Summary | ZeroBOX

d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.txt.ps1

Generic Malware Antivirus
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 6, 2023, 9:34 a.m. Oct. 6, 2023, 9:36 a.m.
Size 5.2MB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 5e63744a4fad5be640aa0a7a2e444a3d
SHA256 72c40c5c5ae362bfa5b37be9d7d4305bd0ecbf549f9ed087126ac4f2c66ff5e2
CRC32 096E7DE0
ssdeep 384:NROOOOOWCOOraJOOOOOvL5OeOhyz5OOqOO0OOyOOhOOW+jOOZaOOBKOOqSOOCOOD:Nrq+pU7hqtF0B
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "RegSvcs". Verify the proces
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (RegSvcs:String) [Stop-Process],
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "mshta". Verify the process
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: name and call the cmdlet again.
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (mshta:String) [Stop-Process], P
console_handle: 0x000000f7
1 1 0

WriteConsoleW

buffer: rocessCommandException
console_handle: 0x00000103
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000010f
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x0000011b
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "wscript". Verify the proces
console_handle: 0x0000013b
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x00000147
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x00000153
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x0000015f
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x0000016b
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x00000177
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (wscript:String) [Stop-Process],
console_handle: 0x00000183
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x0000018f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000019b
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x000001a7
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "msbuild". Verify the proces
console_handle: 0x000001c7
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x000001d3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x000001df
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x000001eb
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x000001f7
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x00000203
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (msbuild:String) [Stop-Process],
console_handle: 0x0000020f
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x0000021b
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000227
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x00000233
1 1 0

WriteConsoleW

buffer: Directory: C:\ProgramData
console_handle: 0x00000253
1 1 0

WriteConsoleW

buffer: Mode LastWriteTime Length Name
console_handle: 0x0000025f
1 1 0

WriteConsoleW

buffer: d---- 2023-10-06 오전 9:34 MINGALIES
console_handle: 0x00000267
1 1 0

WriteConsoleW

buffer: Invoke-Expression : The "=" operator is missing after a named argument.
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: xt.ps1:44 char:11
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + $lulli | . <<<< ('{1}{°°°°°}'.replace('°°°°°','0')-f'!','I').replac
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: e('!','ex')
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ParserError: (:) [Invoke-Expression], ParseExcep
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: tion
console_handle: 0x0000006b
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x056114e8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01f7b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01f8f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01f59000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b41000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b42000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b43000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b44000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b45000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05461000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b46000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05476000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b47000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01f5d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b48000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 262144
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b50000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b51000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b52000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b53000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b54000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b55000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b56000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b57000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b5c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b6d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ba0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b6e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b6f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b49000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b4a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04b4b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05462000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
ESET-NOD32 PowerShell/TrojanDropper.Agent.AFL
Avast Script:SNH-gen [Trj]
AVG Script:SNH-gen [Trj]