Summary | ZeroBOX

d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.txt.ps1

Generic Malware Antivirus
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 6, 2023, 1:26 p.m. Oct. 6, 2023, 1:28 p.m.
Size 5.2MB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 5e63744a4fad5be640aa0a7a2e444a3d
SHA256 72c40c5c5ae362bfa5b37be9d7d4305bd0ecbf549f9ed087126ac4f2c66ff5e2
CRC32 096E7DE0
ssdeep 384:NROOOOOWCOOraJOOOOOvL5OeOhyz5OOqOO0OOyOOhOOW+jOOZaOOBKOOqSOOCOOD:Nrq+pU7hqtF0B
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "RegSvcs". Verify the proces
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (RegSvcs:String) [Stop-Process],
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "mshta". Verify the process
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: name and call the cmdlet again.
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (mshta:String) [Stop-Process], P
console_handle: 0x000000f7
1 1 0

WriteConsoleW

buffer: rocessCommandException
console_handle: 0x00000103
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000010f
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x0000011b
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "wscript". Verify the proces
console_handle: 0x0000013b
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x00000147
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x00000153
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x0000015f
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x0000016b
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x00000177
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (wscript:String) [Stop-Process],
console_handle: 0x00000183
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x0000018f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000019b
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x000001a7
1 1 0

WriteConsoleW

buffer: Stop-Process : Cannot find a process with the name "msbuild". Verify the proces
console_handle: 0x000001c7
1 1 0

WriteConsoleW

buffer: s name and call the cmdlet again.
console_handle: 0x000001d3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x000001df
1 1 0

WriteConsoleW

buffer: xt.ps1:1 char:73
console_handle: 0x000001eb
1 1 0

WriteConsoleW

buffer: + "RegSvcs", "mshta", "wscript", "msbuild" | ForEach-Object { Stop-Process <<<<
console_handle: 0x000001f7
1 1 0

WriteConsoleW

buffer: -Name $_ -Force }
console_handle: 0x00000203
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (msbuild:String) [Stop-Process],
console_handle: 0x0000020f
1 1 0

WriteConsoleW

buffer: ProcessCommandException
console_handle: 0x0000021b
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000227
1 1 0

WriteConsoleW

buffer: Commands.StopProcessCommand
console_handle: 0x00000233
1 1 0

WriteConsoleW

buffer: Directory: C:\ProgramData
console_handle: 0x00000253
1 1 0

WriteConsoleW

buffer: Mode LastWriteTime Length Name
console_handle: 0x0000025f
1 1 0

WriteConsoleW

buffer: d---- 2023-10-06 오후 1:26 MINGALIES
console_handle: 0x00000267
1 1 0

WriteConsoleW

buffer: Invoke-Expression : The "=" operator is missing after a named argument.
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\d9e1c3_0ec2df3125b34e10ad269f8b3dd4e71d.t
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: xt.ps1:44 char:11
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + $lulli | . <<<< ('{1}{°°°°°}'.replace('°°°°°','0')-f'!','I').replac
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: e('!','ex')
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ParserError: (:) [Invoke-Expression], ParseExcep
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: tion
console_handle: 0x0000006b
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00667eb8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024cb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0251f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02780000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02781000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02782000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02783000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02784000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02785000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05241000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02786000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05256000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02787000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024ad000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02788000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 2228224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06040000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06220000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06221000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06222000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06223000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06224000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06225000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06226000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06227000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06228000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0622c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0623d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0623e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0623f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06240000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02789000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0278a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0278b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 808
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05242000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
ESET-NOD32 PowerShell/TrojanDropper.Agent.AFL
Avast Script:SNH-gen [Trj]
AVG Script:SNH-gen [Trj]