Edit tour

Windows Analysis Report
http://yoosee.co/PCdownload.html

Overview

General Information

Sample URL:http://yoosee.co/PCdownload.html
Analysis ID:1323881
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sample execution stops while process was sleeping (likely an evasion)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Drops PE files
PE file overlay found
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Creates files inside the system directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 1772 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 3940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 180 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • chrome.exe (PID: 5924 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\download\PCdownload.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7204 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7928 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5548 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Unconfirmed 462738.crdownload.3.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: wget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drString found in binary or memory: http://yoosee.co/PCdownload.html
Source: wget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yoosee.co/PCdownload.htmlMMM
Source: wget.exe, 00000002.00000002.1649158590.0000000001050000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yoosee.co/PCdownload.htmlModel
Source: wget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yoosee.co/PCdownload.htmli
Source: wget.exe, 00000002.00000002.1649158590.0000000001050000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yoosee.co/PCdownload.htmlpData
Source: wget.exe, 00000002.00000002.1649158590.000000000105A000.00000004.00000020.00020000.00000000.sdmp, PCdownload.html.2.drString found in binary or memory: https://gw-fota-prod-1251981983.cos.ap-nanjing.myqcloud.com/gwellota/1000/1693817831722/yoosee-1.0.0
Source: 3cca2bdc-3739-4123-b3a1-1026ed0cfcc7.tmp.3.drStatic PE information: No import functions for PE file found
Source: 3cca2bdc-3739-4123-b3a1-1026ed0cfcc7.tmp.3.drStatic PE information: Data appended to the last section found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_5924_797297623Jump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: clean3.win@21/4@0/13
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html"
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\download\PCdownload.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5548 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html" Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5548 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3940:120:WilError_03
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 462738.crdownloadJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\3cca2bdc-3739-4123-b3a1-1026ed0cfcc7.tmpJump to dropped file
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: wget.exe, 00000002.00000002.1649044025.0000000000A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Unconfirmed 462738.crdownload.3.drBinary or memory string: EHGFs
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "http://yoosee.co/pcdownload.html" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Command and Scripting Interpreter
Path Interception1
Process Injection
11
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1323881 URL: http://yoosee.co/PCdownload.html Startdate: 11/10/2023 Architecture: WINDOWS Score: 3 5 chrome.exe 11 2->5         started        9 cmd.exe 2 2->9         started        dnsIp3 24 192.168.2.102 unknown unknown 5->24 26 192.168.2.4 unknown unknown 5->26 28 2 other IPs or domains 5->28 20 C:\Users\...\Unconfirmed 462738.crdownload, PE32 5->20 dropped 22 3cca2bdc-3739-4123-b3a1-1026ed0cfcc7.tmp, PE32 5->22 dropped 11 chrome.exe 5->11         started        14 chrome.exe 5->14         started        16 wget.exe 2 9->16         started        18 conhost.exe 9->18         started        file4 process5 dnsIp6 30 142.250.176.3 GOOGLEUS United States 11->30 32 142.250.217.142 GOOGLEUS United States 11->32 36 6 other IPs or domains 11->36 34 3.120.147.24 AMAZON-02US United States 16->34

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://yoosee.co/PCdownload.html0%Avira URL Cloudsafe
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Unconfirmed 462738.crdownload0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://yoosee.co/PCdownload.htmlModelwget.exe, 00000002.00000002.1649158590.0000000001050000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://yoosee.co/PCdownload.htmlpDatawget.exe, 00000002.00000002.1649158590.0000000001050000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://gw-fota-prod-1251981983.cos.ap-nanjing.myqcloud.com/gwellota/1000/1693817831722/yoosee-1.0.0wget.exe, 00000002.00000002.1649158590.000000000105A000.00000004.00000020.00020000.00000000.sdmp, PCdownload.html.2.drfalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorUnconfirmed 462738.crdownload.3.drfalse
          high
          http://yoosee.co/PCdownload.htmliwget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://yoosee.co/PCdownload.htmlwget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drfalse
              high
              http://yoosee.co/PCdownload.htmlMMMwget.exe, 00000002.00000002.1649158590.0000000001055000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                172.217.14.109
                unknownUnited States
                15169GOOGLEUSfalse
                3.120.147.24
                unknownUnited States
                16509AMAZON-02USfalse
                142.250.176.3
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.68.67
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.68.46
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.217.142
                unknownUnited States
                15169GOOGLEUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                129.211.179.197
                unknownChina
                45090CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompafalse
                142.250.72.164
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.4
                192.168.2.5
                192.168.2.102
                Joe Sandbox Version:38.0.0 Ammolite
                Analysis ID:1323881
                Start date and time:2023-10-11 18:02:30 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 4m 40s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:urldownload.jbs
                Sample URL:http://yoosee.co/PCdownload.html
                Analysis system description:Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:13
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean3.win@21/4@0/13
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                • Not all processes where analyzed, report is missing behavior information
                • Skipping network analysis since amount of network traffic is too extensive
                • VT rate limit hit for: http://yoosee.co/PCdownload.html
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\cmd.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):498
                Entropy (8bit):4.943992489508822
                Encrypted:false
                SSDEEP:12:H0SvICTxSegFT1De5RhKk1DbfbKO4vCuGlvifbKOf:L9zGTxePgk1XbVHKbb
                MD5:0B7D03FFC8860432BF231372710D4E85
                SHA1:3E6F6EEE9E885BF2F019C5297B6AC29FB8CCA6E8
                SHA-256:108A8760836C84E2D6544972B09925D5955EBDB15F02AADD2644C999C738C424
                SHA-512:D314A3DCED09686FFA8F5F32F0B49E159870413927D344B533A6EBBB76F0D6312467778A15F108C54444D0771CF742DF024AADD31C652EC26A752C962DF32E5F
                Malicious:false
                Reputation:low
                Preview:--2023-10-11 18:03:17-- http://yoosee.co/PCdownload.html..Resolving yoosee.co (yoosee.co)... 3.120.147.24..Connecting to yoosee.co (yoosee.co)|3.120.147.24|:80... connected...HTTP request sent, awaiting response... 200 OK..Length: 402 [text/html]..Saving to: 'C:/Users/user/Desktop/download/PCdownload.html'.... 0K 100% 179K=0.002s....2023-10-11 18:03:18 (179 KB/s) - 'C:/Users/user/Desktop/download/PCdownload.html' saved [402/402]....
                Process:C:\Windows\SysWOW64\wget.exe
                File Type:HTML document, ASCII text, with very long lines (401)
                Category:dropped
                Size (bytes):402
                Entropy (8bit):5.170441776034265
                Encrypted:false
                SSDEEP:6:haxVgYkCk3iMOMYRCkhdV/TXCeEaYVN0hB96L3+mYntKzIJ2iMAduxj5LZOS:haxV1kOMYRVLXH9YHT7+PtgIJnu3ZOS
                MD5:97DE1CDD6F71A2BCFB7B91574DDC8997
                SHA1:50394F1F79757559ABA217B4CF5CBDBD026E309C
                SHA-256:025ADACD63945E8ED4F088DA2F9791F8C7A18C031E63B81B82FB3853AD35FEF0
                SHA-512:38C4E653167A0BE2EEE540769C2DEFA0DFDCBA3933E0089FE3AE289B1E1F22CF488D33DF4881A8AB52A808FC36E7E9606BB5714DF92246A1EF9AD68C7B5A86FA
                Malicious:false
                Reputation:low
                Preview:<!DOCTYPE html><html><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>PC</title><meta name="description" content=""><meta name="keywords" content=""><link href="" rel="stylesheet"></head><body><script>window.location.href="https://gw-fota-prod-1251981983.cos.ap-nanjing.myqcloud.com/gwellota/1000/1693817831722/yoosee-1.0.0.7.exe"</script></body></html>.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):16004
                Entropy (8bit):6.252339750561783
                Encrypted:false
                SSDEEP:384:7WshyLTNZNH1eJd0SIcBiSFxi7yhv4mi/yAzY2w2Q:7Ws2ZNc0ncBiSFxoyIO2Q
                MD5:AAD5865DC166DD9CBF10B82A88C798C7
                SHA1:83D6DE32BF2B2D2EB20DA110C772506026D136DF
                SHA-256:64643AD4BB15D379A68DDD34BA8CE8052B47130B9A9E59136CB7E90B8574CEE9
                SHA-512:037852F5FB5E6961F1177EAB49EDA49553BF2141205F78F5520F1FEDF97C8AE21C21BBCF684A7231BC7D83D91C2C6A9BEFE1B410FE6BC740E3DD5A4B0FF445BF
                Malicious:false
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L....Oa.................f...*.......4............@.......................................@.............................................h?...........................................................................................................text....e.......f.................. ..`.rdata...............j..............@..@.data...8............~..............@....ndata... ...............................rsrc...h?.......@..................@..@................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Category:dropped
                Size (bytes):105795406
                Entropy (8bit):7.999963421612878
                Encrypted:true
                SSDEEP:3145728:CvxJz+Qa3ljcYvjBiGqc/wKQC5DqG0hGDeBqxItB/Q:YJ2Rr9cNCJqG00DeUc4
                MD5:00C6520DC27E28199A0A62CE264B4668
                SHA1:E4DC70D294EC3C9D90331BB331570102D9E8149C
                SHA-256:7045A7E79B034FFEFF926B014D0873980D8CFF2DCFD5C820D422A55F2DFC6E5E
                SHA-512:E03D5799E90760B30F8C5C72FA5D1A09293B7758B82703B403392BB2164BDAE5596308CB30793526E2AF0EA1F8D4263B1DDAF9C1645982841608BA56B44C350B
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L....Oa.................f...*.......4............@.......................................@.............................................h?...........................................................................................................text....e.......f.................. ..`.rdata...............j..............@..@.data...8............~..............@....ndata... ...............................rsrc...h?.......@..................@..@................................................................................................................................................................................................................................................................................................................................................
                No static file info
                Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                Click to jump to process

                Click to jump to process

                • File
                • Network

                Click to dive into process behavior distribution

                Target ID:0
                Start time:18:03:17
                Start date:11/10/2023
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html" > cmdline.out 2>&1
                Imagebase:0x240000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:18:03:17
                Start date:11/10/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:18:03:17
                Start date:11/10/2023
                Path:C:\Windows\SysWOW64\wget.exe
                Wow64 process (32bit):true
                Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://yoosee.co/PCdownload.html"
                Imagebase:0x400000
                File size:3'895'184 bytes
                MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                Target ID:3
                Start time:18:03:20
                Start date:11/10/2023
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\download\PCdownload.html
                Imagebase:0x7ff76e190000
                File size:3'242'272 bytes
                MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:false

                Target ID:4
                Start time:18:03:20
                Start date:11/10/2023
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                Imagebase:0x7ff76e190000
                File size:3'242'272 bytes
                MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:false

                Target ID:5
                Start time:18:03:23
                Start date:11/10/2023
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5548 --field-trial-handle=1920,i,2006501308327448317,18294804143556970323,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                Imagebase:0x7ff76e190000
                File size:3'242'272 bytes
                MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                No disassembly