Summary | ZeroBOX

paste.ps1

Generic Malware Antivirus
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 18, 2024, 10:05 a.m. Oct. 18, 2024, 10:09 a.m.
Size 1.7KB
Type ASCII text, with CRLF line terminators
MD5 546d10b7c0a8cacd843e1a51014d01ef
SHA256 7c433806233a74bcf338ab947c3950979d9845019fbfd94784268ab6c5a6e7a2
CRC32 79688790
ssdeep 24:4fY2PNwo1dRSBA1PLVpB+df8UVjNXekTH5RQHwYMFAhRjV5L5k3px3SewCTtTnPB:uVTNLVpGUUVhukTZOQ1AhRjX9E5rOFYX
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
112.217.207.130 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:20 char:19
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + $javas=Get-Process <<<< -Name javas |select-object CPU
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x00000097
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x000000a3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:25 char:12
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name javas | Stop-Process
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "javas". Verify the process n
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: ame and call the cmdlet again.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:10 char:16
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name $proc_name | Stop-Process
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (javas:String) [Get-Process], Pr
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: ocessCommandException
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Remove-Item : Cannot find path 'C:\Users\test22\AppData\Local\Temp\javas.exe' b
console_handle: 0x00000097
1 1 0

WriteConsoleW

buffer: ecause it does not exist.
console_handle: 0x000000a3
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:11 char:16
console_handle: 0x000000af
1 1 0

WriteConsoleW

buffer: + Remove-Item <<<< $path
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (C:\Users\test22...\Temp\javas.e
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: xe:String) [Remove-Item], ItemNotFoundException
console_handle: 0x000000d3
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.Remov
console_handle: 0x000000df
1 1 0

WriteConsoleW

buffer: eItemCommand
console_handle: 0x000000eb
1 1 0

WriteConsoleW

buffer: donwload with backurl
console_handle: 0x000000fb
1 1 0

WriteConsoleW

buffer: Get-Process : Cannot find a process with the name "config.json". Verify the pro
console_handle: 0x0000010f
1 1 0

WriteConsoleW

buffer: cess name and call the cmdlet again.
console_handle: 0x0000011b
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:10 char:16
console_handle: 0x00000127
1 1 0

WriteConsoleW

buffer: + Get-Process <<<< -Name $proc_name | Stop-Process
console_handle: 0x00000133
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (config.json:String) [Get-Proces
console_handle: 0x0000013f
1 1 0

WriteConsoleW

buffer: s], ProcessCommandException
console_handle: 0x0000014b
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : NoProcessFoundForGivenName,Microsoft.PowerShell.
console_handle: 0x00000157
1 1 0

WriteConsoleW

buffer: Commands.GetProcessCommand
console_handle: 0x00000163
1 1 0

WriteConsoleW

buffer: Remove-Item : Cannot find path 'C:\Users\test22\AppData\Local\Temp\config.json'
console_handle: 0x00000183
1 1 0

WriteConsoleW

buffer: because it does not exist.
console_handle: 0x0000018f
1 1 0

WriteConsoleW

buffer: At C:\Users\test22\AppData\Local\Temp\paste.ps1:11 char:16
console_handle: 0x0000019b
1 1 0

WriteConsoleW

buffer: + Remove-Item <<<< $path
console_handle: 0x000001a7
1 1 0

WriteConsoleW

buffer: + CategoryInfo : ObjectNotFound: (C:\Users\test22...emp\config.js
console_handle: 0x000001b3
1 1 0

WriteConsoleW

buffer: on:String) [Remove-Item], ItemNotFoundException
console_handle: 0x000001bf
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.Remov
console_handle: 0x000001cb
1 1 0

WriteConsoleW

buffer: eItemCommand
console_handle: 0x000001d7
1 1 0

WriteConsoleW

buffer: donwload with backurl
console_handle: 0x000001e7
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x004279c8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00427e48
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0250b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0255f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05531000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05532000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05533000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05534000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05535000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05540000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05536000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05537000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024ed000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05241000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef30000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05538000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02559000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02702000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02703000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05541000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 1703936
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06480000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05256000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05539000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065e6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065fb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x065fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0553a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im userinit.exe
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "userinit.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "dom.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "dsm.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "WindowsUpdate.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "shella.exe")
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\javas.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\javas.exe
0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
cmdline attrib +R +S +H C:\Users\test22\AppData\Local\Temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
cmdline "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
cmdline taskkill /f /im dom.exe
cmdline attrib -s -h -r C:\Windows\temp\config.json
cmdline attrib -s -h -r C:\Users\test22\AppData\Local\Temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
cmdline attrib +R +S +H C:\Windows\temp\config.json
cmdline "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
cmdline taskkill /f /im dsm.exe
cmdline taskkill /f /im userinit.exe
cmdline taskkill /f /im shella.exe
cmdline taskkill /f /im WindowsUpdate.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
cmdline "C:\Windows\system32\cmd.exe" /c taskkill /f /im userinit.exe
cmdline "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
host 112.217.207.130
file C:\Users\test22\AppData\Local\Temp\javas.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib +R +S +H %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib +R +S +H C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c rd /s /q %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im dom.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\System32\config\systemprofile\dom\*
parent_process powershell.exe martian_process C:\Users\test22\AppData\Local\Temp\javas.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib -s -h -r C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im WindowsUpdate.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c attrib -s -h -r %tmp%\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Windows\temp\config.json
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im dsm.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im userinit.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c del /f /q C:\Windows\temp\WindowsUpdate.exe
parent_process powershell.exe martian_process "C:\Windows\system32\cmd.exe" /c taskkill /f /im shella.exe
Cynet Malicious (score: 99)
CTX powershell.miner.pwsh
Skyhigh Artemis!Trojan
ALYac Generic.PWSH.Miner.D.8697786F
VIPRE Generic.PWSH.Miner.D.8697786F
Arcabit Generic.PWSH.Miner.D.D84B7BAF
Symantec Scr.Malcode!gen
ESET-NOD32 PowerShell/CoinMiner.BW
Avast Script:SNH-gen [Trj]
Kaspersky HEUR:Trojan.Script.Generic
BitDefender Generic.PWSH.Miner.D.8697786F
MicroWorld-eScan Generic.PWSH.Miner.D.8697786F
Emsisoft Generic.PWSH.Miner.D.8697786F (B)
F-Secure Trojan.TR/PShell.Miner.G
DrWeb PowerShell.DownLoader.1760
Ikarus Trojan.PowerShell.Coinminer
FireEye Generic.PWSH.Miner.D.8697786F
Google Detected
Avira TR/PShell.Miner.G
Kingsoft Script.Trojan.Generic.a
Microsoft Trojan:Script/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Script.Generic
GData Generic.PWSH.Miner.D.8697786F
AhnLab-V3 Downloader/PowerShell.Miner.SC197176
Tencent Script.Trojan.Generic.Ztjl
AVG Script:SNH-gen [Trj]
dead_host 112.217.207.130:80
file C:\Windows\System32\cmd.exe
file C:\Users\test22\AppData\Local\Temp\javas.exe