IOC Report
test.ps

loading gif

Files

File Path
Type
Category
Malicious
test.ps
ASCII text, with very long lines (1186)
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxgodwch.q0h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\06PX50JEJHJ4YGT8LM50.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped

IPs

IP
Domain
Country
Malicious
184.28.90.27
unknown
United States
127.0.0.1
unknown
unknown