IOC Report
xy.ps1

loading gif

Files

File Path
Type
Category
Malicious
xy.ps1
ASCII text, with very long lines (65346), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4n4y52un.zpo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbiyp2nt.djy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulitwssz.itx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxvpx2jb.b1a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VK51PUCXPPA4IE6ZTCL0.temp
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\xy.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
kdke.duckdns.org
malicious
https://github.com/DARKNOSY/Rush-PowerShell-Obfuscator
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1D8A4A10000
trusted library section
page read and write
malicious
1D8A4D11000
trusted library allocation
page read and write
malicious
97F3F7E000
stack
page read and write
7FFB4B230000
trusted library allocation
page read and write
1D8A4B63000
trusted library allocation
page read and write
1D8A2FAD000
heap
page read and write
1D8A4B70000
trusted library allocation
page read and write
1D8A2FB0000
heap
page read and write
1D8A2FC3000
heap
page read and write
1D8A4B70000
trusted library allocation
page read and write
1D8A4B60000
trusted library allocation
page read and write
1D8A4B63000
trusted library allocation
page read and write
1D8A49F0000
trusted library allocation
page read and write
1D8A2FB5000
heap
page read and write
97F3D7E000
stack
page read and write
1D8A2FC3000
heap
page read and write
7DF43D800000
trusted library allocation
page execute and read and write
1D8A2FF4000
heap
page read and write
1D8A2F78000
heap
page read and write
7FFB4B3C5000
trusted library allocation
page read and write
7FFB4B3F0000
trusted library allocation
page read and write
1D8A4B50000
trusted library allocation
page read and write
1D8A2FBF000
heap
page read and write
82B0EFF000
stack
page read and write
1D8A4B60000
trusted library allocation
page read and write
97F39FE000
stack
page read and write
1B680001000
trusted library allocation
page read and write
97F393F000
stack
page read and write
97F3DFE000
stack
page read and write
1D8A4B60000
trusted library allocation
page read and write
82B0B8F000
stack
page read and write
7FFB4B3E0000
trusted library allocation
page read and write
1D8B4D1E000
trusted library allocation
page read and write
97F3875000
stack
page read and write
7FFB4B306000
trusted library allocation
page execute and read and write
97F407F000
stack
page read and write
82B107E000
stack
page read and write
1D8A2F70000
heap
page read and write
1D8A3043000
heap
page read and write
1D8A2FF4000
heap
page read and write
7DF43D7E0000
trusted library allocation
page execute and read and write
1D8A3028000
heap
page read and write
1D8A4A20000
heap
page read and write
1B680A01000
trusted library allocation
page read and write
1D8A4B60000
trusted library allocation
page read and write
1D8A4980000
heap
page read and write
7DF43D7F0000
trusted library allocation
page execute and read and write
1D8A4B63000
trusted library allocation
page read and write
1D8A4D00000
heap
page execute and read and write
1D8A2FED000
heap
page read and write
82B10FF000
stack
page read and write
1D8A3150000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
1D8A2FBF000
heap
page read and write
1D8A4CE0000
heap
page execute and read and write
1B687801000
trusted library allocation
page read and write
97F403E000
stack
page read and write
1D8A2FB0000
heap
page read and write
1D8A3015000
heap
page read and write
97F3AFE000
stack
page read and write
1D8A3045000
heap
page read and write
7FFB4B3CD000
trusted library allocation
page execute and read and write
82B11FF000
stack
page read and write
1D8A49B0000
trusted library allocation
page read and write
7FFB4B3D0000
trusted library allocation
page read and write
1B683201000
trusted library allocation
page read and write
97F413E000
stack
page read and write
97F3A7F000
stack
page read and write
1B681E01000
trusted library allocation
page read and write
1D8A4B63000
trusted library allocation
page read and write
1B681401000
trusted library allocation
page read and write
1D8A4D3D000
trusted library allocation
page read and write
7FFB4B3C0000
trusted library allocation
page read and write
7FFB4B2E0000
trusted library allocation
page execute and read and write
1D8A4B90000
heap
page read and write
1D8B4D19000
trusted library allocation
page read and write
1D8A4930000
heap
page read and write
97F41BB000
stack
page read and write
7FFB4B22D000
trusted library allocation
page execute and read and write
1D8A2FAA000
heap
page read and write
7FFB4B3F2000
trusted library allocation
page read and write
1B685001000
trusted library allocation
page read and write
97F3CFA000
stack
page read and write
82B0FFD000
stack
page read and write
82B117E000
stack
page read and write
1B685A01000
trusted library allocation
page read and write
1D8A49E0000
heap
page readonly
1D8A4A00000
trusted library allocation
page read and write
1D8B4D11000
trusted library allocation
page read and write
1D8A49D0000
trusted library allocation
page read and write
1D8A4B70000
trusted library allocation
page read and write
97F38FD000
stack
page read and write
7FFB4B235000
trusted library allocation
page read and write
1D8A2FAD000
heap
page read and write
7FFB4B224000
trusted library allocation
page read and write
1D8A4B80000
trusted library allocation
page read and write
7FFB4B3C2000
trusted library allocation
page read and write
7FFB4B223000
trusted library allocation
page execute and read and write
1D8A4A24000
heap
page read and write
97F3EFE000
stack
page read and write
82B0F7F000
stack
page read and write
1D8A4B53000
trusted library allocation
page read and write
1B686401000
trusted library allocation
page read and write
97F3E7C000
stack
page read and write
1D8A4BA0000
heap
page read and write
1D8A2FAA000
heap
page read and write
7FFB4B340000
trusted library allocation
page execute and read and write
1D8A4B69000
trusted library allocation
page read and write
1B682801000
trusted library allocation
page read and write
1D8A4B70000
trusted library allocation
page read and write
1D8A301C000
heap
page read and write
1D8A4974000
heap
page read and write
1D8A2F96000
heap
page read and write
1D8A2F50000
unkown
page execute read
1D8A4970000
heap
page read and write
1D8A4B60000
trusted library allocation
page read and write
97F4BCD000
stack
page read and write
1D8A4BA4000
heap
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
1D8A4BA6000
heap
page read and write
1D8A3043000
heap
page read and write
1D8A3045000
heap
page read and write
7FFB4B222000
trusted library allocation
page read and write
97F3BFE000
stack
page read and write
1B686E01000
trusted library allocation
page read and write
1D8A2FED000
heap
page read and write
1B683C01000
trusted library allocation
page read and write
1D8A2FB5000
heap
page read and write
1B684601000
trusted library allocation
page read and write
1D8A4B60000
trusted library allocation
page read and write
1D8A4BA1000
heap
page read and write
82B0E7F000
stack
page read and write
97F3C7E000
stack
page read and write
1D8A3070000
heap
page read and write
97F3B7E000
stack
page read and write
7FFB4B3D8000
trusted library allocation
page execute and read and write
1D8A3035000
heap
page read and write
1D8A4B70000
trusted library allocation
page read and write
There are 128 hidden memdumps, click here to show them.