IOC Report
quark.ps1

loading gif

Files

File Path
Type
Category
Malicious
quark.ps1
ASCII text, with very long lines (65346), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igiqhzjc.zdy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_julg0pxn.imr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofgf04im.lcz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zphazezq.yoc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DPXAHRKE5K5H2J21DYW2.temp
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\quark.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
jdokds.duckdns.org
malicious
https://github.com/DARKNOSY/Rush-PowerShell-Obfuscator
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
28858F71000
trusted library allocation
page read and write
malicious
28858EF0000
trusted library section
page read and write
malicious
22405229000
trusted library allocation
page read and write
2885751E000
heap
page read and write
28858F00000
heap
page read and write
28858F60000
heap
page execute and read and write
28858E80000
trusted library allocation
page read and write
22404829000
trusted library allocation
page read and write
2885751E000
heap
page read and write
22400C29000
trusted library allocation
page read and write
28858EB0000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
28858F30000
trusted library allocation
page read and write
28858E10000
heap
page read and write
2F834FE000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
D4A7AFE000
stack
page read and write
D4A78FD000
stack
page read and write
2885751E000
heap
page read and write
28858F30000
trusted library allocation
page read and write
2F8408D000
stack
page read and write
28857440000
heap
page read and write
28858F23000
trusted library allocation
page read and write
2885747B000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF848E35000
trusted library allocation
page read and write
7DF45D800000
trusted library allocation
page execute and read and write
28857448000
heap
page read and write
D4A797F000
stack
page read and write
28857519000
heap
page read and write
2F830FD000
stack
page read and write
28857511000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
28871741000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2F8317E000
stack
page read and write
28857494000
heap
page read and write
22402A29000
trusted library allocation
page read and write
2F82FFE000
stack
page read and write
2885751E000
heap
page read and write
28857490000
heap
page read and write
7FF848FD8000
trusted library allocation
page execute and read and write
288712F4000
heap
page read and write
28858F30000
trusted library allocation
page read and write
28858ED0000
trusted library allocation
page read and write
288574C0000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
28857430000
unkown
page execute read
28858EA0000
trusted library allocation
page read and write
2F832FC000
stack
page read and write
28857490000
heap
page read and write
2F8367B000
stack
page read and write
22400229000
trusted library allocation
page read and write
2885751A000
heap
page read and write
2885751F000
heap
page read and write
288574E7000
heap
page read and write
288574BE000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
2F82B9D000
stack
page read and write
288574E9000
heap
page read and write
28858F30000
trusted library allocation
page read and write
22407029000
trusted library allocation
page read and write
2F8337E000
stack
page read and write
28858F30000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
28858F40000
trusted library allocation
page read and write
28857486000
heap
page read and write
D4A7A7E000
stack
page read and write
28857501000
heap
page read and write
28868F7E000
trusted library allocation
page read and write
28858F39000
trusted library allocation
page read and write
2F82B15000
stack
page read and write
28858EC0000
heap
page readonly
28858F40000
trusted library allocation
page read and write
7DF45D820000
trusted library allocation
page execute and read and write
2885747E000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
2F8347D000
stack
page read and write
28858EB4000
heap
page read and write
28857467000
heap
page read and write
28871860000
heap
page execute and read and write
2F833FE000
stack
page read and write
28871740000
heap
page read and write
28868F71000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7DF45D810000
trusted library allocation
page execute and read and write
22403E29000
trusted library allocation
page read and write
22406629000
trusted library allocation
page read and write
288574C0000
heap
page read and write
28857486000
heap
page read and write
22400001000
trusted library allocation
page read and write
2F82E7D000
stack
page read and write
2F82BDE000
stack
page read and write
2885751A000
heap
page read and write
2885751A000
heap
page read and write
22407A29000
trusted library allocation
page read and write
28858F33000
trusted library allocation
page read and write
28857483000
heap
page read and write
28868F79000
trusted library allocation
page read and write
22402029000
trusted library allocation
page read and write
28857519000
heap
page read and write
28858F33000
trusted library allocation
page read and write
D4A79FE000
stack
page read and write
D4A74B0000
stack
page read and write
28858F50000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
2885751E000
heap
page read and write
2F835FE000
stack
page read and write
D4A75BF000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
28858F40000
trusted library allocation
page read and write
28858F33000
trusted library allocation
page read and write
2F82F7E000
stack
page read and write
22401629000
trusted library allocation
page read and write
2885747B000
heap
page read and write
2885751E000
heap
page read and write
28857494000
heap
page read and write
7FF848FCD000
trusted library allocation
page execute and read and write
28858EE0000
trusted library allocation
page read and write
22400088000
trusted library allocation
page read and write
2F831F9000
stack
page read and write
22403429000
trusted library allocation
page read and write
2F8307E000
stack
page read and write
28858F40000
trusted library allocation
page read and write
28858F10000
heap
page read and write
28858F14000
heap
page read and write
28858F33000
trusted library allocation
page read and write
28858F30000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
2F82EFD000
stack
page read and write
28857511000
heap
page read and write
D4A753F000
stack
page read and write
28857630000
heap
page read and write
28857518000
heap
page read and write
2F8353E000
stack
page read and write
22405C29000
trusted library allocation
page read and write
28857483000
heap
page read and write
28857550000
heap
page read and write
2885747E000
heap
page read and write
288574BE000
heap
page read and write
7FF848FC5000
trusted library allocation
page read and write
28858E50000
heap
page read and write
28858F20000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2885751E000
heap
page read and write
2F8327D000
stack
page read and write
D4A787F000
stack
page read and write
28858F40000
trusted library allocation
page read and write
There are 140 hidden memdumps, click here to show them.