IOC Report
OneAmerica Survey lnk.lnk

loading gif

Files

File Path
Type
Category
Malicious
OneAmerica Survey lnk.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=216, Archive, ctime=Tue Sep 12 18:10:04 2023, mtime=Thu Dec 21 21:34:31 2023, atime=Tue Sep 12 18:10:04 2023, length=486400, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qyrqzuer.eq2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyecnetp.rge.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wuuvhwdn.vdc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xyqbc0lb.vyo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O9RHOHW2BOX1KIVUGZ25.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\c56dd8796a821e60.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -c Expand-Archive -Path $home\downloads\'OneAmerica Survey.zip' -DestinationPath $home\datax; Invoke-Command {cmd.exe /c $home\datax\data\start.bat}
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\datax\data\start.bat
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 4 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFAAC84D000
trusted library allocation
page execute and read and write
7FFB1E102000
unkown
page readonly
7FFAACA60000
trusted library allocation
page read and write
2D8AA7B000
stack
page read and write
224049E3000
trusted library allocation
page read and write
22404865000
trusted library allocation
page read and write
2D8AAFF000
stack
page read and write
22401B05000
heap
page read and write
7FFAACB30000
trusted library allocation
page read and write
2240492D000
trusted library allocation
page read and write
22401895000
heap
page read and write
22401838000
heap
page read and write
7FFAACCB0000
trusted library allocation
page read and write
2241BD90000
trusted library allocation
page read and write
2AD2AD74000
heap
page read and write
22401808000
heap
page read and write
2D8BA8E000
stack
page read and write
2241BCB7000
heap
page read and write
7FFAAC843000
trusted library allocation
page execute and read and write
2D8AFBC000
stack
page read and write
2AD2AFC4000
heap
page read and write
224018B5000
heap
page read and write
7FFAACAB0000
trusted library allocation
page read and write
7FFAAC960000
trusted library allocation
page execute and read and write
22413B2F000
trusted library allocation
page read and write
2241BB90000
heap
page read and write
7FFAACB40000
trusted library allocation
page read and write
224032B5000
heap
page read and write
2D8BB0E000
stack
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFB1E0E1000
unkown
page execute read
224038C8000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAAC89C000
trusted library allocation
page execute and read and write
2D8A97D000
stack
page read and write
2AD2AE50000
heap
page read and write
22403E4A000
trusted library allocation
page read and write
224046B9000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
2240486B000
trusted library allocation
page read and write
7FFAACA50000
trusted library allocation
page read and write
2AD2AC80000
heap
page read and write
2D8B03E000
stack
page read and write
224043F2000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
224018E4000
heap
page read and write
22413841000
trusted library allocation
page read and write
22401899000
heap
page read and write
7FFAACAC0000
trusted library allocation
page read and write
22403660000
heap
page readonly
2240487D000
trusted library allocation
page read and write
22403A69000
trusted library allocation
page read and write
2241BC45000
heap
page read and write
7FFAACB94000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
2241BCC3000
heap
page read and write
2241BA87000
heap
page execute and read and write
7FFAACB00000
trusted library allocation
page read and write
224032B0000
heap
page read and write
2240376A000
heap
page read and write
22413861000
trusted library allocation
page read and write
2D8AB7E000
stack
page read and write
7FFAAC8F6000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
7DF458280000
trusted library allocation
page execute and read and write
7FFB1E0E0000
unkown
page readonly
2AD2AD5A000
heap
page read and write
7FFAACAD0000
trusted library allocation
page read and write
7FFAACBA8000
trusted library allocation
page read and write
224050A5000
trusted library allocation
page read and write
2AD2AFC0000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
2AD2ABA0000
heap
page read and write
7FFAACA90000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page read and write
22403841000
trusted library allocation
page read and write
22404890000
trusted library allocation
page read and write
22404871000
trusted library allocation
page read and write
7FFAAC8FC000
trusted library allocation
page execute and read and write
7FFAAC842000
trusted library allocation
page read and write
2D8ABFA000
stack
page read and write
22403670000
trusted library allocation
page read and write
22401800000
heap
page read and write
2D8AE39000
stack
page read and write
22413B39000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
22403753000
heap
page read and write
7FFAACCA0000
trusted library allocation
page read and write
22404E70000
trusted library allocation
page read and write
2241BDB0000
heap
page read and write
2240505A000
trusted library allocation
page read and write
2D8AEBE000
stack
page read and write
7FFAACC50000
trusted library allocation
page read and write
22401B00000
heap
page read and write
224037DE000
heap
page read and write
22404883000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
7FFAAC85B000
trusted library allocation
page read and write
22404877000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page execute and read and write
224138B2000
trusted library allocation
page read and write
224037D2000
heap
page read and write
224036F0000
trusted library allocation
page read and write
2241BA30000
heap
page execute and read and write
7FFAACB99000
trusted library allocation
page read and write
224053A6000
trusted library allocation
page read and write
2240485E000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
22404974000
trusted library allocation
page read and write
7FFAAC9E0000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
22403620000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
22405212000
trusted library allocation
page read and write
22403830000
heap
page read and write
224037AC000
heap
page read and write
7FFAACA22000
trusted library allocation
page read and write
2D8A5F5000
stack
page read and write
2241BA80000
heap
page execute and read and write
22413B2B000
trusted library allocation
page read and write
22404858000
trusted library allocation
page read and write
22401920000
heap
page read and write
2240488A000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
7DF458270000
trusted library allocation
page execute and read and write
2241BCD5000
heap
page read and write
22404D54000
trusted library allocation
page read and write
2241BBE9000
heap
page read and write
2D8AC78000
stack
page read and write
7FFAACB73000
trusted library allocation
page read and write
22401812000
heap
page read and write
7FFAACC33000
trusted library allocation
page read and write
22405125000
trusted library allocation
page read and write
2D8B0BB000
stack
page read and write
224031E0000
heap
page read and write
22401710000
heap
page read and write
7FFAAC926000
trusted library allocation
page execute and read and write
224018DF000
heap
page read and write
7FFAACB20000
trusted library allocation
page read and write
C98C33D000
stack
page read and write
2241BC9E000
heap
page read and write
7FFB1E100000
unkown
page read and write
22401900000
heap
page read and write
2D8A9FE000
stack
page read and write
2240376C000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
2D8ACBE000
stack
page read and write
22403810000
heap
page read and write
224050CA000
trusted library allocation
page read and write
2D8AD37000
stack
page read and write
22404B57000
trusted library allocation
page read and write
224018A3000
heap
page read and write
C98C6FF000
unkown
page read and write
7FFAAC844000
trusted library allocation
page read and write
2D8ADB9000
stack
page read and write
2AD2AFC5000
heap
page read and write
2AD2ACA0000
heap
page read and write
7FFAACC40000
trusted library allocation
page read and write
2D8AF3E000
stack
page read and write
2241BBE1000
heap
page read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAAC840000
trusted library allocation
page read and write
224018DD000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
2D8A8FE000
stack
page read and write
7FFAAC9FA000
trusted library allocation
page read and write
22405470000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page execute and read and write
22403730000
heap
page read and write
2241B842000
heap
page read and write
2D8A87E000
stack
page read and write
22403758000
heap
page read and write
22401AE0000
heap
page read and write
224036B0000
heap
page execute and read and write
22413871000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
2240375F000
heap
page read and write
22403839000
heap
page read and write
2241BAB0000
heap
page read and write
7FFAACA70000
trusted library allocation
page read and write
7FFAACA40000
trusted library allocation
page read and write
224050C7000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
22403650000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
22403756000
heap
page read and write
7FFB1E105000
unkown
page readonly
2240546C000
trusted library allocation
page read and write
7FFAAC9F1000
trusted library allocation
page read and write
2241BA90000
heap
page read and write
22403777000
heap
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
2AD2AD50000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
7DF458290000
trusted library allocation
page execute and read and write
7FFAACC70000
trusted library allocation
page execute and read and write
7FFAACBAC000
trusted library allocation
page read and write
There are 188 hidden memdumps, click here to show them.