IOC Report
powershell.ps1

loading gif

Files

File Path
Type
Category
Malicious
powershell.ps1
ASCII text, with very long lines (1022), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eydyruyo.dga.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbvjqnxs.ijs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1v3czn5.spw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4usykrq.eng.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GB7LU0PQ56V4Z5RQUTFA.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\powershell.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://194.163.130.194:443/news.php
194.163.130.194
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://aka.ms/pscore68
unknown
http://194.163.130.194:443/news.php
unknown
http://194.163.130.194:443
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
194.163.130.194
unknown
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF7C1D1C000
trusted library allocation
page read and write
7FF7C1AE0000
trusted library allocation
page read and write
212AF121000
heap
page read and write
21298D69000
trusted library allocation
page read and write
212AF200000
heap
page read and write
212AEE30000
heap
page read and write
21294F55000
heap
page read and write
212AEF50000
heap
page read and write
212AF509000
heap
page read and write
1AB3E8D000
stack
page read and write
7FF7C1A80000
trusted library allocation
page execute and read and write
21297910000
trusted library allocation
page read and write
212AF26A000
heap
page read and write
7FF7C1AA0000
trusted library allocation
page read and write
212AF252000
heap
page read and write
7FF7C1946000
trusted library allocation
page read and write
1AB2EF9000
stack
page read and write
7FF7C189D000
trusted library allocation
page execute and read and write
7FF7C1AF0000
trusted library allocation
page read and write
21294EA1000
heap
page read and write
7FF7C1C49000
trusted library allocation
page read and write
7FF7C194C000
trusted library allocation
page execute and read and write
1AB294E000
stack
page read and write
7FF7C1D30000
trusted library allocation
page read and write
212AEEFD000
heap
page read and write
212A6D94000
trusted library allocation
page read and write
21296780000
heap
page readonly
21297AD8000
trusted library allocation
page read and write
21294F50000
heap
page read and write
7FF7C1B50000
trusted library allocation
page read and write
21298F10000
trusted library allocation
page read and write
1AB2E7E000
stack
page read and write
7FF7C1C58000
trusted library allocation
page read and write
7FF7C1D72000
trusted library allocation
page read and write
7DF490310000
trusted library allocation
page execute and read and write
21296DA7000
trusted library allocation
page read and write
7FF7C1976000
trusted library allocation
page execute and read and write
7FF7C1D00000
trusted library allocation
page read and write
7FF7C1C23000
trusted library allocation
page read and write
7FF7C1BF0000
trusted library allocation
page read and write
212967C0000
trusted library allocation
page read and write
7FF7C1BE0000
trusted library allocation
page read and write
7FF7C1C10000
trusted library allocation
page read and write
21298A01000
trusted library allocation
page read and write
21297DBC000
trusted library allocation
page read and write
21297DD1000
trusted library allocation
page read and write
212AED21000
heap
page read and write
7FF7C1C40000
trusted library allocation
page read and write
1AB2D7B000
stack
page read and write
2129716D000
trusted library allocation
page read and write
7FF7C1C44000
trusted library allocation
page read and write
7FF7C1C00000
trusted library allocation
page read and write
21296800000
trusted library allocation
page read and write
21294EE7000
heap
page read and write
21296D21000
trusted library allocation
page read and write
1AB3037000
stack
page read and write
212AF260000
heap
page read and write
1AB323E000
stack
page read and write
212AF067000
heap
page execute and read and write
7FF7C1B00000
trusted library allocation
page read and write
2129890E000
trusted library allocation
page read and write
1AB31BE000
stack
page read and write
212AF1D9000
heap
page read and write
1AB3E0E000
stack
page read and write
21297CEB000
trusted library allocation
page read and write
21298226000
trusted library allocation
page read and write
7FF7C1B40000
trusted library allocation
page read and write
212AEF30000
heap
page read and write
1AB33BC000
stack
page read and write
7FF7C18EC000
trusted library allocation
page execute and read and write
21296740000
trusted library allocation
page read and write
7FF7C1D10000
trusted library allocation
page read and write
1AB28C5000
stack
page read and write
7DF4902F0000
trusted library allocation
page execute and read and write
7FF7C1890000
trusted library allocation
page read and write
7FF7C1A90000
trusted library allocation
page read and write
21294EBB000
heap
page read and write
212A6D49000
trusted library allocation
page read and write
7FF7C1D20000
trusted library allocation
page execute and read and write
7FF7C18BD000
trusted library allocation
page execute and read and write
7FF7C1D50000
trusted library allocation
page read and write
212A6D39000
trusted library allocation
page read and write
7FF7C1A41000
trusted library allocation
page read and write
7FF7C1A50000
trusted library allocation
page execute and read and write
21297F0E000
trusted library allocation
page read and write
21296815000
heap
page read and write
212AF500000
heap
page read and write
212AF23A000
heap
page read and write
21294CB0000
heap
page read and write
21298FCD000
trusted library allocation
page read and write
2129901C000
trusted library allocation
page read and write
21296F47000
trusted library allocation
page read and write
21294F00000
heap
page read and write
7FF7C1D74000
trusted library allocation
page read and write
1AB2C7D000
stack
page read and write
212AEE79000
heap
page read and write
1AB3138000
stack
page read and write
7FF7C18B0000
trusted library allocation
page read and write
1AB2CFE000
stack
page read and write
7FF7C1C50000
trusted library allocation
page read and write
7FF7C1A30000
trusted library allocation
page read and write
7FF7C1940000
trusted library allocation
page read and write
21296770000
trusted library allocation
page read and write
1AB2FBE000
stack
page read and write
2129715C000
trusted library allocation
page read and write
212AEEE4000
heap
page read and write
1AB3D8F000
stack
page read and write
21296D10000
heap
page execute and read and write
1AB29CE000
stack
page read and write
7FF7C1B90000
trusted library allocation
page read and write
212AF208000
heap
page read and write
7FF7C1C20000
trusted library allocation
page read and write
212AF0A8000
heap
page read and write
7FF7C1893000
trusted library allocation
page execute and read and write
212AEE6C000
heap
page read and write
7FF7C1894000
trusted library allocation
page read and write
7FF7C18A0000
trusted library allocation
page read and write
1AB32BE000
stack
page read and write
21297D27000
trusted library allocation
page read and write
21296D00000
trusted library allocation
page read and write
21294E74000
heap
page read and write
212AF0F7000
heap
page read and write
1AB30BC000
stack
page read and write
7FF7C1C5C000
trusted library allocation
page read and write
1AB3F0C000
stack
page read and write
7DF490300000
trusted library allocation
page execute and read and write
21294E12000
heap
page read and write
212968B0000
heap
page read and write
7FF7C19B0000
trusted library allocation
page execute and read and write
21294DB0000
heap
page read and write
7FF7C1CE3000
trusted library allocation
page read and write
7FF7C1CE0000
trusted library allocation
page read and write
212AEF2C000
heap
page read and write
7FF7C1A72000
trusted library allocation
page read and write
7FF7C1B60000
trusted library allocation
page read and write
7FF7C1892000
trusted library allocation
page read and write
7FF7C1BD0000
trusted library allocation
page read and write
1AB333E000
stack
page read and write
7FF7C1BC0000
trusted library allocation
page read and write
21294EA3000
heap
page read and write
212A6D21000
trusted library allocation
page read and write
212A701D000
trusted library allocation
page read and write
21294E9B000
heap
page read and write
2129897A000
trusted library allocation
page read and write
7FF7C1BA0000
trusted library allocation
page read and write
212AF166000
heap
page read and write
7FF7C1CF0000
trusted library allocation
page read and write
7FF7C1AC0000
trusted library allocation
page read and write
7FF7C1B70000
trusted library allocation
page read and write
212AEEAF000
heap
page read and write
21294E9D000
heap
page read and write
21294E00000
heap
page read and write
21298D43000
trusted library allocation
page read and write
7FF7C1AB0000
trusted library allocation
page read and write
7FF7C1AD0000
trusted library allocation
page read and write
21298670000
trusted library allocation
page read and write
21294EE5000
heap
page read and write
212AEE64000
heap
page read and write
21296C90000
heap
page execute and read and write
212AF0CE000
heap
page read and write
212AF168000
heap
page read and write
7FF7C1BB0000
trusted library allocation
page read and write
7FF7C1A60000
trusted library allocation
page execute and read and write
212A700E000
trusted library allocation
page read and write
7FF7C1D80000
trusted library allocation
page read and write
2129896B000
trusted library allocation
page read and write
212A6F2F000
trusted library allocation
page read and write
7FF7C1B10000
trusted library allocation
page read and write
212AF08C000
heap
page read and write
21296930000
heap
page read and write
1AB2F79000
stack
page read and write
21296810000
heap
page read and write
1AB2DFE000
stack
page read and write
21294EA7000
heap
page read and write
7FF7C18AB000
trusted library allocation
page read and write
212AF1FA000
heap
page read and write
21296790000
trusted library allocation
page read and write
7FF7C1B80000
trusted library allocation
page read and write
212AF070000
heap
page read and write
7FF7C1A4A000
trusted library allocation
page read and write
212A7022000
trusted library allocation
page read and write
21294EEB000
heap
page read and write
21294D90000
heap
page read and write
7FF7C1B30000
trusted library allocation
page read and write
212AF060000
heap
page execute and read and write
7FF7C1B20000
trusted library allocation
page read and write
There are 176 hidden memdumps, click here to show them.