Click to jump to signature section
Source: unknown | HTTPS traffic detected: 104.21.60.109:443 -> 192.168.2.7:49703 version: TLS 1.2 |
Source: Joe Sandbox View | JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19 |
Source: Network traffic | Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49750 |
Source: Network traffic | Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49961 |
Source: global traffic | HTTP traffic detected: GET //672350cabd2c8/js/672350cabd242.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: acess.mailcffemx.comConnection: Keep-Alive |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET //672350cabd2c8/js/672350cabd242.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: acess.mailcffemx.comConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: acess.mailcffemx.com |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 01 Nov 2024 07:34:07 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCache-Control: max-age=14400CF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fNcab4NQmZfz06XMFBpg5S9Buw7zcHrG74pqrTcULBLqgk%2BZeyb62d2BvrwMfDYgO27xVdM4WqbNRy7jSRk6F51YzT%2B1QRpR5PHW1GqakFIw5GhT7ap9%2BgQeN4PjkQHFFMOd4sj6Zw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8dba3356fe49e972-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1752&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=920&delivery_rate=1675925&cwnd=251&unsent_bytes=0&cid=2b6ca4858bbb054a&ts=506&x=0" |
Source: mshta.exe, 00000000.00000003.1259509556.000000000317C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.000000000317C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://acess.mailcffemx.com/ |
Source: mshta.exe, 00000000.00000002.2486758713.0000000003142000.00000004.00000020.00020000.00000000.sdmp, eLoll8t7fq.hta | String found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.js |
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsH- |
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsZ |
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsn- |
Source: mshta.exe, 00000000.00000002.2486758713.00000000031DD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown | HTTPS traffic detected: 104.21.60.109:443 -> 192.168.2.7:49703 version: TLS 1.2 |
Source: classification engine | Classification label: clean2.winHTA@1/0@1/1 |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msimtf.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: jscript9.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: mshta.exe, 00000000.00000003.1259244931.00000000031E3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.00000000031E3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: mshta.exe, 00000000.00000003.1259509556.000000000317C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.000000000317C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWen-GBn |
Source: mshta.exe, 00000000.00000003.1259509556.00000000031B3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.00000000031B3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWh |
Source: C:\Windows\SysWOW64\mshta.exe | Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation | Jump to behavior |