IOC Report
payload.ps1

loading gif

Files

File Path
Type
Category
Malicious
payload.ps1
ASCII text, with very long lines (65346), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_afjfhcho.akh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eilxymg2.ntc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kf2a4w5p.fan.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0zkfibh.wn1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WHJK2IDY10Z5AFGGHPLO.temp
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\payload.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
vbdsg.duckdns.org
malicious
https://github.com/DARKNOSY/Rush-PowerShell-Obfuscator
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1DA96AF1000
trusted library allocation
page read and write
malicious
1DA969E0000
trusted library section
page read and write
malicious
12509939000
trusted library allocation
page read and write
1DA94EDD000
heap
page read and write
7C5EE5000
stack
page read and write
1DA96880000
heap
page readonly
12503030000
heap
page read and write
7C627E000
stack
page read and write
12504BC0000
heap
page read and write
7DF473260000
trusted library allocation
page execute and read and write
12503010000
heap
page read and write
1DA96A00000
trusted library allocation
page read and write
1DA94F0B000
heap
page read and write
12504B20000
heap
page read and write
1DA96850000
heap
page read and write
1DA969F0000
trusted library allocation
page read and write
1DA96A03000
trusted library allocation
page read and write
1DA96810000
heap
page read and write
12504AB0000
trusted library allocation
page read and write
1DA96A30000
trusted library allocation
page read and write
7DF473280000
trusted library allocation
page execute and read and write
1DA94F42000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1DA969B0000
heap
page read and write
1DA96A20000
heap
page execute and read and write
125032B0000
heap
page read and write
1DA94EA4000
heap
page read and write
1DA94EDD000
heap
page read and write
7DF473270000
trusted library allocation
page execute and read and write
125032A0000
heap
page read and write
12502FF0000
heap
page read and write
125032A5000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
12504AD0000
trusted library allocation
page read and write
1250A339000
trusted library allocation
page read and write
7C647E000
stack
page read and write
1DA94EAF000
heap
page read and write
7C637E000
stack
page read and write
1DAAF1B1000
heap
page read and write
1DA94E10000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
12503220000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
1DA94EB3000
heap
page read and write
72F247E000
stack
page read and write
72F26FE000
stack
page read and write
1DA96A03000
trusted library allocation
page read and write
1250311E000
heap
page read and write
7C687F000
stack
page read and write
125030EF000
heap
page read and write
1DA969B4000
heap
page read and write
1250CB39000
trusted library allocation
page read and write
1DA94EA1000
heap
page read and write
125050E0000
heap
page execute and read and write
1DAA6AFE000
trusted library allocation
page read and write
12508F39000
trusted library allocation
page read and write
1DA94F42000
heap
page read and write
12505D39000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page execute and read and write
12503270000
trusted library allocation
page read and write
12503042000
heap
page read and write
1DA94E68000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1DA94EA4000
heap
page read and write
72F25FE000
stack
page read and write
72F207F000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7C744E000
stack
page read and write
1DA96A00000
trusted library allocation
page read and write
7FFD9B795000
trusted library allocation
page read and write
7C657E000
stack
page read and write
1DA96A10000
trusted library allocation
page read and write
1DA94F09000
heap
page read and write
1DA96A03000
trusted library allocation
page read and write
12504F1C000
heap
page read and write
1DA96A09000
trusted library allocation
page read and write
12507B39000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7C667E000
stack
page read and write
7C693F000
stack
page read and write
12508539000
trusted library allocation
page read and write
72F24FD000
stack
page read and write
1DA94EA1000
heap
page read and write
1DA96870000
trusted library allocation
page read and write
12502FE0000
heap
page read and write
7C63FE000
stack
page read and write
1DAAF1B0000
heap
page read and write
1DA94F14000
heap
page read and write
1DA94E20000
heap
page read and write
1DA967D0000
heap
page read and write
1DA94EB3000
heap
page read and write
1DA94F40000
heap
page read and write
7FFD9B92D000
trusted library allocation
page execute and read and write
12504B30000
direct allocation
page execute and read and write
1DAA6AF9000
trusted library allocation
page read and write
1DA94F42000
heap
page read and write
1DA94E9A000
heap
page read and write
1DA96A03000
trusted library allocation
page read and write
7FFD9B925000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
125030B7000
heap
page read and write
72F218F000
stack
page read and write
1DA96A10000
trusted library allocation
page read and write
72F257E000
stack
page read and write
12507139000
trusted library allocation
page read and write
7C683E000
stack
page read and write
12506739000
trusted library allocation
page read and write
1DA94EAF000
heap
page read and write
1DA94E60000
heap
page read and write
1DA969C0000
trusted library allocation
page read and write
12505197000
trusted library allocation
page read and write
1DAA6AF1000
trusted library allocation
page read and write
1DA94F20000
heap
page read and write
125030D7000
heap
page read and write
1DA96A10000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7C5F6D000
stack
page read and write
1DA96A00000
trusted library allocation
page read and write
7C69BB000
stack
page read and write
12504A80000
trusted library allocation
page read and write
7C66FC000
stack
page read and write
1250C139000
trusted library allocation
page read and write
1DA96A00000
trusted library allocation
page read and write
12504AC0000
heap
page readonly
1DA969F3000
trusted library allocation
page read and write
1DA94DF0000
unkown
page execute read
12505111000
trusted library allocation
page read and write
1DA96AE0000
heap
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
12505339000
trusted library allocation
page read and write
1DA96A10000
trusted library allocation
page read and write
1DA969D0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
125050E7000
heap
page execute and read and write
12503119000
heap
page read and write
125032B5000
heap
page read and write
1DA96A00000
trusted library allocation
page read and write
7C64FA000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
1DA94F09000
heap
page read and write
1DA96840000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1DA96A10000
trusted library allocation
page read and write
72F210F000
stack
page read and write
1DA96A00000
trusted library allocation
page read and write
7C65FE000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
7C5FAE000
stack
page read and write
7C677E000
stack
page read and write
125030D3000
heap
page read and write
1250AD39000
trusted library allocation
page read and write
125030CF000
heap
page read and write
1DA94F40000
heap
page read and write
1250B739000
trusted library allocation
page read and write
1DA96854000
heap
page read and write
72F267E000
stack
page read and write
1DA96B1D000
trusted library allocation
page read and write
1DA94E86000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1DA94E9A000
heap
page read and write
7C73CE000
stack
page read and write
7C62FE000
stack
page read and write
12505100000
heap
page execute and read and write
1DA969A0000
heap
page read and write
There are 155 hidden memdumps, click here to show them.