page read and write
2117A320000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1C5D357C000
direct allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
2D24FFE000
stack
page read and write
1C5D05BB000
heap
page read and write
1C5D357E000
direct allocation
page read and write
1C5D1FC0000
direct allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1C5D05A0000
heap
page read and write
134B0120000
heap
page read and write
1C5D2110000
direct allocation
page read and write
1C5D1FC7000
direct allocation
page read and write
1C5D058B000
heap
page read and write
134C21D1000
trusted library allocation
page read and write
134CA1EA000
heap
page read and write
1C5D05FC000
heap
page read and write
1C5D2160000
heap
page read and write
1C5D059A000
heap
page read and write
1C5D0550000
heap
page read and write
1C5D05E1000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
134CA4DB000
heap
page read and write
134CA23C000
heap
page read and write
1C5D0608000
heap
page read and write
134CA478000
heap
page read and write
2D255FE000
stack
page read and write
134CA360000
heap
page execute and read and write
134B0284000
heap
page read and write
1C5D05D8000
heap
page read and write
2D253F8000
stack
page read and write
1C5D058F000
heap
page read and write
2D25279000
stack
page read and write
1C5D2164000
heap
page read and write
134B3C32000
trusted library allocation
page read and write
134B0300000
trusted library allocation
page read and write
1C5D0571000
heap
page read and write
2D24E7E000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
134B399B000
trusted library allocation
page read and write
1C5D0640000
heap
page read and write
1C5D3580000
direct allocation
page read and write
134B2400000
trusted library allocation
page read and write
2D24F7D000
stack
page read and write
1C5D3560000
direct allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1C5D059B000
heap
page read and write
7DF4DB990000
trusted library allocation
page execute and read and write
1C5D3643000
direct allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1C5D05A3000
heap
page read and write
134B3C70000
trusted library allocation
page read and write
1C5D0584000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
134B0415000
heap
page read and write
134CA2C3000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
134CA390000
heap
page read and write
1C5D35F7000
direct allocation
page read and write
134B0340000
heap
page readonly
7FFD9BA60000
trusted library allocation
page read and write
1C5D059A000
heap
page read and write
134CA269000
heap
page read and write
1C5D05B4000
heap
page read and write
2117A500000
heap
page read and write
134C2241000
trusted library allocation
page read and write
134CA488000
heap
page read and write
1C5D0570000
heap
page read and write
2D252F7000
stack
page read and write
1C5D058F000
heap
page read and write
1AE81F6000
stack
page read and write
2D24BB5000
stack
page read and write
1C5D057D000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
134B3EF1000
trusted library allocation
page read and write
1C5D05F5000
heap
page read and write
1C5D3600000
direct allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
1C5D0575000
heap
page read and write
1C5D2090000
direct allocation
page read and write
1C5D058D000
heap
page read and write
1C5D0567000
heap
page read and write
1C5D055B000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1C5D059A000
heap
page read and write
1C5D0790000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1C5D0720000
heap
page read and write
134C2383000
trusted library allocation
page read and write
134B1CA0000
heap
page read and write
2D24EFE000
stack
page read and write
7DE4EFE000
stack
page read and write
134B0282000
heap
page read and write
1C5D2130000
direct allocation
page read and write
1C5D0547000
heap
page read and write
134B21D1000
trusted library allocation
page read and write
1C5D0576000
heap
page read and write
134B20AE000
heap
page read and write
134CA1F2000
heap
page read and write
2D252FE000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
134B3C13000
trusted library allocation
page read and write
1C5D05FE000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
134B0350000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7DE4FFF000
stack
page read and write
7FFD9B77B000
trusted library allocation
page read and write
134B02AE000
heap
page read and write
2117A440000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1C5D0604000
heap
page read and write
134B2E00000
trusted library allocation
page read and write
1C5D357E000
direct allocation
page read and write
1C5D0570000
heap
page read and write
2D251FC000
stack
page read and write
134C21E0000
trusted library allocation
page read and write
1C5D05A2000
heap
page read and write
2D250FE000
stack
page read and write
1C5D35F7000
direct allocation
page read and write
1C5D2070000
direct allocation
page read and write
134CA470000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
134B0410000
heap
page read and write
134CA2A3000
heap
page read and write
134CA1E8000
heap
page read and write
1C5D059A000
heap
page read and write
1C5D05B4000
heap
page read and write
134CA4EB000
heap
page read and write
1C5D05C2000
heap
page read and write
1C5D0770000
heap
page read and write
1C5D05E3000
heap
page read and write
1C5D05E5000
heap
page read and write
134B0100000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1AE83FE000
stack
page read and write
1C5D057E000
heap
page read and write
2D254FE000
stack
page read and write
1C5D0583000
heap
page read and write
1C5D059A000
heap
page read and write
1C5D059A000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
134B01E0000
heap
page read and write
2D2507B000
stack
page read and write
1C5D0584000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7DE4BAC000
stack
page read and write
134B390C000
trusted library allocation
page read and write
1C5D35E0000
direct allocation
page read and write
1C5D3520000
direct allocation
page read and write
1C5D3640000
direct allocation
page read and write
1C5D057E000
heap
page read and write
2D2537C000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
134CA367000
heap
page execute and read and write
1C5D357C000
direct allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1C5D056D000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1C5D1FC3000
direct allocation
page read and write
1C5D0540000
heap
page read and write
134B0330000
trusted library allocation
page read and write
2D2547E000
stack
page read and write
1C5D05FE000
heap
page read and write
1C5D3500000
direct allocation
page read and write
134B0020000
heap
page read and write
134B3BE7000
trusted library allocation
page read and write
7DE50FF000
stack
page read and write
134B026B000
heap
page read and write
1C5D0606000
heap
page read and write
134CA4C3000
heap
page read and write
1C5D05D6000
heap
page read and write
134B3FBB000
trusted library allocation
page read and write
134B02B3000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1C5D1FE0000
direct allocation
page read and write
1C5D2050000
direct allocation
page read and write
2117A420000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
134CA1D0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1C5D05B4000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1C5D0582000
heap
page read and write
1C5D0740000
heap
page read and write
134B1CB0000
heap
page execute and read and write
134B0160000
heap
page read and write
134B1D10000
trusted library section
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
134B1BF3000
trusted library allocation
page read and write
1C5D0608000
heap
page read and write
1C5D05FE000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
134B1BF0000
trusted library allocation
page read and write
There are 237 hidden memdumps, click here to show them.