IOC Report
a.ps1

loading gif

Files

File Path
Type
Category
Malicious
a.ps1
ASCII text, with very long lines (65441), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sjyognc.oy3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvzwlc5u.b3x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wyx21vog.ygx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvrb0ysl.qih.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EEBX35X2P26V975PTGGZ.temp
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\a.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
dcxwq1.duckdns.org
malicious
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1B780001000
trusted library allocation
page read and write
malicious
1B7F7DE0000
trusted library section
page read and write
malicious
1B7F6452000
heap
page read and write
malicious
1B7F7D80000
heap
page read and write
1B7F7E20000
trusted library allocation
page read and write
1B7F63C4000
heap
page read and write
1B7F6458000
heap
page read and write
525D5FE000
stack
page read and write
80E2D7F000
stack
page read and write
80E2DFE000
stack
page read and write
7FF8489B4000
trusted library allocation
page read and write
1B7F7DB0000
heap
page readonly
525DCBE000
stack
page read and write
1B7F63EF000
heap
page read and write
7FF848B90000
trusted library allocation
page execute and read and write
1F700C2A000
trusted library allocation
page read and write
7DF452400000
trusted library allocation
page execute and read and write
1B7F7E19000
trusted library allocation
page read and write
525D1D5000
stack
page read and write
7FF848B80000
trusted library allocation
page read and write
525E70E000
stack
page read and write
1B7F7E00000
trusted library allocation
page read and write
1B7F6453000
heap
page read and write
1B7F63AF000
heap
page read and write
1B7F7DD0000
trusted library allocation
page read and write
7FF8489B3000
trusted library allocation
page execute and read and write
1B78002F000
trusted library allocation
page read and write
1B7F7D40000
heap
page read and write
1B790009000
trusted library allocation
page read and write
525D8FD000
stack
page read and write
1B7F6469000
heap
page read and write
525DD3B000
stack
page read and write
1B7F63C1000
heap
page read and write
1F70162A000
trusted library allocation
page read and write
1B7F6320000
unkown
page execute read
1B7F7FC0000
heap
page execute and read and write
1F70342A000
trusted library allocation
page read and write
80E2AFE000
stack
page read and write
1B7F7E20000
trusted library allocation
page read and write
1F70702A000
trusted library allocation
page read and write
1F70022A000
trusted library allocation
page read and write
1B7F63ED000
heap
page read and write
525D7FF000
stack
page read and write
525D9FC000
stack
page read and write
525D57D000
stack
page read and write
525D77E000
stack
page read and write
7FF8489C0000
trusted library allocation
page read and write
1F707A2A000
trusted library allocation
page read and write
1B7F8768000
heap
page read and write
1F700088000
trusted library allocation
page read and write
1B7F63ED000
heap
page read and write
1F70522A000
trusted library allocation
page read and write
7FF848B5D000
trusted library allocation
page execute and read and write
1B7F8760000
heap
page read and write
1B7F63EF000
heap
page read and write
1B7F7E10000
trusted library allocation
page read and write
1F703E2A000
trusted library allocation
page read and write
525D6FE000
stack
page read and write
7FF848B68000
trusted library allocation
page execute and read and write
1B7F6421000
heap
page read and write
1B7F7E10000
trusted library allocation
page read and write
525D47D000
stack
page read and write
1B7F63B4000
heap
page read and write
1F70482A000
trusted library allocation
page read and write
1F702A2A000
trusted library allocation
page read and write
1B7F7E20000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
1B7F8761000
heap
page read and write
525D67E000
stack
page read and write
1B7F7F50000
trusted library allocation
page read and write
1B79000E000
trusted library allocation
page read and write
7FF848A96000
trusted library allocation
page execute and read and write
1B7F6421000
heap
page read and write
1B7F6423000
heap
page read and write
7DF452420000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
1B7F7DF0000
heap
page read and write
1B7F6423000
heap
page read and write
1B7F7D84000
heap
page read and write
7DF452410000
trusted library allocation
page execute and read and write
1B7F642E000
heap
page read and write
525D4BF000
stack
page read and write
525DBBF000
stack
page read and write
1B7F63B7000
heap
page read and write
1B7F63C4000
heap
page read and write
1B7F63B4000
heap
page read and write
525D97E000
stack
page read and write
525DAFF000
stack
page read and write
1B7F6453000
heap
page read and write
1B7F6378000
heap
page read and write
1B7F642E000
heap
page read and write
1B7F8764000
heap
page read and write
80E2C7E000
stack
page read and write
1B7F63C1000
heap
page read and write
1F70662A000
trusted library allocation
page read and write
1B7F6469000
heap
page read and write
7FF848B82000
trusted library allocation
page read and write
1B7F7E13000
trusted library allocation
page read and write
7FF8489C5000
trusted library allocation
page read and write
1B7F7E10000
trusted library allocation
page read and write
1B7F6440000
heap
page read and write
1B7F7D70000
trusted library allocation
page read and write
1B7F6453000
heap
page read and write
1B7F641E000
heap
page read and write
1B7F6350000
heap
page read and write
1B7F7E20000
trusted library allocation
page read and write
80E2A7F000
stack
page read and write
1B7F8769000
heap
page read and write
1B7F7D00000
heap
page read and write
1F700001000
trusted library allocation
page read and write
1B7F7E13000
trusted library allocation
page read and write
7FF848AD0000
trusted library allocation
page execute and read and write
7FF8489BD000
trusted library allocation
page execute and read and write
7FF848B52000
trusted library allocation
page read and write
1B7F7E10000
trusted library allocation
page read and write
1B7F7E10000
trusted library allocation
page read and write
1B7F7E20000
trusted library allocation
page read and write
1B7F6431000
heap
page read and write
1B7F645A000
heap
page read and write
7FF848A60000
trusted library allocation
page read and write
1B7F6463000
heap
page read and write
1B7F63B7000
heap
page read and write
1B7F7DA0000
trusted library allocation
page read and write
1B790001000
trusted library allocation
page read and write
1B7F8767000
heap
page read and write
1F705C2A000
trusted library allocation
page read and write
1B7F6340000
heap
page read and write
1B7F8768000
heap
page read and write
525DA7E000
stack
page read and write
80E2BFD000
stack
page read and write
1F70202A000
trusted library allocation
page read and write
525D87A000
stack
page read and write
1B7F63AF000
heap
page read and write
1B7F63AC000
heap
page read and write
7FF8489B2000
trusted library allocation
page read and write
1B7F7DC0000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
1B7F7E10000
trusted library allocation
page read and write
1B7F6370000
heap
page read and write
1B7F63AC000
heap
page read and write
7FF848B55000
trusted library allocation
page read and write
80E2CFF000
stack
page read and write
1B7F7E13000
trusted library allocation
page read and write
1B7F6455000
heap
page read and write
1B7F7E34000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
1B7F7E30000
heap
page read and write
1B7F7E13000
trusted library allocation
page read and write
80E2B7E000
stack
page read and write
1B7F7E03000
trusted library allocation
page read and write
1B7F8750000
heap
page execute and read and write
80E27EF000
stack
page read and write
1B7F6452000
heap
page read and write
There are 143 hidden memdumps, click here to show them.