Re-RFQ - PN List.vbs
|
UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
initial sample
|
 |
|
|
Filetype: |
UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
Entropy: |
4.5450742907160055
|
Filename: |
Re-RFQ - PN List.vbs
|
Filesize: |
43700
|
MD5: |
867aa07dd614380e5943bccd70fee675
|
SHA1: |
b97d664bc1f9f8f3ba2819f17154e4d32618734c
|
SHA256: |
35d11d86e996833469ee713fce6ba52dbcdcf3211e36985182f47040c2166ac9
|
SHA512: |
51aa62bb0d8d7bcf379a87152f65722cb3d00662bac7cb1389fff0a326164817e67aed4f3990459497390fd9092efa4af70cde12f1c3c1b7bf5bc014a8b63abd
|
SSDEEP: |
192:YQOyzLyFyT/COPgoiyhPj/2PjSc0XyoG6B0uKGP/ciIQuNEYMhH:PzesT/CQiE/sMGyJYNEnhH
|
Preview: |
'%S0}1*_YJ,;_3R,%?1X$3-B0/>UNPH4W=*O(K!O{X%0:T<X~:9A*6HO/QAM8X7JB3$;=DO4UNYR*1FG>9+R*H^-&302KZ*$-6Y6*:@6)F*#H-0YL<S{#Q3</=TU^=T<7+1VD!0:;Q9#1C)*DBRQG)A@C4(<^R+:=+GX1FV#6VBX(+5+D5R$7D*/+*S@?6T*Z#*^,XZ{(&++(^>M{,+LAP1_:T##|_)ACV{FC***FT,+TDHG,G#;%H*KLF)%+|L
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Multi AV Scanner detection for submitted file |
AV Detection |
|
Java / VBScript file with very long strings (likely obfuscated code) |
System Summary |
|
Sample is known by Antivirus |
System Summary |
|
|
C:\Users\Public\gia9ab2dg0.PS1
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
 |
|
|
File: |
C:\Users\Public\gia9ab2dg0.PS1
|
Category: |
dropped
|
Dump: |
gia9ab2dg0.PS1.2.dr
|
ID: |
dr_5
|
Target ID: |
2
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
Entropy: |
4.487269333453108
|
Encrypted: |
false
|
Ssdeep: |
768:DG/YDiYzl8cxJiaxr4ObGjITCTmUHh8hDhpjMWA1nDtWFnXyONzp208wSuPV0fFQ:ae9x1rNKKjgD8FniON9f+aNvHKW5/D
|
Size: |
72380
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus detection for dropped file |
AV Detection |
|
Yara detected RUNPE |
Malware Analysis System Evasion |
|
Wscript starts Powershell (via cmd or directly) |
System Summary |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Very long cmdline option found, this is very uncommon (may be encrypted or packed) |
HIPS / PFW / Operating System Protection Evasion |
Command and Scripting Interpreter
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
 |
|
|
File: |
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.dll
|
Category: |
dropped
|
Dump: |
5arm45ue.dll.8.dr
|
ID: |
dr_16
|
Target ID: |
8
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
Type: |
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
Entropy: |
5.022390817701844
|
Encrypted: |
false
|
Ssdeep: |
192:ZrwrEuvXuse9L9kJfpesGCFoOQejfvdLav63lktPGgK:ZeVesgL9OfYDCKejHdL136ugK
|
Size: |
11776
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus detection for dropped file |
AV Detection |
|
Machine Learning detection for dropped file |
AV Detection |
|
Drops PE files |
Persistence and Installation Behavior |
|
Found dropped PE file which has not been started or loaded |
Malware Analysis System Evasion |
|
|
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.0.cs
|
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
 |
|
|
File: |
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.0.cs
|
Category: |
dropped
|
Dump: |
lvvchi0q.0.cs.11.dr
|
ID: |
dr_22
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
Entropy: |
4.763851296298132
|
Encrypted: |
false
|
Ssdeep: |
192:d4FazHgDRO2fwldsgNA/DxRry0at6knscDiF1u74+mFXqvFuI:+Fa9ldsgNeL1at6oslF1u2avN
|
Size: |
15102
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Compiles code for process injection (via .Net compiler) |
HIPS / PFW / Operating System Protection Evasion |
|
|
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
 |
|
|
File: |
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.dll
|
Category: |
dropped
|
Dump: |
lvvchi0q.dll.15.dr
|
ID: |
dr_25
|
Target ID: |
15
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
Type: |
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
Entropy: |
5.023016144578243
|
Encrypted: |
false
|
Ssdeep: |
192:krwrEuvXuse9L9kJfpesGCFoOQejfv0Lavl3WXDGgx:keVesgL9OfYDCKejH0Li3vgx
|
Size: |
11776
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus detection for dropped file |
AV Detection |
|
Machine Learning detection for dropped file |
AV Detection |
|
Drops PE files |
Persistence and Installation Behavior |
|
Found dropped PE file which has not been started or loaded |
Malware Analysis System Evasion |
|
|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLogin.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
 |
|
|
File: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLogin.vbs
|
Category: |
dropped
|
Dump: |
SystemLogin.vbs.6.dr
|
ID: |
dr_7
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
ASCII text, with CRLF line terminators
|
Entropy: |
5.092976524862006
|
Encrypted: |
false
|
Ssdeep: |
3:jTF+m8nhWegSXnGQqPJH0wxMCLkFFCFKwOaHF5CmE3q1rh:jTdqhWeGQO0wKjFlaHS+rh
|
Size: |
136
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus detection for dropped file |
AV Detection |
|
Sigma detected: Drops script at startup location |
Data Obfuscation |
|
Drops VBS files to the startup folder |
Boot Survival |
|
Creates a start menu entry (Start Menu\Programs\Startup) |
Boot Survival |
Registry Run Keys / Startup Folder
|
Stores files to the Windows start menu directory |
Boot Survival |
Registry Run Keys / Startup Folder
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61480 bytes, 1 file
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Category: |
dropped
|
Dump: |
77EC63BDA74BD0D0E0426DC8F8008506.0.dr
|
ID: |
dr_0
|
Target ID: |
0
|
Process: |
C:\Windows\System32\wscript.exe
|
Type: |
Microsoft Cabinet archive data, 61480 bytes, 1 file
|
Entropy: |
7.9951219482618905
|
Encrypted: |
true
|
Ssdeep: |
1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
|
Size: |
61480
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
|
|
|
File: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
Category: |
modified
|
Dump: |
77EC63BDA74BD0D0E0426DC8F80085060.0.dr
|
ID: |
dr_1
|
Target ID: |
0
|
Process: |
C:\Windows\System32\wscript.exe
|
Type: |
data
|
Entropy: |
3.1283949652847367
|
Encrypted: |
false
|
Ssdeep: |
6:kKrtoJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:TVkPlE99SNxAhUesE1
|
Size: |
330
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
|
Category: |
dropped
|
Dump: |
InstallUtil.exe.log.17.dr
|
ID: |
dr_27
|
Target ID: |
17
|
Process: |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
Type: |
ASCII text, with CRLF line terminators
|
Entropy: |
5.340009400190196
|
Encrypted: |
false
|
Ssdeep: |
12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
|
Size: |
425
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates install or setup log file |
Compliance, Persistence and Installation Behavior |
|
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
Category: |
dropped
|
Dump: |
ModuleAnalysisCache.2.dr
|
ID: |
dr_6
|
Target ID: |
2
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
data
|
Entropy: |
4.884004042663719
|
Encrypted: |
false
|
Ssdeep: |
192:h9smd3YrKkGdcU6CkVsm5emla9sm5ib4q4dVsm5emdjxoeRjp5Kib4n2Ca6pZlb4:ySib4q4dvEib42opbjvwRjdvRnrkjh4v
|
Size: |
11606
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
Category: |
dropped
|
Dump: |
StartupProfileData-NonInteractive.6.dr
|
ID: |
dr_14
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
data
|
Entropy: |
5.482563553285258
|
Encrypted: |
false
|
Ssdeep: |
48:mTrB4nqRL/HEekFnCvO9tC43uBSfMM9lH/MRNYqrIByjwAj:mTrqnObHba4Oe43uxGlHwNn0Bydj
|
Size: |
1664
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.0.cs
|
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.0.cs
|
Category: |
dropped
|
Dump: |
5arm45ue.0.cs.6.dr
|
ID: |
dr_10
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
Entropy: |
4.763851296298132
|
Encrypted: |
false
|
Ssdeep: |
192:d4FazHgDRO2fwldsgNA/DxRry0at6knscDiF1u74+mFXqvFuI:+Fa9ldsgNeL1at6oslF1u2avN
|
Size: |
15102
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.cmdline
|
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.cmdline
|
Category: |
dropped
|
Dump: |
5arm45ue.cmdline.6.dr
|
ID: |
dr_11
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
Entropy: |
5.0468605295995275
|
Encrypted: |
false
|
Ssdeep: |
6:pAu+H2L/0DjuM3RLBPWdy1MZ915N723f1k+B0zxspRu6EXbB/N723f1k+b:p37L/UukvGZ91batk+B0cY6EXbBlatks
|
Size: |
333
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Compiles C# or VB.Net code |
Data Obfuscation |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.out
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
modified
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.out
|
Category: |
modified
|
Dump: |
5arm45ue.out.6.dr
|
ID: |
dr_12
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
Entropy: |
5.223369918239281
|
Encrypted: |
false
|
Ssdeep: |
24:KOuIdnUCZXathFEXb3at6KaM5DqBVKVrdFAMBJT44a:y0UCZKtbt6KxDcVKdBJc4a
|
Size: |
941
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\5arm45ue\CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP
|
MSVC .res
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\5arm45ue\CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP
|
Category: |
dropped
|
Dump: |
CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP.8.dr
|
ID: |
dr_15
|
Target ID: |
8
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
Type: |
MSVC .res
|
Entropy: |
3.0893251409333966
|
Encrypted: |
false
|
Ssdeep: |
12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grygak7YnqqWPN5Dlq5J:+RI+ycuZhNuakSWPNnqX
|
Size: |
652
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\RES14F3.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ce, 9 symbols
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\RES14F3.tmp
|
Category: |
dropped
|
Dump: |
RES14F3.tmp.16.dr
|
ID: |
dr_26
|
Target ID: |
16
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
Type: |
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ce, 9 symbols
|
Entropy: |
4.100108086923389
|
Encrypted: |
false
|
Ssdeep: |
24:Hri9CaMKAxZaHrolYhK0buVMONwI+ycuZhN8qakS3bPNnq92d:gMx0LolaKYu9m1ul9a3hq9G
|
Size: |
1396
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\RESC9E1.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\RESC9E1.tmp
|
Category: |
dropped
|
Dump: |
RESC9E1.tmp.9.dr
|
ID: |
dr_17
|
Target ID: |
9
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
Type: |
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
|
Entropy: |
3.9994034632031084
|
Encrypted: |
false
|
Ssdeep: |
24:HIK9oVat/SO0moyutbaHgYhKKjmNII+ycuZhNuakSWPNnq9ed:CIt/J5nRKMmu1ulua3qq9+
|
Size: |
1340
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1g4lgrl3.ws0.psm1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1g4lgrl3.ws0.psm1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_1g4lgrl3.ws0.psm1.11.dr
|
ID: |
dr_21
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbucvlc.1j2.ps1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbucvlc.1j2.ps1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_5bbucvlc.1j2.ps1.6.dr
|
ID: |
dr_8
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1efweqf.5aa.psm1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1efweqf.5aa.psm1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_c1efweqf.5aa.psm1.6.dr
|
ID: |
dr_9
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrik5clw.pjd.ps1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrik5clw.pjd.ps1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_jrik5clw.pjd.ps1.11.dr
|
ID: |
dr_20
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkzpdbdk.wsu.psm1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkzpdbdk.wsu.psm1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_mkzpdbdk.wsu.psm1.2.dr
|
ID: |
dr_4
|
Target ID: |
2
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0t1u4d1.0tt.ps1
|
very short file (no magic)
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0t1u4d1.0tt.ps1
|
Category: |
dropped
|
Dump: |
__PSScriptPolicyTest_q0t1u4d1.0tt.ps1.2.dr
|
ID: |
dr_3
|
Target ID: |
2
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
very short file (no magic)
|
Entropy: |
0.0
|
Encrypted: |
false
|
Ssdeep: |
3:U:U
|
Size: |
1
|
Whitelisted: |
true
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates temporary files |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\lvvchi0q\CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP
|
MSVC .res
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\lvvchi0q\CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP
|
Category: |
dropped
|
Dump: |
CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP.15.dr
|
ID: |
dr_24
|
Target ID: |
15
|
Process: |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
Type: |
MSVC .res
|
Entropy: |
3.093049546370272
|
Encrypted: |
false
|
Ssdeep: |
12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryqqak7Ynqq3bPN5Dlq5J:+RI+ycuZhN8qakS3bPNnqX
|
Size: |
652
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.cmdline
|
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.cmdline
|
Category: |
dropped
|
Dump: |
lvvchi0q.cmdline.11.dr
|
ID: |
dr_23
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
Entropy: |
5.119249747464875
|
Encrypted: |
false
|
Ssdeep: |
6:pAu+H2L/0DjuM3RLBPWdy1MZ915N723fkNMZx0zxspRu6EXbB/N723fkNMZDH:p37L/UukvGZ91baMNyGcY6EXbBlaMNyb
|
Size: |
333
|
Whitelisted: |
false
|
Reputation: |
timeout
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Compiles C# or VB.Net code |
Data Obfuscation |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.out
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
modified
|
|
|
|
File: |
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.out
|
Category: |
modified
|
Dump: |
lvvchi0q.out.11.dr
|
ID: |
dr_18
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
Entropy: |
5.243668380083427
|
Encrypted: |
false
|
Ssdeep: |
24:KObuVMyIdnUCZXaMknEXb3aMkDOKaM5DqBVKVrdFAMBJT44a:fuR0UCZKMkMkOKxDcVKdBJc4a
|
Size: |
995
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.MEqVT+yD.20220516192930.txt
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.MEqVT+yD.20220516192930.txt
|
Category: |
dropped
|
Dump: |
PowerShell_transcript.841618.MEqVT+yD.20220516192930.txt.2.dr
|
ID: |
dr_2
|
Target ID: |
2
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
Entropy: |
5.476345661251233
|
Encrypted: |
false
|
Ssdeep: |
48:BZ0KvTL8oOS61jizE1rZ1KJaqDYB1ZK461jizE1rZ1KsZZH:BZ0WTL8N72zauoqDo1ZKB2zausZV
|
Size: |
2427
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.RBBMNgBb.20220516193001.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.RBBMNgBb.20220516193001.txt
|
Category: |
dropped
|
Dump: |
PowerShell_transcript.841618.RBBMNgBb.20220516193001.txt.11.dr
|
ID: |
dr_19
|
Target ID: |
11
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
Entropy: |
5.116593236701985
|
Encrypted: |
false
|
Ssdeep: |
24:BxSAQ7vBVL8x2DOXUW1bSWYyHjeTKKjX4CIym1ZJXwOigvgnxSAZq:BZUvTL8oOJlxqDYB1ZqOiXZZq
|
Size: |
1043
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.f5mU45le.20220516192941.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
|
|
|
File: |
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.f5mU45le.20220516192941.txt
|
Category: |
dropped
|
Dump: |
PowerShell_transcript.841618.f5mU45le.20220516192941.txt.6.dr
|
ID: |
dr_13
|
Target ID: |
6
|
Process: |
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Type: |
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
Entropy: |
5.124152018765392
|
Encrypted: |
false
|
Ssdeep: |
24:BxSA047vBVL8x2DOXUW1bSWHHjeTKKjX4CIym1ZJXcwOigv0nxSAZK:BZ0svTL8oOJlHqDYB1ZKwOiTZZK
|
Size: |
1042
|
Whitelisted: |
false
|
Reputation: |
timeout
|
|