IOC Report
readme.md.ps1

loading gif

Files

File Path
Type
Category
Malicious
readme.md.ps1
ASCII text
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_myn4dfiv.rgh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruey3bbm.go5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3QLEGYJBF4EB110VHD3X.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\readme.md.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://go.micro
unknown
malicious
https://github.com/Pester/Pester
unknown
malicious
http://87.120.113.125
unknown
http://nuget.org/NuGet.exe
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://87.120.113.125/re.exe
87.120.113.125
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
87.120.113.125
unknown
Bulgaria

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E7A8FB000
stack
page read and write
E7B98D000
stack
page read and write
1DE160D1000
trusted library allocation
page read and write
E7BA4E000
stack
page read and write
1DE14360000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
7DF468A20000
trusted library allocation
page execute and read and write
1DE2E557000
heap
page read and write
1DE143A3000
heap
page read and write
7FFD3468B000
trusted library allocation
page read and write
E7AE3E000
stack
page read and write
1DE2E567000
heap
page read and write
1DE2E64B000
heap
page read and write
1DE2E64E000
heap
page read and write
E7AEBC000
stack
page read and write
7FFD3482A000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
E7A6FE000
stack
page read and write
7FFD34855000
trusted library allocation
page read and write
E7ACBA000
stack
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7FFD34730000
trusted library allocation
page execute and read and write
1DE141D0000
heap
page read and write
1DE14410000
heap
page read and write
1DE2E0DF000
heap
page read and write
1DE16010000
trusted library allocation
page read and write
1DE2E5DF000
heap
page read and write
1DE15FC0000
trusted library allocation
page read and write
E7A97F000
stack
page read and write
E7ABB7000
stack
page read and write
1DE2E520000
heap
page read and write
1DE2E5C8000
heap
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
1DE2E1F0000
heap
page read and write
E7A7FD000
stack
page read and write
E7AC37000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
1DE1437C000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
1DE142B0000
heap
page read and write
1DE17718000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
1DE2E615000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
7FFD34860000
trusted library allocation
page execute and read and write
7FFD348D0000
trusted library allocation
page read and write
1DE2E619000
heap
page read and write
1DE2E227000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
1DE1727D000
trusted library allocation
page read and write
E7A77E000
stack
page read and write
1DE1435B000
heap
page read and write
1DE14430000
heap
page read and write
E7ADBE000
stack
page read and write
7FFD346CC000
trusted library allocation
page execute and read and write
E7A3D5000
stack
page read and write
1DE143B0000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
1DE176F8000
trusted library allocation
page read and write
E7A67E000
stack
page read and write
7FFD34674000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
1DE2E370000
heap
page execute and read and write
1DE263C9000
trusted library allocation
page read and write
E7B9CF000
stack
page read and write
1DE1774E000
trusted library allocation
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
1DE16040000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
1DE15C65000
heap
page read and write
E7AF3B000
stack
page read and write
7FFD34673000
trusted library allocation
page execute and read and write
E7BB4B000
stack
page read and write
1DE2E58D000
heap
page read and write
7FFD34857000
trusted library allocation
page read and write
1DE263BA000
trusted library allocation
page read and write
1DE14440000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
1DE160C0000
heap
page execute and read and write
1DE2E5FC000
heap
page read and write
1DE2E22E000
heap
page read and write
1DE1783A000
trusted library allocation
page read and write
1DE16083000
trusted library allocation
page read and write
1DE260D1000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
1DE2E5AF000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
E7AD3E000
stack
page read and write
1DE2E2D3000
heap
page read and write
E7AA7D000
stack
page read and write
7FFD34756000
trusted library allocation
page execute and read and write
E7A87E000
stack
page read and write
1DE2E3A7000
heap
page execute and read and write
1DE26282000
trusted library allocation
page read and write
1DE2E440000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
1DE2E5C2000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
1DE178A6000
trusted library allocation
page read and write
1DE1436A000
heap
page read and write
1DE16000000
heap
page readonly
1DE15FF0000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD34672000
trusted library allocation
page read and write
1DE17714000
trusted library allocation
page read and write
E7AB3E000
stack
page read and write
1DE260E0000
trusted library allocation
page read and write
1DE143D0000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
1DE176F2000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
1DE26140000
trusted library allocation
page read and write
1DE14366000
heap
page read and write
1DE16D02000
trusted library allocation
page read and write
1DE16080000
trusted library allocation
page read and write
1DE15C60000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD3472C000
trusted library allocation
page execute and read and write
1DE14445000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
1DE16302000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
E7A9FE000
stack
page read and write
1DE2E63F000
heap
page read and write
1DE14364000
heap
page read and write
1DE2E5B4000
heap
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD34852000
trusted library allocation
page read and write
1DE2E3A0000
heap
page execute and read and write
7FFD34821000
trusted library allocation
page read and write
1DE1789D000
trusted library allocation
page read and write
1DE176FE000
trusted library allocation
page read and write
E7B90F000
stack
page read and write
7FFD34726000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
E7BAC8000
stack
page read and write
1DE2E234000
heap
page read and write
1DE1615B000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
E7AAF9000
stack
page read and write
1DE2E626000
heap
page read and write
There are 135 hidden memdumps, click here to show them.