Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
powershell.exe

Overview

General Information

Sample name:powershell.exe
Analysis ID:1546428
MD5:909a2eec5534f01dff87b7d47e57bff7
SHA1:bb26646b094923f080fc2f2ba363c4c28b33dc07
SHA256:d3b4b97c2bf97d70e5655ff4c4ca1d8cef9ded51685cfd764247cfda98ee68df
Tags:exeuser-KnownStormChaser
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sigma detected: System File Execution Location Anomaly
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64
  • powershell.exe (PID: 4188 cmdline: "C:\Users\user\Desktop\powershell.exe" MD5: 909A2EEC5534F01DFF87B7D47E57BFF7)
    • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\powershell.exe", CommandLine: "C:\Users\user\Desktop\powershell.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\powershell.exe, NewProcessName: C:\Users\user\Desktop\powershell.exe, OriginalFileName: C:\Users\user\Desktop\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\powershell.exe", ProcessId: 4188, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Users\user\Desktop\powershell.exe", CommandLine: "C:\Users\user\Desktop\powershell.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\powershell.exe, NewProcessName: C:\Users\user\Desktop\powershell.exe, OriginalFileName: C:\Users\user\Desktop\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\powershell.exe", ProcessId: 4188, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T21:50:17.251456+010020229301A Network Trojan was detected4.245.163.56443192.168.2.749715TCP
2024-10-31T21:50:55.648066+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749931TCP

Click to jump to signature section

Show All Signature Results
Source: powershell.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbOGPS source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.7:49715
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49931
Source: classification engineClassification label: sus22.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_03
Source: C:\Users\user\Desktop\powershell.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\powershell.exe "C:\Users\user\Desktop\powershell.exe"
Source: C:\Users\user\Desktop\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Users\user\Desktop\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: powershell.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: powershell.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbOGPS source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: powershell.exeStatic PE information: section name: fothk
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1546428 Sample: powershell.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 22 10 Sigma detected: System File Execution Location Anomaly 2->10 6 powershell.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
powershell.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1546428
Start date and time:2024-10-31 21:49:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 41s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:powershell.exe
Detection:SUS
Classification:sus22.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for powershell
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: powershell.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.362168879061803
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:powershell.exe
File size:454'656 bytes
MD5:909a2eec5534f01dff87b7d47e57bff7
SHA1:bb26646b094923f080fc2f2ba363c4c28b33dc07
SHA256:d3b4b97c2bf97d70e5655ff4c4ca1d8cef9ded51685cfd764247cfda98ee68df
SHA512:5b5b632eb93d227f81960916d13dd98c6f9cb0494866ceb324e6146254818f323537c39c2b90abc6496aad4b457c0b9b393301ea51157e9f823bd4cd442371dc
SSDEEP:6144:wCo5Sh1yzMWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:w6pW2KXzJ4pdd3klnnWosPhnzq
TLSH:C5A45A876BD412D5EC3EC435C82344520721BCB9D791A7EB9AD8F2390E712D09E3EA67
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.+.zkE.zkE.zkE.d9..xkE.s...pkE.zkE.{kE...F.~kE...A.fkE.zkD..kE...D..kE...@.qkE...M.}kE.....{kE...G.{kE.RichzkE.........PE..d..
Icon Hash:6b595171192d243b
Entrypoint:0x140005260
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x35569DCB [Mon May 11 06:42:19 1998 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:afacf6dc9041114b198160aab4d0ae77
Instruction
dec eax
sub esp, 28h
call 00007FF040DEAE90h
dec eax
add esp, 28h
jmp 00007FF040DEA4C3h
int3
int3
int3
int3
int3
int3
jmp dword ptr [0000814Ah]
int3
int3
int3
int3
int3
int3
jmp dword ptr [00008246h]
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [0000F480h]
call dword ptr [00007EEAh]
mov eax, dword ptr [0000F38Ch]
dec eax
lea ecx, dword ptr [0000F46Dh]
mov edx, dword ptr [0000F9FFh]
inc eax
mov dword ptr [0000F377h], eax
mov dword ptr [ebx], eax
dec eax
mov eax, dword ptr [00000058h]
inc ecx
mov ecx, 00000004h
dec esp
mov eax, dword ptr [eax+edx*8]
mov eax, dword ptr [0000F35Ch]
inc ebx
mov dword ptr [ecx+eax], eax
call dword ptr [00007EB2h]
dec eax
lea ecx, dword ptr [0000F43Bh]
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00007F97h]
int3
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [0000F410h]
call dword ptr [00007E7Ah]
cmp dword ptr [ebx], 00000000h
jne 00007FF040DEA6B4h
or dword ptr [ebx], FFFFFFFFh
jmp 00007FF040DEA6D7h
Programming Language:
  • [IMP] VS2008 build 21022
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1281c0xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x57d88.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x150000x954.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000x3b4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x111680x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xd0600x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcf200x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xd0880x468.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x92f00xa000e08ee933b1d0d0a1046af4098cd90d1aFalse0.48154296875data5.803282807568358IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
fothk0xb0000x10000x10000d467e48a52fab2130fcd20f007042c6False0.00927734375Non-ISO extended-ASCII text, with very long lines (4096), with no line terminators0.015920183265625623IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xc0000x76640x800035d0b0f075e69608bc02ae62d44305c7False0.2950439453125data4.057527620827512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x140000x10000x10008c0cee751aaf897287dd9de05a92bab2False0.120361328125data1.7916698454710964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x150000x9540x1000d143aa120f08539de63b8640a6f3b7dfFalse0.30078125data3.1557375369208365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x160000x57d880x58000646c290e3b31f270550961ac3c045531False0.348907470703125data5.300015330311705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6e0000x40c0x10005633ff8b3d7cf3e5d96c132d34d3efceFalse0.167724609375data2.003995998945334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
MUI0x6dcb00xd8dataEnglishUnited States0.5277777777777778
RT_ICON0x16c480x2fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.966372115856652
RT_ICON0x19c080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13096362777515352
RT_ICON0x1de300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1795643153526971
RT_ICON0x203d80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.1933431952662722
RT_ICON0x21e400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2572701688555347
RT_ICON0x22ee80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3422131147540984
RT_ICON0x238700x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.4197674418604651
RT_ICON0x23f280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5416666666666666
RT_ICON0x244080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.39451219512195124
RT_ICON0x24a700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5524193548387096
RT_ICON0x24d580x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.6065573770491803
RT_ICON0x24f400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6486486486486487
RT_ICON0x250680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5748933901918977
RT_ICON0x25f100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7522563176895307
RT_ICON0x267b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.8248847926267281
RT_ICON0x26e800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.6083815028901735
RT_ICON0x273e80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.3222586324229961
RT_ICON0x694100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5345435684647303
RT_ICON0x6b9b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6050656660412758
RT_ICON0x6ca600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6475409836065574
RT_ICON0x6d3e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6462765957446809
RT_GROUP_ICON0x243900x76dataEnglishUnited States0.7457627118644068
RT_GROUP_ICON0x6d8500xbcdataEnglishUnited States0.6063829787234043
RT_VERSION0x6d9100x39cPGP symmetric key encrypted data - Plaintext or unencrypted dataEnglishUnited States0.4577922077922078
RT_MANIFEST0x165a00x6a3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3719835197174809
DLLImport
msvcrt.dll_unlock, _lock, _commode, _fmode, _initterm, __setusermatherr, _cexit, _exit, exit, __set_app_type, __wgetmainargs, __CxxFrameHandler4, __dllonexit, _amsg_exit, _onexit, ?terminate@@YAXXZ, _vsnwprintf, _wcsicmp, _wcsnicmp, fclose, _wfopen, ??1type_info@@UEAA@XZ, wcstoul, wcschr, __uncaught_exception, _XcptFilter, memmove, memcpy, __CxxFrameHandler3, _CxxThrowException, ?what@exception@@UEBAPEBDXZ, ??1exception@@UEAA@XZ, ??0exception@@QEAA@AEBV0@@Z, ??0exception@@QEAA@AEBQEBDH@Z, ??0exception@@QEAA@AEBQEBD@Z, _callnewh, malloc, wcsncmp, wcsrchr, free, _purecall, ??3@YAXPEAX@Z, memcpy_s, ??_V@YAXPEAX@Z, __C_specific_handler, _itow_s, memset
ATL.DLL
KERNEL32.dllFindResourceExW, LCIDToLocaleName, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetLocaleInfoEx, GetSystemDefaultUILanguage, SearchPathW, LoadResource, GetTickCount, GetSystemTimeAsFileTime, FreeLibrary, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, CreateFileMappingW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, Sleep, IsWow64Process, GetCurrentThreadId, GetStartupInfoW, SetConsoleTitleW, FindFirstFileW, MapViewOfFile, GetFileType, CompareStringW, VerifyVersionInfoW, SetLastError, LoadLibraryExW, GetCurrentProcess, GetStdHandle, WriteFile, GetModuleHandleW, ExpandEnvironmentStringsW, GetModuleHandleExW, GetCurrentProcessId, VerSetConditionMask, GetModuleFileNameW, SetThreadUILanguage, K32GetModuleFileNameExW, GetProcAddress, SetErrorMode, FindClose, CreateFileW, GetFileAttributesW, OpenProcess, CreateToolhelp32Snapshot, WakeAllConditionVariable, FormatMessageW, LocalFree, WriteConsoleW, GetLastError, Process32NextW, Process32FirstW, CloseHandle
OLEAUT32.dllSysAllocString, SysFreeString, SafeArrayCreate, SafeArrayPutElement, SysStringLen, VariantClear
ADVAPI32.dllEventRegister, RegEnumKeyExW, RegOpenKeyExW, RegGetValueW, EventUnregister, EventWriteTransfer, RegCloseKey, RegQueryValueExW, EventSetInformation
OLE32.dllPropVariantClear, CoTaskMemAlloc, CoInitializeEx, CoUninitialize, CoCreateInstance, CoInitialize
USER32.dllLoadStringW
mscoree.dllCorBindToRuntimeEx
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:16:49:56
Start date:31/10/2024
Path:C:\Users\user\Desktop\powershell.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\powershell.exe"
Imagebase:0x7ff6a00a0000
File size:454'656 bytes
MD5 hash:909A2EEC5534F01DFF87B7D47E57BFF7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:16:49:56
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly