Summary | ZeroBOX

mq.ps1

Generic Malware Antivirus
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 18, 2024, 10:04 a.m. Oct. 18, 2024, 10:09 a.m.
Size 1.7KB
Type ASCII text, with CRLF line terminators
MD5 ffa8b5a7aa923abbc6affb068c5435cd
SHA256 067b05ccead645d1067126d5f4829b83d96d490d3597d77e37e07d4a0077f1b2
CRC32 4D262071
ssdeep 24:4fo2P9wo1dRSBA1PLVpB+df8UVjNXekTH5HwYMFAhRjV5L5k3px3SewCTtTnPTO2:uljNLVpGUUVhukTZQ1AhRjX9E5rOFYX
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
1.255.85.176 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:20 char:19
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + $javas=Get-Process <<<< -Name javas |select-object CPU
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x00000097
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x000000a3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:25 char:12
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name javas | Stop-Process
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x0000001b
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x0000002b
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:10 char:16
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name $proc_name | Stop-Process
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Remove-Item : Cannot find path 'C:\Users\test22\AppData\Local\Temp\javas.exe' b
console_handle: 0x00000097
1 1 0

WriteConsoleW

buffer: ecause it does not exist.
console_handle: 0x000000a3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:11 char:16
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: + Remove-Item <<<< $path
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (C:\Users\test22...\Temp\javas.e
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: xe:String) [Remove-Item], ItemNotFoundException
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.Remov
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: eItemCommand
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: donwload with backurl
console_handle: 0x000000fb
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "config.json". Verify the pro
console_handle: 0x0000010f
1 1 0

WriteConsoleW

buffer: cess name and call the cmdlet again.
console_handle: 0x0000011b
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:10 char:16
console_handle: 0x00000127
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name $proc_name | Stop-Process
console_handle: 0x00000133
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (config.json:String) [Get-Proces
console_handle: 0x0000013f
1 1 0

WriteConsoleW

buffer: s], ProcessCommandException
console_handle: 0x0000014b
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000157
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000163
1 1 0

WriteConsoleW

buffer: Remove-Item : Cannot find path 'C:\Users\test22\AppData\Local\Temp\config.json'
console_handle: 0x00000183
1 1 0

WriteConsoleW

buffer: because it does not exist.
console_handle: 0x0000018f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\mq.ps1:11 char:16
console_handle: 0x0000019b
1 1 0

WriteConsoleW

buffer: + Remove-Item <<<< $path
console_handle: 0x000001a7
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (C:\Users\test22...emp\config.js
console_handle: 0x000001b3
1 1 0

WriteConsoleW

buffer: on:String) [Remove-Item], ItemNotFoundException
console_handle: 0x000001bf
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.Remov
console_handle: 0x000001cb
1 1 0

WriteConsoleW

buffer: eItemCommand
console_handle: 0x000001d7
1 1 0

WriteConsoleW

buffer: donwload with backurl
console_handle: 0x00000013
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6190
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x050b6250
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0265b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026af000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021f9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05760000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05761000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05762000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05763000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05764000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05765000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05770000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05766000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05767000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021fd000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05561000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef30000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05768000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026a9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a52000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a53000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05771000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 786432
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06620000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05576000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05769000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066a6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066aa000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066bb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x066bc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0576a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q %tmp%\config.json
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "dom.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "dsm.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "WindowsUpdate.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "shella.exe")
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\javas.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\javas.exe
0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline attrib -s -h -r C:\Users\test22\AppData\Local\Temp\config.json
cmdline taskkill /f /im shella.exe
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
cmdline attrib +R +S +H C:\Windows\temp\config.json
cmdline taskkill /f /im WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
cmdline taskkill /f /im dom.exe
cmdline attrib +R +S +H C:\Users\test22\AppData\Local\Temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
cmdline taskkill /f /im dsm.exe
cmdline attrib -s -h -r C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
host 1.255.85.176
file C:\Users\test22\AppData\Local\Temp\config.json
file C:\Users\test22\AppData\Local\Temp\javas.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c rd /s /q %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
parent_process powershell.exe martian_process C:\Users\test22\AppData\Local\Temp\javas.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
Lionic Trojan.Script.PowerShell.4!c
Cynet Malicious (score: 99)
CTX powershell.miner.generic
Skyhigh Artemis!Trojan
ALYac Generic.PWSH.Miner.D.B2D9DF8E
VIPRE Generic.PWSH.Miner.D.B2D9DF8E
Arcabit Generic.PWSH.Miner.D.B2D9DF8E
Symantec Scr.Malcode!gen
ESET-NOD32 PowerShell/CoinMiner.BW
Avast Script:SNH-gen [Trj]
Kaspersky HEUR:Trojan.Script.Generic
BitDefender Generic.PWSH.Miner.D.B2D9DF8E
MicroWorld-eScan Generic.PWSH.Miner.D.B2D9DF8E
Emsisoft Generic.PWSH.Miner.D.B2D9DF8E (B)
F-Secure Trojan.TR/PShell.Miner.G
DrWeb PowerShell.DownLoader.1760
Ikarus Trojan.PowerShell.Coinminer
FireEye Generic.PWSH.Miner.D.B2D9DF8E
Google Detected
Avira TR/PShell.Miner.G
Kingsoft Script.Trojan.Generic.a
Microsoft Trojan:Script/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Script.Generic
GData Generic.PWSH.Miner.D.B2D9DF8E
Varist ABMiner.WDSN-6
AhnLab-V3 Downloader/PowerShell.Miner.SC197176
Tencent Script.Trojan.Generic.Qzfl
AVG Script:SNH-gen [Trj]
alibabacloud Miner:Win/CoinMiner.BI
dead_host 1.255.85.176:8080
file C:\Windows\System32\cmd.exe
file C:\Users\test22\AppData\Local\Temp\javas.exe