IOC Report
Get WiFi Passwords.ps1

loading gif

Files

File Path
Type
Category
Malicious
Get WiFi Passwords.ps1
Unicode text, UTF-8 (with BOM) text, with very long lines (1082), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qsczyzh.bqi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wrkpi0yk.rnm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\25D3QA2IKJXEFDWDQJ51.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\Documents\20241125\PowerShell_transcript.066656.7bnHlJGN.20241125024616.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\Get WiFi Passwords.ps1"
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" wlan show profiles
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://webhook.site/ba0c7563-37b1-4960-bb3e-78e72c479043
unknown
https://aka.ms/pscore68
unknown
https://webhook.site/ba0c7563-37(
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 6 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD34940000
trusted library allocation
page execute and read and write
200D7DF3000
heap
page read and write
1A159216000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
200D7FB0000
heap
page execute and read and write
200BDE53000
heap
page read and write
1A1594C4000
heap
page read and write
200BFD11000
trusted library allocation
page read and write
BD87838000
stack
page read and write
1A159216000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
200D7FFB000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
BD879BF000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
200C0944000
trusted library allocation
page read and write
200BF735000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1A15AC88000
heap
page read and write
1A15AC96000
heap
page read and write
200BFB80000
trusted library allocation
page read and write
1A15AC8E000
heap
page read and write
BD878B9000
stack
page read and write
200BDE76000
heap
page read and write
200BDF20000
heap
page read and write
200BFF44000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
200D802B000
heap
page read and write
200BDE5E000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
200D7EB0000
heap
page read and write
200BFB83000
trusted library allocation
page read and write
200C13E9000
trusted library allocation
page read and write
381AFFE000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
1A15AC9D000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
1A1590F0000
heap
page read and write
BD877B7000
stack
page read and write
1A15AC92000
heap
page read and write
1A15AC95000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
200C16E4000
trusted library allocation
page read and write
381B2FE000
stack
page read and write
200BDE5A000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
1A15AC84000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
200BDDC2000
heap
page read and write
BD8747E000
stack
page read and write
381ACED000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
381ACFE000
stack
page read and write
1A159120000
heap
page read and write
1A159210000
heap
page read and write
200C17D4000
trusted library allocation
page read and write
1A15AC83000
heap
page read and write
200D7F90000
heap
page execute and read and write
200C146E000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
7FFD3478B000
trusted library allocation
page read and write
7DF44FB40000
trusted library allocation
page execute and read and write
381B3FF000
stack
page read and write
200C139C000
trusted library allocation
page read and write
1A15AC91000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
1A1591D5000
heap
page read and write
200BDE3B000
heap
page read and write
BD876F7000
stack
page read and write
200BDE9F000
heap
page read and write
1A1591E6000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
BD8767D000
stack
page read and write
BD8858E000
stack
page read and write
200BFAD0000
heap
page readonly
BD87275000
stack
page read and write
1A15AC9D000
heap
page read and write
BD872FE000
stack
page read and write
200BDEA2000
heap
page read and write
BD873FD000
stack
page read and write
7FFD34925000
trusted library allocation
page read and write
200BDCA0000
heap
page read and write
1A15AC80000
heap
page read and write
200C16AA000
trusted library allocation
page read and write
200D803F000
heap
page read and write
200BFBCB000
heap
page read and write
1A15AC95000
heap
page read and write
200BDF25000
heap
page read and write
200BDE38000
heap
page read and write
200BDD80000
heap
page read and write
200C1A30000
trusted library allocation
page read and write
200CFD8E000
trusted library allocation
page read and write
200C1A2C000
trusted library allocation
page read and write
200D8030000
heap
page read and write
1A1591C0000
heap
page read and write
200D7D3E000
heap
page read and write
200D7D10000
heap
page read and write
1A15AC8F000
heap
page read and write
200D7FD5000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
200CFD11000
trusted library allocation
page read and write
BD874FB000
stack
page read and write
200BDDB8000
heap
page read and write
1A15AC82000
heap
page read and write
1A15AC94000
heap
page read and write
200BDEB0000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
7FFD34952000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page read and write
BD875FE000
stack
page read and write
381ADFE000
unkown
page read and write
BD87B3B000
stack
page read and write
1A15AC92000
heap
page read and write
BD8773F000
stack
page read and write
200D7FB7000
heap
page execute and read and write
200CFD20000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
1A1591E6000
heap
page read and write
1A159100000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
BD8737E000
stack
page read and write
200BDE9D000
heap
page read and write
1A1591E6000
heap
page read and write
1A15AC8A000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
BD8793F000
stack
page read and write
200BFD9B000
trusted library allocation
page read and write
200BDF00000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
BD8757F000
stack
page read and write
381AEFD000
stack
page read and write
7FFD3492A000
trusted library allocation
page read and write
200BF730000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
200BFAC0000
trusted library allocation
page read and write
200BFD00000
heap
page execute and read and write
1A159209000
heap
page read and write
200BDE66000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
200D7FD0000
heap
page read and write
200BDE64000
heap
page read and write
BD87ABE000
stack
page read and write
200C165C000
trusted library allocation
page read and write
200CFD82000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1A1591B0000
heap
page read and write
1A1591D9000
heap
page read and write
200BFAE0000
trusted library allocation
page read and write
BD8850F000
stack
page read and write
200C1967000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
381ACF4000
stack
page read and write
200C1688000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
200C1344000
trusted library allocation
page read and write
1A15AC8D000
heap
page read and write
200D7DE7000
heap
page read and write
1A15AC95000
heap
page read and write
200BFB40000
heap
page read and write
200BFA90000
trusted library allocation
page read and write
200D7D8F000
heap
page read and write
1A15AE50000
heap
page read and write
200BDEE0000
heap
page read and write
200D8036000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
200BDDB0000
heap
page read and write
1A1594C0000
heap
page read and write
200D7D48000
heap
page read and write
200CFEC5000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
There are 168 hidden memdumps, click here to show them.