IOC Report
py.ps1

loading gif

Files

File Path
Type
Category
Malicious
py.ps1
ASCII text, with very long lines (65346), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0zzjtad.urv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_joyns0zn.t4f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcgvnz3n.01j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrf1tlnt.y2e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5Z3O7SBU59ZQU5LJUYPU.temp
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\py.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
nmds.duckdns.org
malicious
https://github.com/DARKNOSY/Rush-PowerShell-Obfuscator
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1D114C51000
trusted library allocation
page read and write
malicious
1D114A90000
trusted library section
page read and write
malicious
11C87117000
trusted library allocation
page read and write
B5FA7E000
stack
page read and write
B6007E000
stack
page read and write
B5F7A5000
stack
page read and write
11C83F17000
trusted library allocation
page read and write
7FFD34942000
trusted library allocation
page read and write
1D113194000
heap
page read and write
1D113100000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
1D113189000
heap
page read and write
1D113223000
heap
page read and write
B60D0E000
stack
page read and write
1D114A50000
trusted library allocation
page read and write
1D114AC0000
trusted library allocation
page read and write
1D114AC0000
trusted library allocation
page read and write
1D113227000
heap
page read and write
1D11318E000
heap
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
B5FF7C000
stack
page read and write
1D114AB0000
trusted library allocation
page read and write
B5FE7D000
stack
page read and write
25499F0000
stack
page read and write
1D114B30000
heap
page read and write
1D11318C000
heap
page read and write
1D113158000
heap
page read and write
1D113230000
heap
page read and write
1D1131FB000
heap
page read and write
11C84917000
trusted library allocation
page read and write
1D114AB3000
trusted library allocation
page read and write
2549F7E000
stack
page read and write
B5FB7D000
stack
page read and write
1D114A70000
heap
page read and write
11C82B17000
trusted library allocation
page read and write
1D114AB0000
trusted library allocation
page read and write
1D11318C000
heap
page read and write
1D114B41000
heap
page read and write
1D114AC0000
trusted library allocation
page read and write
1D113189000
heap
page read and write
1D114AB0000
trusted library allocation
page read and write
1D112FC0000
unkown
page execute read
7FFD34940000
trusted library allocation
page read and write
1D112FE0000
heap
page read and write
1D113218000
heap
page read and write
1D124C59000
trusted library allocation
page read and write
B5FD7F000
stack
page read and write
B6027B000
stack
page read and write
1D114AC0000
trusted library allocation
page read and write
1D113192000
heap
page read and write
B601FE000
stack
page read and write
2549D7E000
stack
page read and write
2549EFE000
stack
page read and write
7FFD347B5000
trusted library allocation
page read and write
1D1131CC000
heap
page read and write
B5FEFE000
stack
page read and write
1D114AB0000
trusted library allocation
page read and write
7FFD347A2000
trusted library allocation
page read and write
1D11319F000
heap
page read and write
1D1131CE000
heap
page read and write
1D114A80000
trusted library allocation
page read and write
11C80001000
trusted library allocation
page read and write
1D114A40000
heap
page readonly
11C82117000
trusted library allocation
page read and write
1D1131CC000
heap
page read and write
1D12D540000
heap
page execute and read and write
7FFD34850000
trusted library allocation
page read and write
1D124C5E000
trusted library allocation
page read and write
7FFD34945000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
1D114AA3000
trusted library allocation
page read and write
7FFD34958000
trusted library allocation
page execute and read and write
B600FE000
stack
page read and write
1D114AA0000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
1D114AB3000
trusted library allocation
page read and write
1D114B40000
heap
page read and write
B5FBFE000
stack
page read and write
1D1131CE000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
B5FC7E000
stack
page read and write
1D113201000
heap
page read and write
1D11322F000
heap
page read and write
2549CFF000
stack
page read and write
1D113230000
heap
page read and write
1D114AC0000
trusted library allocation
page read and write
2549DFD000
stack
page read and write
1D1149F0000
heap
page read and write
11C81401000
trusted library allocation
page read and write
1D114AB0000
trusted library allocation
page read and write
1D114AB3000
trusted library allocation
page read and write
1D114AB3000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
B5FFFE000
stack
page read and write
1D11322F000
heap
page read and write
7DF4058D0000
trusted library allocation
page execute and read and write
1D114A74000
heap
page read and write
11C86717000
trusted library allocation
page read and write
1D113150000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
B60C8E000
stack
page read and write
11C85D17000
trusted library allocation
page read and write
1D114A10000
trusted library allocation
page read and write
B5FDF9000
stack
page read and write
11C83517000
trusted library allocation
page read and write
1D113230000
heap
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
7FFD34980000
trusted library allocation
page execute and read and write
1D114B34000
heap
page read and write
1D1131A2000
heap
page read and write
11C87B17000
trusted library allocation
page read and write
B5FAFE000
stack
page read and write
1D114AB9000
trusted library allocation
page read and write
1D124C51000
trusted library allocation
page read and write
1D114A60000
heap
page read and write
11C85317000
trusted library allocation
page read and write
7DF4058B0000
trusted library allocation
page execute and read and write
7FFD347AD000
trusted library allocation
page execute and read and write
B5FCFE000
stack
page read and write
11C88A01000
trusted library allocation
page read and write
1D11318E000
heap
page read and write
7FFD34972000
trusted library allocation
page read and write
1D114C40000
heap
page execute and read and write
B5F7EE000
stack
page read and write
1D114AD0000
trusted library allocation
page read and write
B6013F000
stack
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
7DF4058C0000
trusted library allocation
page execute and read and write
2549FFF000
stack
page read and write
11C88001000
trusted library allocation
page read and write
1D114A30000
trusted library allocation
page read and write
1D113192000
heap
page read and write
1D114AB0000
trusted library allocation
page read and write
1D11322F000
heap
page read and write
2549E7E000
stack
page read and write
2549C7F000
stack
page read and write
1D113223000
heap
page read and write
11C80A01000
trusted library allocation
page read and write
1D1131A2000
heap
page read and write
1D1130C0000
heap
page read and write
1D113194000
heap
page read and write
7FFD3494D000
trusted library allocation
page execute and read and write
1D11319F000
heap
page read and write
There are 133 hidden memdumps, click here to show them.