Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LRkZCtzQ3.ps1

Overview

General Information

Sample name:LRkZCtzQ3.ps1
Analysis ID:1561068
MD5:474c7d9fc4a9dea5f0fd450b4d5a726f
SHA1:a9bb8ffda3e076e9f15a28cd2f3ea3c09d2451c7
SHA256:d80b4d682c61cc45aa22fddea8f75edc6203d9fa97ed8cee049d70d4f276b128
Tags:dfssinstitute-comps1user-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Powershell download and execute
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Contains long sleeps (>= 3 min)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 4176 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7980 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
LRkZCtzQ3.ps1JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: powershell.exe PID: 4176JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
      Process Memory Space: powershell.exe PID: 4176INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
      • 0xc904a:$b3: ::UTF8.GetString(
      • 0x1c8906:$b3: ::UTF8.GetString(
      • 0x1cb06f:$b3: ::UTF8.GetString(
      • 0x3e36c:$s1: -join
      • 0x4b441:$s1: -join
      • 0x4e813:$s1: -join
      • 0x4eec5:$s1: -join
      • 0x509b6:$s1: -join
      • 0x52bbc:$s1: -join
      • 0x533e3:$s1: -join
      • 0x53c53:$s1: -join
      • 0x5438e:$s1: -join
      • 0x543c0:$s1: -join
      • 0x54408:$s1: -join
      • 0x54427:$s1: -join
      • 0x54c77:$s1: -join
      • 0x54df3:$s1: -join
      • 0x54e6b:$s1: -join
      • 0x54efe:$s1: -join
      • 0x55164:$s1: -join
      • 0x572fa:$s1: -join
      SourceRuleDescriptionAuthorStrings
      amsi64_4176.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
        amsi64_4176.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xbbf:$b3: ::UTF8.GetString(
        • 0xc9a4:$s1: -join
        • 0x83b:$s4: +=
        • 0x6150:$s4: +=
        • 0x6212:$s4: +=
        • 0xa439:$s4: +=
        • 0xc556:$s4: +=
        • 0xc840:$s4: +=
        • 0xc986:$s4: +=
        • 0xeb9e:$s4: +=
        • 0xec1e:$s4: +=
        • 0xece4:$s4: +=
        • 0xed64:$s4: +=
        • 0xef3a:$s4: +=
        • 0xefbe:$s4: +=
        • 0xd087:$e4: Get-WmiObject
        • 0xd276:$e4: Get-Process
        • 0xd2ce:$e4: Start-Process

        System Summary

        barindex
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", ProcessId: 4176, ProcessName: powershell.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1", ProcessId: 4176, ProcessName: powershell.exe
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7980, ProcessName: svchost.exe
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.6% probability
        Source: unknownHTTPS traffic detected: 77.91.73.101:443 -> 192.168.2.6:49721 version: TLS 1.2
        Source: Binary string: System.Core.pdbt.Automation.pdb source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbS source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.pdbx source: powershell.exe, 00000001.00000002.2276417671.000001ACEE13E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: mscorlib.pdb source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: n.pdbS< source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Drawing.pdb{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: b.pdb source: powershell.exe, 00000001.00000002.2274497940.000001ACEDE7C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb! source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Drawing.pdb source: powershell.exe, 00000001.00000002.2276417671.000001ACEE1C1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbsT source: powershell.exe, 00000001.00000002.2276417671.000001ACEE1C1000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: global trafficHTTP traffic detected: GET /?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txt HTTP/1.1Host: dfssinstitute.comConnection: Keep-Alive
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txt HTTP/1.1Host: dfssinstitute.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: dfssinstitute.com
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC81A37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dfssinstitute.com
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
        Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
        Source: qmgr.db.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
        Source: powershell.exe, 00000001.00000002.2266892220.000001AC901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000001.00000002.2276099493.000001ACEDFE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2241090663.000001AC812CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dfssinstitute.com
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2276099493.000001ACEDFE0000.00000004.00000020.00020000.00000000.sdmp, LRkZCtzQ3.ps1String found in binary or memory: https://dfssinstitute.com/?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txt
        Source: qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
        Source: svchost.exe, 0000000A.00000003.2459520003.000002677F8D0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000001.00000002.2241090663.000001AC808CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000001.00000002.2266892220.000001AC901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownHTTPS traffic detected: 77.91.73.101:443 -> 192.168.2.6:49721 version: TLS 1.2

        System Summary

        barindex
        Source: amsi64_4176.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 4176, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33B75B771_2_00007FFD33B75B77
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33B7A6FD1_2_00007FFD33B7A6FD
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33B793131_2_00007FFD33B79313
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33C41D061_2_00007FFD33C41D06
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33C432FE1_2_00007FFD33C432FE
        Source: amsi64_4176.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 4176, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal64.evad.winPS1@3/9@1/2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\DrbfWOCcphQIyMYzHnLp.txtJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzpnzjxh.sxr.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: System.Core.pdbt.Automation.pdb source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbS source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.pdbx source: powershell.exe, 00000001.00000002.2276417671.000001ACEE13E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: mscorlib.pdb source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: n.pdbS< source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Drawing.pdb{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000001.00000002.2270654423.000001ACEBD80000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: b.pdb source: powershell.exe, 00000001.00000002.2274497940.000001ACEDE7C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb! source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Drawing.pdb source: powershell.exe, 00000001.00000002.2276417671.000001ACEE1C1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbsT source: powershell.exe, 00000001.00000002.2276417671.000001ACEE1C1000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load($RYozQMFhjiLaZpYmTuqt) return $fceJgMUkpReAMzGlrfHf} $jRociDPaXHuzdwYwpAuk = $PSScriptRoot $WXHKJDKGvuugCEaVBuLZ = $jRociDPaXHuzdwYwpAuk +"\DrbfWOCcphQIyMYzHnLp.txt" $klrPsocDhnTqB
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD33B7A26C push esp; retf 1_2_00007FFD33B7A26D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5403Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4398Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3552Thread sleep time: -12912720851596678s >= -30000sJump to behavior
        Source: C:\Windows\System32\svchost.exe TID: 8004Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: powershell.exe, 00000001.00000002.2276417671.000001ACEE15D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW9
        Source: svchost.exe, 0000000A.00000002.3427529395.000002677FA54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: svchost.exe, 0000000A.00000002.3425304133.000002677A42B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Yara matchFile source: LRkZCtzQ3.ps1, type: SAMPLE
        Source: Yara matchFile source: amsi64_4176.amsi.csv, type: OTHER
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4176, type: MEMORYSTR
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Users\user\Desktop\DrbfWOCcphQIyMYzHnLp.txt VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Process Injection
        11
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        31
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable Media1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager31
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets2
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials21
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        LRkZCtzQ3.ps10%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://dfssinstitute.com/?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txt0%Avira URL Cloudsafe
        http://dfssinstitute.com0%Avira URL Cloudsafe
        https://dfssinstitute.com0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.210.172
        truefalse
          high
          dfssinstitute.com
          77.91.73.101
          truefalse
            unknown
            ax-0001.ax-msedge.net
            150.171.27.10
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://dfssinstitute.com/?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txtfalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2266892220.000001AC901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://g.live.com/odclientsettings/Prod1C:qmgr.db.10.drfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://go.micropowershell.exe, 00000001.00000002.2241090663.000001AC808CE000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2266892220.000001AC901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.microsoft.copowershell.exe, 00000001.00000002.2276099493.000001ACEDFE0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Licensepowershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/Iconpowershell.exe, 00000001.00000002.2266892220.000001AC90073000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 0000000A.00000003.2459520003.000002677F8D0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drfalse
                                    high
                                    http://dfssinstitute.compowershell.exe, 00000001.00000002.2241090663.000001AC81A37000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://aka.ms/pscore68powershell.exe, 00000001.00000002.2241090663.000001AC80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2241090663.000001AC80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://dfssinstitute.compowershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2241090663.000001AC812CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2241090663.000001AC80225000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          77.91.73.101
                                          dfssinstitute.comRussian Federation
                                          42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUfalse
                                          IP
                                          127.0.0.1
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1561068
                                          Start date and time:2024-11-22 18:20:10 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 34s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:LRkZCtzQ3.ps1
                                          Detection:MAL
                                          Classification:mal64.evad.winPS1@3/9@1/2
                                          EGA Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 6
                                          • Number of non-executed functions: 5
                                          Cookbook Comments:
                                          • Found application associated with file extension: .ps1
                                          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                          • Excluded IPs from analysis (whitelisted): 23.218.208.109
                                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
                                          • Execution Graph export aborted for target powershell.exe, PID 4176 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • VT rate limit hit for: LRkZCtzQ3.ps1
                                          TimeTypeDescription
                                          12:21:10API Interceptor31x Sleep call for process: powershell.exe modified
                                          12:21:36API Interceptor2x Sleep call for process: svchost.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          77.91.73.101GottaBolt.exeGet hashmaliciousUnknownBrowse
                                            GottaBolt.exeGet hashmaliciousUnknownBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ax-0001.ax-msedge.net3hPl1gLDY6.exeGet hashmaliciousHelldownBrowse
                                              • 150.171.28.10
                                              https://insights.zohorecruit.com/ck1/2d6f.390d3f0/70932e40-a754-11ef-acd6-525400d4bb1c/c4b396bcef628ee60a3903dd64a571f46a43eb4a/2?e=AP6yJbny%2BojaTRJMo4YN29y4982EEh70QglqvV8aiCoCwftyNixblJXLnLCBIbU9pdrCb4rbSvPbWtRnPycgQw%3D%3DGet hashmaliciousUnknownBrowse
                                              • 150.171.27.10
                                              file.exeGet hashmaliciousLummaC, Amadey, CredGrabber, Credential Flusher, Cryptbot, LummaC Stealer, Meduza StealerBrowse
                                              • 150.171.27.10
                                              https://app.typeset.com/play/G4WZ1Get hashmaliciousHTMLPhisherBrowse
                                              • 150.171.28.10
                                              30340299021065524077.jsGet hashmaliciousStrela DownloaderBrowse
                                              • 150.171.27.10
                                              2.ps1Get hashmaliciousUnknownBrowse
                                              • 150.171.28.10
                                              https://qrcodeveloper.com/code/87JgljWuQCR6OeirGet hashmaliciousUnknownBrowse
                                              • 150.171.27.10
                                              https://myqrcode.mobi/qr/3c3aa5e1/viewGet hashmaliciousUnknownBrowse
                                              • 150.171.28.10
                                              https://hk-csl5g.top/comGet hashmaliciousUnknownBrowse
                                              • 150.171.27.10
                                              88a4dd8-Contract Agreement-Final378208743.pdfGet hashmaliciousUnknownBrowse
                                              • 150.171.28.10
                                              bg.microsoft.map.fastly.netfile.exeGet hashmaliciousRedLine, SectopRATBrowse
                                              • 199.232.214.172
                                              filepdf.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              VKXD1NsFdC.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.210.172
                                              hx0XzDVE1J.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.214.172
                                              PZI8hMQHWg.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.210.172
                                              lIUubnREXh.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.214.172
                                              cFIg55rrfH.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.210.172
                                              VKXD1NsFdC.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.214.172
                                              jsYhI4KOpg.exeGet hashmaliciousScreenConnect ToolBrowse
                                              • 199.232.210.172
                                              phish_alert_sp2_2.0.0.0 (6).emlGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              dfssinstitute.comGottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              GottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUGottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              GottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              T0jSGXdxX5.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              • 185.149.146.15
                                              PC4rbXSgl4.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.77.187
                                              file.exeGet hashmaliciousPhorpiexBrowse
                                              • 77.91.77.92
                                              i52xoegJro.exeGet hashmaliciousAmadeyBrowse
                                              • 77.91.77.82
                                              Jl5yg1Km2s.exeGet hashmaliciousAmadeyBrowse
                                              • 77.91.77.82
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 77.91.101.71
                                              IRqsWvBBMc.exeGet hashmaliciousAmadey, VidarBrowse
                                              • 77.91.101.71
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 77.91.101.71
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0ehttps://novelalert.cloudaccess.host/wp-admin/includes/contactamende/Get hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              file.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              GottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              https://insights.zohorecruit.com/ck1/2d6f.390d3f0/70932e40-a754-11ef-acd6-525400d4bb1c/c4b396bcef628ee60a3903dd64a571f46a43eb4a/2?e=AP6yJbny%2BojaTRJMo4YN29y4982EEh70QglqvV8aiCoCwftyNixblJXLnLCBIbU9pdrCb4rbSvPbWtRnPycgQw%3D%3DGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              GottaBolt.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              Payment CCF20240531_0002.htmlGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              bootstraper.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              bootstraper.exeGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 77.91.73.101
                                              http://cdn.prod.website-files.com/65dccdc21b806b929439370e/66e00f5491860971b9b9ef25_80703488528.pdfGet hashmaliciousUnknownBrowse
                                              • 77.91.73.101
                                              No context
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1310720
                                              Entropy (8bit):0.7263280134415384
                                              Encrypted:false
                                              SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0B:9JZj5MiKNnNhoxuM
                                              MD5:3D839BD6D337DA77DCC7927A1A640F93
                                              SHA1:E443C8A23766CB4A0D2A0FC73D7BAC537242A6D1
                                              SHA-256:9BB5E1DC3ACD9CA4795EF6BA6E07D6D110484E14B0ED0D8241C403E715FE159B
                                              SHA-512:07594C04B4D628BA9AFE99CD2F6C0F1B3BB63E400C05BAA2B5F5C0EC2B1C4A714EC92D342049D8BAEAF77E3B96BA729DD68CD0F1406432B4F779E9212BBA7BE2
                                              Malicious:false
                                              Reputation:low
                                              Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:Extensible storage user DataBase, version 0x620, checksum 0x196f6742, page size 16384, DirtyShutdown, Windows version 10.0
                                              Category:dropped
                                              Size (bytes):1310720
                                              Entropy (8bit):0.755605696474742
                                              Encrypted:false
                                              SSDEEP:1536:lSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:lazaSvGJzYj2UlmOlOL
                                              MD5:2B4048381E65F9086379CDF901BBE6FC
                                              SHA1:C85B8BB4FB752236EC42C0CD84A255D474C7C77E
                                              SHA-256:936783840379431E6E05E7F6247A3DD7367EF17190D396F09D166606F7F8198B
                                              SHA-512:2AEF4D279B75A1054EFA32635BFA3EC2997F3950AFEBC4434DF73DD3F50C4FB6FB7EB3F814A9C8B7CBAC9822CAAA1262A3D84E5265C12B5831AFA440A3F143D8
                                              Malicious:false
                                              Reputation:low
                                              Preview:.ogB... .......7.......X\...;...{......................0.e......!...{?.$....|..h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{....................................}m$....|;..................._.$....|...........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):16384
                                              Entropy (8bit):0.08025333566778572
                                              Encrypted:false
                                              SSDEEP:3:SiyYe2BzWK3reuNaAPaU1l/KlXlolluxmO+l/SNxOf:SiyzknauNDPaUaQgmOH
                                              MD5:18BF8C054CF962D58E9E3BB9B29C1896
                                              SHA1:63434ED951EC9D73B44AEFF9D961564A74FD5F68
                                              SHA-256:942668ED9396A41BE35B420200B1FC6AEF801C0796A65FFE9007090B154DD0F0
                                              SHA-512:B2107998BE03EC9118F6E17C5F7441CA07640F42624B0EF0A38D051E09C4FEDF002141A82CA7684744408A614E4747DDD8892AD59869A910DDE51DE11ED0588E
                                              Malicious:false
                                              Reputation:low
                                              Preview:.. ......................................;...{..$....|...!...{?..........!...{?..!...{?..g...!...{?..................._.$....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):64
                                              Entropy (8bit):1.1628158735648508
                                              Encrypted:false
                                              SSDEEP:3:NlllulLhwlz:NllUO
                                              MD5:F442CD24937ABD508058EA44FD91378E
                                              SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                                              SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                                              SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:@...e................................................@..........
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):6224
                                              Entropy (8bit):3.7295022277459426
                                              Encrypted:false
                                              SSDEEP:48:9hSD+lQutobB+3CyUU2Ut3burukvhkvklCywwkh5/gX/ClHJ3u7SogZoAEh5/gX8:yLk3CCTHkvhkvCCt1hCqtH6hCqnHX
                                              MD5:222E1D0E741D3929A5D347BC31D44C78
                                              SHA1:C574F4EECC4B41DB01431A5CFC6D13E8F4E0BBF4
                                              SHA-256:E7B95F4410546F17A7E8C27E547D94483CA6FF2A09254811E84101028A78DC9E
                                              SHA-512:64FE79DA0D9BFFAD6977A39E00E1D9592B18BEACD0085A45ABCAF942DA98EC40595DA0F5276FAC468F0091D2DFEEDBEACE5A08FF15F2E49264F7CE109EAB4094
                                              Malicious:false
                                              Preview:...................................FL..................F.".. ...J.S...>.a..=..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...H>...=..".m..=......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2vY.............................^.A.p.p.D.a.t.a...B.V.1.....vY....Roaming.@......EW<2vY....../.....................mKv.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2vY......0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2EW.5....2.......................0.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2EW.5....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2EW.5....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2vY......u...........
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):6224
                                              Entropy (8bit):3.7295022277459426
                                              Encrypted:false
                                              SSDEEP:48:9hSD+lQutobB+3CyUU2Ut3burukvhkvklCywwkh5/gX/ClHJ3u7SogZoAEh5/gX8:yLk3CCTHkvhkvCCt1hCqtH6hCqnHX
                                              MD5:222E1D0E741D3929A5D347BC31D44C78
                                              SHA1:C574F4EECC4B41DB01431A5CFC6D13E8F4E0BBF4
                                              SHA-256:E7B95F4410546F17A7E8C27E547D94483CA6FF2A09254811E84101028A78DC9E
                                              SHA-512:64FE79DA0D9BFFAD6977A39E00E1D9592B18BEACD0085A45ABCAF942DA98EC40595DA0F5276FAC468F0091D2DFEEDBEACE5A08FF15F2E49264F7CE109EAB4094
                                              Malicious:false
                                              Preview:...................................FL..................F.".. ...J.S...>.a..=..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...H>...=..".m..=......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2vY.............................^.A.p.p.D.a.t.a...B.V.1.....vY....Roaming.@......EW<2vY....../.....................mKv.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2vY......0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2EW.5....2.......................0.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2EW.5....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2EW.5....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2vY......u...........
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:JSON data
                                              Category:dropped
                                              Size (bytes):55
                                              Entropy (8bit):4.306461250274409
                                              Encrypted:false
                                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                              Malicious:false
                                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                              File type:ASCII text, with CRLF, CR line terminators
                                              Entropy (8bit):5.81475707772363
                                              TrID:
                                                File name:LRkZCtzQ3.ps1
                                                File size:4'280 bytes
                                                MD5:474c7d9fc4a9dea5f0fd450b4d5a726f
                                                SHA1:a9bb8ffda3e076e9f15a28cd2f3ea3c09d2451c7
                                                SHA256:d80b4d682c61cc45aa22fddea8f75edc6203d9fa97ed8cee049d70d4f276b128
                                                SHA512:b3b0707fe3cb847d87a36c3cafaaa2b925c7d28986ba7685df0de9f14636adc76707dd8d713018f2c6da56574ebd2db036291de21894beac7787d8f40f27c87f
                                                SSDEEP:96:DQTHfYA+bv6UZmu6uxFIu4RQc9c1OJelquXuJQRBzTQGQ3KQpQX:8bYA46UZmfuxFIu4Cc9EOJelquXuJQRR
                                                TLSH:999195112346B68186F2E86EDB368498D726609330157C31FAECCA006FFA5BCC66C698
                                                File Content Preview:Add-Type -AssemblyName System.Drawing...Add-Type -AssemblyName System......Function qmURfuQreKJJqcVNVxEv {...[CmdletBinding()]... param(... [Parameter(Mandatory=$true)] [String]$GHF,... [Parameter(Mandatory=$true)] [String]$bts... )...
                                                Icon Hash:3270d6baae77db44
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 22, 2024 18:21:12.682920933 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:12.682954073 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:12.683126926 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:12.692949057 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:12.692964077 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.134814024 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.134888887 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:14.136746883 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:14.136759996 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.137002945 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.144006968 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:14.187347889 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.679177046 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.679266930 CET4434972177.91.73.101192.168.2.6
                                                Nov 22, 2024 18:21:14.679320097 CET49721443192.168.2.677.91.73.101
                                                Nov 22, 2024 18:21:14.683796883 CET49721443192.168.2.677.91.73.101
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 22, 2024 18:21:12.287008047 CET6314453192.168.2.61.1.1.1
                                                Nov 22, 2024 18:21:12.677149057 CET53631441.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Nov 22, 2024 18:21:12.287008047 CET192.168.2.61.1.1.10x1044Standard query (0)dfssinstitute.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Nov 22, 2024 18:21:12.677149057 CET1.1.1.1192.168.2.60x1044No error (0)dfssinstitute.com77.91.73.101A (IP address)IN (0x0001)false
                                                Nov 22, 2024 18:21:37.747397900 CET1.1.1.1192.168.2.60x421fNo error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                Nov 22, 2024 18:21:37.747397900 CET1.1.1.1192.168.2.60x421fNo error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
                                                Nov 22, 2024 18:21:37.747397900 CET1.1.1.1192.168.2.60x421fNo error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
                                                Nov 22, 2024 18:22:00.834177971 CET1.1.1.1192.168.2.60x6eebNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                Nov 22, 2024 18:22:00.834177971 CET1.1.1.1192.168.2.60x6eebNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                • dfssinstitute.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.64972177.91.73.1014434176C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampBytes transferredDirectionData
                                                2024-11-22 17:21:14 UTC113OUTGET /?WqhoLToQyyXtHJizHckb=DrbfWOCcphQIyMYzHnLp.txt HTTP/1.1
                                                Host: dfssinstitute.com
                                                Connection: Keep-Alive
                                                2024-11-22 17:21:14 UTC158INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Fri, 22 Nov 2024 17:21:14 GMT
                                                Content-Type: text/html; charset=UTF-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                2024-11-22 17:21:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:1
                                                Start time:12:21:08
                                                Start date:22/11/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\LRkZCtzQ3.ps1"
                                                Imagebase:0x7ff6e3d50000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:12:21:08
                                                Start date:22/11/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:12:21:36
                                                Start date:22/11/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                Imagebase:0x7ff7403e0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Reset < >
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 78156858b7b08e9b17173d09f24bc055305109fb7c2ee7c4dadc87c05a211523
                                                  • Instruction ID: 0f699e9fe5a2311013c0a8704d652da8bad2b618b27d8ebc160fd97cfeb22529
                                                  • Opcode Fuzzy Hash: 78156858b7b08e9b17173d09f24bc055305109fb7c2ee7c4dadc87c05a211523
                                                  • Instruction Fuzzy Hash: 6CE1F362A0E7C60FE7979B7948751A93FE1DF57220B0901FBD18DCB0A3D9199C0AC352
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 974c3ef7c5120fc5a37f2107d13e92ea1cf9df7d377ef4f38b3399543507e63b
                                                  • Instruction ID: 17046baa8e091ff3b832505f1dbbf7592f85116b2ee2844aabdde391a0f73b8b
                                                  • Opcode Fuzzy Hash: 974c3ef7c5120fc5a37f2107d13e92ea1cf9df7d377ef4f38b3399543507e63b
                                                  • Instruction Fuzzy Hash: 20818762B0EB8A0FE7A6AE6C58652B97BD1FF85311B0801BEE15DD3193DD19AC058381
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e87a60f44a3161c4d3f0ffc63adf2da6b3b6a229a2ea59178b8f80bf2dcc7a37
                                                  • Instruction ID: ad62b7abf8e581de5a888001f04ffc697df0b125c104de8464550cbb735a97cc
                                                  • Opcode Fuzzy Hash: e87a60f44a3161c4d3f0ffc63adf2da6b3b6a229a2ea59178b8f80bf2dcc7a37
                                                  • Instruction Fuzzy Hash: B9218B32F0DB8A4FE3A7AE6E152127872D2EF84310B4800BAE18DD3193ED29FC016340
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c359d2d3f3ee8306a65098b41c6813a5f8ef8dccdba60b7adf6c0a26867fb00
                                                  • Instruction ID: 103e03ca143702d337cf368f9cb0ab15a83731cd71502bc59d9e7fe753309c10
                                                  • Opcode Fuzzy Hash: 5c359d2d3f3ee8306a65098b41c6813a5f8ef8dccdba60b7adf6c0a26867fb00
                                                  • Instruction Fuzzy Hash: F5110232F0D6894FEB96EE9890A11EC7BD2EF69310F2401BFC54DE7193DA24A881D351
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6eeaf4fb7feb15625c9df8e64573fea54967eefad89d1d17b17f583800e930e0
                                                  • Instruction ID: 1654b77b7a697ff2ee73106a249df92e09931a86f565d13cb2bdfa37e5031f64
                                                  • Opcode Fuzzy Hash: 6eeaf4fb7feb15625c9df8e64573fea54967eefad89d1d17b17f583800e930e0
                                                  • Instruction Fuzzy Hash: 6601F926F0DF1A0BFBEAD91E19752BD51D3EFC422178841BBD58ED31C6DD18AC026240
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2279549764.00007FFD33B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33B70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33b70000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3bfc7d5a10ae2687d17b99e28fdccc68c9cf3fe6699c9d64de43e772a78c9b41
                                                  • Instruction ID: 1302b9332533899d4126d314644befea72170125848ff2e4a3a35601de159ab4
                                                  • Opcode Fuzzy Hash: 3bfc7d5a10ae2687d17b99e28fdccc68c9cf3fe6699c9d64de43e772a78c9b41
                                                  • Instruction Fuzzy Hash: 2401A73020CB0C4FD748EF0CE451AA5B3E0FB89324F10052DE58EC3651D632E881CB46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2280218970.00007FFD33C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33C40000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33c40000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: p}
                                                  • API String ID: 0-1039907354
                                                  • Opcode ID: e989aa0d3b5062f571f809106fac734ae80277b20ab77cde739983a6a6a8fdb8
                                                  • Instruction ID: 99bf4334428c0a3622bbc9274b206de7fdeca57ca6e51816ff1d081bb15adc4c
                                                  • Opcode Fuzzy Hash: e989aa0d3b5062f571f809106fac734ae80277b20ab77cde739983a6a6a8fdb8
                                                  • Instruction Fuzzy Hash: 38A12521A0E7C20FE7539B7858641A57FF1AF97220B4D01FBD18DCB0A3D919A85AD362
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2279549764.00007FFD33B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33B70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33b70000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e69bb103c44dd840c2627284f86eeb3f5e1e577fed5a6038679dd742471b9f01
                                                  • Instruction ID: 3c065f647f95dd8990068336f08d7245dffedf2d62d57ca34a65557c637cca9a
                                                  • Opcode Fuzzy Hash: e69bb103c44dd840c2627284f86eeb3f5e1e577fed5a6038679dd742471b9f01
                                                  • Instruction Fuzzy Hash: BE71A4A3A0E6C68EF78346689DB51E57F60EF13225B1A01F7C1CCAA1D3EC0B18179617
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2279549764.00007FFD33B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33B70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33b70000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c66f71cd30623705cb5978059c6394a5fad72e2e6a4fd0433d3228e58167242b
                                                  • Instruction ID: ea0031c281041168a9f811eb3357b7203ebb1dbdd90a98d9582b286fb89ad81a
                                                  • Opcode Fuzzy Hash: c66f71cd30623705cb5978059c6394a5fad72e2e6a4fd0433d3228e58167242b
                                                  • Instruction Fuzzy Hash: DF61E3A3B0E1D24BE7124A6DDDB60E23BA0EF5722574A00F7C1DC9B1D3EC1929065253
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2279549764.00007FFD33B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33B70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33b70000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d227070dfd92881a021a409996b50b6f1cbe24230caa133b2389d12432ede617
                                                  • Instruction ID: 27ace34dc250e5eff9fdc25e1a653a231fd2b2e52d7e45b1024c1a42ab3f5de1
                                                  • Opcode Fuzzy Hash: d227070dfd92881a021a409996b50b6f1cbe24230caa133b2389d12432ede617
                                                  • Instruction Fuzzy Hash: 5551A267B0D69A0BF3116ABDEDF61F53BA0DF9322570E01F7C1CC9A093AC15244BA652
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2279549764.00007FFD33B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33B70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd33b70000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: M_^$M_^$M_^$M_^$M_^$M_^
                                                  • API String ID: 0-1070628180
                                                  • Opcode ID: 7562329a325df1709159eaf6a9342dd0727c112e06d33abc3be7654075993712
                                                  • Instruction ID: 2ae35ead96fcc0e0527964cc4d718347c096ffa04d96b631ac2e9aac3dd92f7d
                                                  • Opcode Fuzzy Hash: 7562329a325df1709159eaf6a9342dd0727c112e06d33abc3be7654075993712
                                                  • Instruction Fuzzy Hash: B631CB93E0E5D64BEB634B1DDDBA0E43F90EF26219B4901F2C5ED9F093BE2424069243