Windows Analysis Report ADRecon-KPMG.ps1
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Suspicious Csc.exe Source File Folder |
Source: | Author: Florian Roth: |
Signature Overview |
---|
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
Click to jump to signature section
AV Detection: |
---|
Antivirus detection for dropped file |
Source: | Avira: | ||
Source: | Avira: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary: |
---|
Source: | Code function: | 0_2_00007FFA35A80CD0 | |
Source: | Code function: | 0_2_00007FFA35A820C8 | |
Source: | Code function: | 0_2_00007FFA35A80D30 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00007FFA35A81A9A | |
Source: | Code function: | 0_2_00007FFA35A81B69 | |
Source: | Code function: | 0_2_00007FFA35A81D6A | |
Source: | Code function: | 0_2_00007FFA35A80F82 | |
Source: | Code function: | 0_2_00007FFA35A81B89 | |
Source: | Code function: | 0_2_00007FFA35A83F22 | |
Source: | Code function: | 0_2_00007FFA35A87F1A |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | File opened / queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FFA35B50FD1 |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information: |
---|
Opens network shares |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation1 | Path Interception | Process Injection11 | Masquerading1 | OS Credential Dumping | Network Share Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Virtualization/Sandbox Evasion51 | LSASS Memory | Query Registry1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection11 | Security Account Manager | Security Software Discovery21 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information1 | NTDS | Process Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Virtualization/Sandbox Evasion51 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | Application Window Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | File and Directory Discovery2 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | System Information Discovery22 | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1138338 | ||
100% | Avira | HEUR/AGEN.1138338 |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 436762 |
Start date: | 18.06.2021 |
Start time: | 15:29:57 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | ADRecon-KPMG.ps1 |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 29 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.spyw.winPS1@18/34@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
15:30:45 | API Interceptor |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17949 |
Entropy (8bit): | 4.998762997516168 |
Encrypted: | false |
SSDEEP: | 384:Awib4LEVoGIpN6KQkj2jkjh4iUxLzv0ifOdBVNXp5CYoY4Qib4w:AEEV3IpNBQkj22h4iUxLzv0ifOdBVNZw |
MD5: | BA27C7CD4B91D42164C0D41B8CB77AF5 |
SHA1: | D39DCE142D49FB1B059F966A3D15861691D03D79 |
SHA-256: | 5F4B9E6C824ED7397D5B0CE093B4162AEB4D2627779423DE4960AF7F395F1C07 |
SHA-512: | 2B9524B0BB94DECC7C464A4DB88241F4FD62F22D9DDB217D0735715D935C0BD7FA60D2B02628025787D8D19E38153EAF887B7AEA24F2516ADE1A0019FE2D75AA |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1300 |
Entropy (8bit): | 5.343226012152825 |
Encrypted: | false |
SSDEEP: | 24:3vQPpQrLAo4KAxX5qRPD42HOoFe9t4CvKuKnKzOaBPnXF8PQ9fT:oPerB4nqRL/HvFe9t4Cv94vOfV8Y9fT |
MD5: | A24C10403F187961D1B171A952190A71 |
SHA1: | 2D4397D0677F98F4DD7B105F2860970DE13C8774 |
SHA-256: | 9ECA12CD874FD2BEC7CAFE7A7D532B10C299D771F859A03D72ACB62448801965 |
SHA-512: | CCC20614D003810224A9CAEA2AA6F66833A868C1480FE7B33902B6E92A276036A636311ED43CA359A8E3E2A9A5FB99DFF3381B5F04BF62C80A8E7CDAE811665F |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 234 |
Entropy (8bit): | 4.837953277416018 |
Encrypted: | false |
SSDEEP: | 3:V/DsIWMLCI53eqIusd81AWVEGWL48zzbAYvw/4JiiwMQZShrAoVS2GFR8KA59LRu:V/DsYLDS81zuzxpMIQQAos2SRMDk5Yy |
MD5: | 5AB5FA2642C9CCAE71FDEC4667005473 |
SHA1: | 84B8886F7C7FDC6D93CC4149D22C9E418A39FFE0 |
SHA-256: | D2F2F4F21B69D20180DF77295EBB281B055C64445080F6FFB5294A99DCE25209 |
SHA-512: | 802613B2ED38D24F6B0902479B5A00EB5DC64442206E8A122F8FB812CB720C167DEB47675BA7CA48E043BC352F149AA0A5F0AE508239B3189EBA0D5208E1E25B |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 369 |
Entropy (8bit): | 5.31832960082016 |
Encrypted: | false |
SSDEEP: | 6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23fDYzxs7+AEszIwkn23fDV:p37Lvkmb6KRf8WZEifZ |
MD5: | 176C076F99A7E4735B66BF8158F4B920 |
SHA1: | 8D2468F1B0179F306A00303135ABC1895D39F9E4 |
SHA-256: | 39E9CA68598843E2E14F80DF91548203564B65DC722AC2FBDB4CD43D36C5E6B4 |
SHA-512: | F6D4F6A285876D09DD4EC548C77B864B7AEA09DD27D1FAAC708AA8F1CC0E25F1B3502D0168FF44545B345688ACEA6C46A82B79D2D7429F2B548202B40DAFF238 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3072 |
Entropy (8bit): | 2.723126896976699 |
Encrypted: | false |
SSDEEP: | 24:etGSm/BepxLd84fLzmkup4PtkZfwlrjOcUxbI+ycuZhNIakS0PNnq:6l24vhuCuJQ3dKb1ulIa3Uq |
MD5: | A5A124DCA07A1D0A3CC466C2E9111D86 |
SHA1: | BE6A85F0D4616F13402C52B23D19E247D8B6AF69 |
SHA-256: | A1EFF5D01E8107BDEABCBAFDFC31AC4A6B24268C9C1C15EF3C4653273383EC29 |
SHA-512: | 98B7070F7C94A4578CCDB6737986CBA54A93FA288FE06BD8A63FE7C15130BF487F521C936AAA168F8DE249EA8F98DD1A62A4AF3DFB7401FA695A78CC5588F08A |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | modified |
Size (bytes): | 412 |
Entropy (8bit): | 4.871364761010112 |
Encrypted: | false |
SSDEEP: | 12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH |
MD5: | 83B3C9D9190CE2C57B83EEE13A9719DF |
SHA1: | ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E |
SHA-256: | B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA |
SHA-512: | 0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 652 |
Entropy (8bit): | 3.121262308944385 |
Encrypted: | false |
SSDEEP: | 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryWak7Ynqq0PN5Dlq5J:+RI+ycuZhNIakS0PNnqX |
MD5: | 0F8C0392277BDD37F716D58A8B4A7EF6 |
SHA1: | 7B4CB4DB53A0E1F91DB6AE3E6F780E01845D0B48 |
SHA-256: | D2ACB274EFA01F58CDD21A1D4C5F4823804EE655CDA9F7136B0BB5E999BDB1B8 |
SHA-512: | 0AE97087157E54E24473A3AFB4751C6E60F2EFB3EC69DCEB28B2B21CE0DE06B175EB4F1B3F33C68ED1D4C2398DBA5F41C85390F258190969A6E6DD12214658DC |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13616 |
Entropy (8bit): | 5.3056667837640115 |
Encrypted: | false |
SSDEEP: | 384:iHVYrVarE2xnsHcC6qPuNSFEMSM1PuNGlLn:U2rUrrxnycC6qPuNSFEMSM1PuNGlLn |
MD5: | 743B6837C85645CD2325F6295ACF2386 |
SHA1: | EB31A36D045BEA8DCB4813209B9C4100F0A6A546 |
SHA-256: | 1E93A153ED55B119F7B5BF756BD9560D010B43C35F10BD6CDC010294555B7E8A |
SHA-512: | B132383BD091E8EE7E0749E0490626BD68FDCB51A05F81FF5D9DA1022E85632A6FE5AB2EAA5441DDBA99AAFF7D1232A21358BF45F32910F9FDAC591EAA5973F3 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 369 |
Entropy (8bit): | 5.256825968064545 |
Encrypted: | false |
SSDEEP: | 6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23f8EomJ+zxs7+AEszIwkn23f8EoE:p37Lvkmb6KRfUnm0WZEifUnE |
MD5: | 52D2020F824BFFFCF8FA851F9137F242 |
SHA1: | C39D8930902B0F7EB410D97AEF252D474F701F4E |
SHA-256: | DC4C5D79BAD326DCF661F855AD7EDBA2855F83C1856725DA969F35D0FA3454D9 |
SHA-512: | 90EF6A0670DD33C3FFF0CC3F2F46FFC512EE917758A7654A43678E9942BECDB38AA569456A6AD5B2BBD8123C5631A626B86580A113D19901F4F31C3E001B274D |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8704 |
Entropy (8bit): | 4.701567451343365 |
Encrypted: | false |
SSDEEP: | 96:4YK11I8aDmU9aTst2fHY+Zh2pIZprrM6OE88mYtdo1uaDgzrkK:4h1q8aDDaT2mX2pIZXOE8R49 |
MD5: | 02C3F9DB30B0FE59996CBCD79D854A85 |
SHA1: | 1159A8E8727972C021566F7E2E877B610F17ED88 |
SHA-256: | 1DD4080F108330F61D45B0FF6A4C55EA8D24EC0ACA8564CC2D93DC604563BBD6 |
SHA-512: | EB4E44B607D610DFD47981A74FF217B231DE557094F412CC513F8758F7D19B2808EDAA3ED9C93E09917A476BE2FDBB1F52E20B87A8AA3656E6B8B7D49D09F729 |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | modified |
Size (bytes): | 412 |
Entropy (8bit): | 4.871364761010112 |
Encrypted: | false |
SSDEEP: | 12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH |
MD5: | 83B3C9D9190CE2C57B83EEE13A9719DF |
SHA1: | ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E |
SHA-256: | B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA |
SHA-512: | 0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 652 |
Entropy (8bit): | 3.1071360149671294 |
Encrypted: | false |
SSDEEP: | 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryUak7YnqqKPN5Dlq5J:+RI+ycuZhNCakSKPNnqX |
MD5: | 44E986B8AAD9FFD50CD101E9DD5B6728 |
SHA1: | 48CC9AC9E56EDAA75D578996E60493D3063D3E53 |
SHA-256: | 7C2413A76FA94E6C2090DC732D310D21A1DAFEEB0639D056FD3E63F5FC803A32 |
SHA-512: | 80EA411E81C9B849F57ED1E11D5DA08EC7B9DACA89E240EB4034D6B8FDD1877012ECC2EFA746311018EC603EF20947BB395AEC5435DAF7C13C8B7CB81CE6D0F2 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2188 |
Entropy (8bit): | 2.70357239212724 |
Encrypted: | false |
SSDEEP: | 24:bZfNg9DfHwhKEsmNfI+ycuZhNOakSGPNnq92pkzW9I:bBKByKhm91ulOa36q9P |
MD5: | BED4D3DD1EECAE4A56069079E3A22F06 |
SHA1: | 56E3BB98596991255DE4E800CC808782852310B2 |
SHA-256: | C0415E86A5701C2FDA63CD7E3BC7351063FB8E8023F15084D242041D65808C49 |
SHA-512: | AD74B8C42DCE886AD1FE19C8FCA91B1057D913724A1DC8E0280BA93212A615016ADF76E1D16B7AB48FC8BD3F30F1D6FA7B5EA86E793679DFDE3FA95CA58B8550 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2188 |
Entropy (8bit): | 2.722320580709945 |
Encrypted: | false |
SSDEEP: | 24:bZfkJ/E11DfHdZFhKEsmNfI+ycuZhNIakS0PNnq92pYzW9I:bBA/e9ZzKhm91ulIa3Uq9D |
MD5: | 1BFBF76506BF3D4D68E534F9C4E351FE |
SHA1: | 5F3EED484CBE7B861F8C2F0AC70D2D1DB31F9730 |
SHA-256: | 8674880573B963387D4DAE64C1CFE8069FDC42E547D2933D93E94C3F508E0F2E |
SHA-512: | AD32F48F2C2AECE9A846AC9601C47352D30CEFE0AB4384EB13B9A75852BC2B3ACA6C9259F68E9E9127058C2A679D0EE40372B9251B946876C62F6758C1532B55 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2188 |
Entropy (8bit): | 2.707574666950414 |
Encrypted: | false |
SSDEEP: | 24:p+fUr8DfHfhKEsmNfI+ycuZhNCakSKPNnq92pjYzW9I:cWqZKhm91ulCa3mq96O |
MD5: | 7C57D7F34F9D380B672830DC1B7E9A88 |
SHA1: | 7ABC4256F883842A5BC8561E6C22348ADAFA15EF |
SHA-256: | 1CB4785FFC74F265B1084B08F825D2B6D1D4296208808469A44B355FD8F466FF |
SHA-512: | 4BE5CE1CC32FAD8D82760562E74916EFF0765AA3C919F2016CE1BC458F67883A2DB05695ED973B6FBF2D4FE16D34FEFB0124DC3A765F6BB73A5DEBD392B97FD6 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2188 |
Entropy (8bit): | 2.7083990416814956 |
Encrypted: | false |
SSDEEP: | 24:bZfiv8DfHIhKEsmNfI+ycuZhNeHakSZQPNnq92pdzW9I:bBrqKhm91uleHa3ZIq96 |
MD5: | E16E4DD16D0700CAC7A48D2A4C2AC839 |
SHA1: | 46B197721AC618249EBA620C3647E855E74FC9E4 |
SHA-256: | EF5A342E3FFE2058FB0733765430BF78D8DA073B9FCD391AAEBAF4F9D0D8F194 |
SHA-512: | 54E714FCF227EC7073E193041D71F81110684387401229934BABB73904FA1327965807CB0B13489E92499749B734876B221A958249D1DDE0CF757AF8CA7889AD |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 652 |
Entropy (8bit): | 3.1014328811937397 |
Encrypted: | false |
SSDEEP: | 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryONHak7YnqqjNQPN5Dlq5J:+RI+ycuZhNeHakSZQPNnqX |
MD5: | FF7F774186CD06E469601E8CD30D79F5 |
SHA1: | C202AB5CF8CD4A2C910A11679599F8070971F499 |
SHA-256: | 848EE362B93C735AD8309AD654A5CFF326DFD43C05ED9A9B0067D73E6419F50C |
SHA-512: | 8FB2FC7C2E864F44A17A53193CE40F2120105F01455613B353C16E711256587A8AC85B75EC4FE69E3938C37CCE71A04197FFFFB796E73ED3E8142CB9D90AB5D6 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 82692 |
Entropy (8bit): | 4.386560180163499 |
Encrypted: | false |
SSDEEP: | 768:5KUrYWYxYDFQLsTExaJJ7tsThgDU2AXMIVaIIVLT:5KOYWYxYDW9apslgg2AHa7LT |
MD5: | 1FC273B23EB699DE4CD1B2B488F3FE07 |
SHA1: | 311D784EDFA828EE04A2B57AC308704960097156 |
SHA-256: | 5576585B2F3493D027C946DEA0B45172C09B3ABD46675CBD56F4CD0C10ED71B0 |
SHA-512: | A54C18F404E83DDD5FEC5861682B109AD8E34A97833FCAC427A76C7FE42D32AB24197F6A7B00697E5ECB3FF554D9EE7D3D6A2140F2BA157E8216CFB3B5D3E74A |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 502 |
Entropy (8bit): | 5.293414896955437 |
Encrypted: | false |
SSDEEP: | 6:pAu+H2LvkuqJDdqxLTKbDdqB/6KOkuqZbA3S7bAswkn23f37Uzxs7+AEszIwkn29:p37Lvkmb6KOkB8e8Pf/4WZEif/1 |
MD5: | 2FEDE92D7F1B1F699784E0ECF371E154 |
SHA1: | 90153D6E8B00C6CA60F08A4235EB209F2C4C939B |
SHA-256: | 84BCBFD6A2BE0BCE427090FE9376CA364998F59A65D859C89807AF306ADA5099 |
SHA-512: | 72409186636F42861377D13097597263FC9656E14CDE2B342BD134F35DFC4074D3FBCE8C49F54F9DF66ED0925993DBD8A45706CA2B8722D1D1942E0F1CA4A9AB |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 37888 |
Entropy (8bit): | 5.108047151608629 |
Encrypted: | false |
SSDEEP: | 768:gdCrM0agt1pL1ZAGwZ+ATQpUvX1vNTd/pVf5/t3tK68RPDhB0yq8QoP:gdCrM0agDQ+qSDhCyaa |
MD5: | 0DB8B192DB985041BF78C7041B5103FC |
SHA1: | A146F812CABBD8667B9826BFA4324708731BBDD3 |
SHA-256: | 4EEC9CB7480D08799686A0F117458D33124F9951F551469A4E0720F86F6248CE |
SHA-512: | C8082701A9F85280DB9CC6006990D3FBAF5059C4CE98A757181DB061563B50025D68949548251D7C7898ABA0DF5306FD9C061260E63441FB18F02B26BA4EBEDB |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | modified |
Size (bytes): | 412 |
Entropy (8bit): | 4.871364761010112 |
Encrypted: | false |
SSDEEP: | 12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH |
MD5: | 83B3C9D9190CE2C57B83EEE13A9719DF |
SHA1: | ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E |
SHA-256: | B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA |
SHA-512: | 0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 652 |
Entropy (8bit): | 3.097603255426555 |
Encrypted: | false |
SSDEEP: | 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grygioak7Ynqqpi9PN5Dlq5J:+RI+ycuZhNOakSGPNnqX |
MD5: | F5B459ECA66C29113C2CDB5DC65CCA6F |
SHA1: | 94A8C9D1BF6B630885DA715D705E183FE5790D99 |
SHA-256: | 1DE6EF62B3720C1DA82C8F213B7CC6A0BCB2D875FBE6AA8B4F115EFDA222A8D4 |
SHA-512: | 212500CDA11970FC22A79AF91157566D77E1F82B2B077ED2C39F756FA187E4B7A9154EE4989D6A9A3510A70E3FC4D66626CB27366F7432023237EFB2C9942C79 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 559 |
Entropy (8bit): | 4.921580670118331 |
Encrypted: | false |
SSDEEP: | 12:V/DTLDfuzog9NAD1YbpJj6e2OthNADSINADtiOy:JjmzogKI3l2HSzIOy |
MD5: | 5CB55CC81CBFE307FEA693A618521A0B |
SHA1: | B2FA5B07B649AB7C0028A7FBCB5EF3141342BA7A |
SHA-256: | 39F7CA91E94D19767C7DB10E0CBA0788B2349676DE29FA2B766B860334A93A3F |
SHA-512: | 2122D115E19584679B86C1669184CCACDB265CAEFBA4B306030473976A84325D2A31D09257D5F0504CABAC9EAC70A3749D87DEE1B18B543526C6522D05224B4F |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 369 |
Entropy (8bit): | 5.2161732279303195 |
Encrypted: | false |
SSDEEP: | 6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23ftBUzxs7+AEszIwkn23ftbn:p37Lvkmb6KRfYWZEifV |
MD5: | 9FD0ABE39ED93E903448D882648F9C11 |
SHA1: | B46C59D7A63A5168AE5FCD8A26EF5D077F35F5B9 |
SHA-256: | 5C73ADABE15A4E58A4A6AE49F5C562A7732AEE52DD1A98C54F99B5DE77977AA9 |
SHA-512: | F7533693F5736495298101EC042796EEF16FD691AADDAEE892B05D9C788AAFF3A5648792324D30796A3C876892531B3D73DFD12CB38AB4308725C73539F5DF6F |
Malicious: | true |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3584 |
Entropy (8bit): | 2.7564915970140667 |
Encrypted: | false |
SSDEEP: | 24:etGS6MhW2oe/yEC3Q5/YWp0Wd4LC62kM4tkZf0Rjtxw7I+ycuZhNOakSGPNnq:6zR7CAyWJkMvJ0RjXy1ulOa36q |
MD5: | A665FB3D3C183FE441445EFC58D0E9CF |
SHA1: | 6B25ABC60A0C37A493219FADC148E0A0F7B00240 |
SHA-256: | AF9722A13043902F337FCACF8D9387A654D22BF4AFB3EBF7A4A649B8A03EA9E0 |
SHA-512: | 81F63BBF98B7C0DC89A90BD3AAD2B67A470AD9123A1E384797F620E06EB6797819B46848530D496FE6AB9006403B19CEAAC6CEFDA21160DAD7039EF53C071E3E |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
File Type: | |
Category: | modified |
Size (bytes): | 412 |
Entropy (8bit): | 4.871364761010112 |
Encrypted: | false |
SSDEEP: | 12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH |
MD5: | 83B3C9D9190CE2C57B83EEE13A9719DF |
SHA1: | ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E |
SHA-256: | B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA |
SHA-512: | 0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6205 |
Entropy (8bit): | 3.761457724376558 |
Encrypted: | false |
SSDEEP: | 96:kPEG9mBX60CO+S/qdkvhkvCCtrXn3H8Xn3HV:UEG9mBcPJr8V |
MD5: | DC270A2232DEA69AB1E3ADB526E7089E |
SHA1: | 37A5D67AC587B4DC2A36CE0F1F1FFD06C6C411CA |
SHA-256: | 5AE0312FE75CAC2C1E2F579A867DE10DC8AA597CD4627280A562079A7BDC08A5 |
SHA-512: | BC3220936AD072874C7CF7258BB17CC2940E30811C8093C38F540448BFBFCC5F98AA683CF4BACC7BC0A68976EB52D8BCBBC733FDAE2AE5DC0257D47CD8AB2B3D |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1537 |
Entropy (8bit): | 5.233932318873786 |
Encrypted: | false |
SSDEEP: | 48:BZ7vj0oORT89dqDYB1Z8Z+xanvqUuiVPZZC:BZbj0Ni3qDo1Z8DvqUuiVPZg |
MD5: | 85CAC918CD3BC0344A3B58C84CE27446 |
SHA1: | BC88191383B44DE2E24819B1DDCC11959E0172FF |
SHA-256: | B7503521978F97E4D5766114F7C35D85C74559CEFD710F9A746270DB04C2BEB1 |
SHA-512: | F4D38175F32B95070C3158215922780DB10B6FCE40C733F9EA707B3C3042D3B0F26D1E19C1D217B34C8E9E578F5BA263444CD37424198518E03D1085027B075E |
Malicious: | false |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 5.256591239440088 |
TrID: |
|
File name: | ADRecon-KPMG.ps1 |
File size: | 626599 |
MD5: | 6008e6c3deaa08fb420d5efd469590c6 |
SHA1: | 1c55b3e2c62932213a57ffb8a223fb2a52b4d170 |
SHA256: | ac00dd7d54764e0389de434f3203c2a3384d2ffcc20615f40f09c4c0646c8d3f |
SHA512: | 774d837ffbc8f883e1b5a8b03a1da2cff24e585356bd93f5a48e64bd47bba02bebfa1fe23d0b21db973a33c7bb83a72ed82a178824bba766e2c2a22e03aa37fd |
SSDEEP: | 12288:pRbDbhJGYDb/XwXMX9ycFb7b4JHzARyvQ1svRO9y9f:pRbDbhJGYDb/XwXMX9ycFb7b4JTsyvQm |
File Content Preview: | ...<#...SYNOPSIS.. ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment....DESCRIPTION.. ADRecon is a tool which extracts |
File Icon |
---|
Icon Hash: | 72f2d6fef6f6dae4 |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:30:41 |
Start date: | 18/06/2021 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7bedd0000 |
File size: | 447488 bytes |
MD5 hash: | 95000560239032BC68B4C2FDFCDEF913 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |
File Activities
Section Activities
Registry Activities
COM Activities
Powershell Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Process Token Activities
Object Security Activities
LPC Port Activities
Start time: | 15:30:42 |
Start date: | 18/06/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff724c50000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 15:30:47 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff743170000 |
File size: | 2739304 bytes |
MD5 hash: | B46100977911A0C9FB1C3E5F16A5017D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:30:48 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6154c0000 |
File size: | 47280 bytes |
MD5 hash: | 33BB8BE0B4F547324D93D5D2725CAC3D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Process Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:30:51 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff743170000 |
File size: | 2739304 bytes |
MD5 hash: | B46100977911A0C9FB1C3E5F16A5017D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:30:52 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6154c0000 |
File size: | 47280 bytes |
MD5 hash: | 33BB8BE0B4F547324D93D5D2725CAC3D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Process Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:30:55 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff743170000 |
File size: | 2739304 bytes |
MD5 hash: | B46100977911A0C9FB1C3E5F16A5017D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:30:56 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6154c0000 |
File size: | 47280 bytes |
MD5 hash: | 33BB8BE0B4F547324D93D5D2725CAC3D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Process Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:31:02 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff743170000 |
File size: | 2739304 bytes |
MD5 hash: | B46100977911A0C9FB1C3E5F16A5017D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:31:03 |
Start date: | 18/06/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6154c0000 |
File size: | 47280 bytes |
MD5 hash: | 33BB8BE0B4F547324D93D5D2725CAC3D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Process Activities
Memory Activities
System Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |