Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU

Overview

General Information

Sample URL:https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
Analysis ID:1541326
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Connects to a URL shortener service
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 5324 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 1764 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1, CommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4024, ProcessCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1, ProcessId: 5324, ProcessName: cmd.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 104.25.233.53:443 -> 192.168.2.6:49706 version: TLS 1.2
Source: unknownDNS query: name: is.gd
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /BALCAOHN898GERENCIAPS676TRIBU HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like GeckoAccept: */*Accept-Encoding: identityHost: is.gdConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: is.gd
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 24 Oct 2024 15:34:44 GMTContent-Type: text/html; charset=UTF-8Content-Length: 8465Connection: closeAccept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UACritical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UACross-Origin-Embedder-Policy: require-corpCross-Origin-Opener-Policy: same-originCross-Origin-Resource-Policy: same-originOrigin-Agent-Cluster: ?1Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()Referrer-Policy: same-originX-Content-Options: nosniffX-Frame-Options: SAMEORIGINcf-mitigated: challenge
Source: wget.exe, 00000002.00000002.2124853845.0000000000BF0000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drString found in binary or memory: https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
Source: wget.exe, 00000002.00000002.2124695905.0000000000A60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://is.gd/BALCAOHN898GERENCIAPS676TRIBUel
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 104.25.233.53:443 -> 192.168.2.6:49706 version: TLS 1.2
Source: classification engineClassification label: clean2.win@4/1@1/1
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2968:120:WilError_03
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: wget.exe, 00000002.00000002.2124853845.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://is.gd/balcaohn898gerenciaps676tribu" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Spearphishing Link
1
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1541326 URL: https://is.gd/BALCAOHN898GE... Startdate: 24/10/2024 Architecture: WINDOWS Score: 2 13 is.gd 2->13 6 cmd.exe 2 2->6         started        process3 process4 8 wget.exe 1 6->8         started        11 conhost.exe 6->11         started        dnsIp5 15 is.gd 104.25.233.53, 443, 49706 CLOUDFLARENETUS United States 8->15
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
is.gd
104.25.233.53
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://is.gd/BALCAOHN898GERENCIAPS676TRIBUfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://is.gd/BALCAOHN898GERENCIAPS676TRIBUelwget.exe, 00000002.00000002.2124695905.0000000000A60000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.25.233.53
        is.gdUnited States
        13335CLOUDFLARENETUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1541326
        Start date and time:2024-10-24 17:33:49 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 32s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:urldownload.jbs
        Sample URL:https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean2.win@4/1@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Unable to download file
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\cmd.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):304
        Entropy (8bit):5.201134482863267
        Encrypted:false
        SSDEEP:6:HR7quUfA3e8+UHBoOhkvFlcTbrXouxLH2MQFe/T1De5RhgZ6ugsfMquUfVrwsf:HRWbfIejUHBud0BsST1De5RhkgsnbfVp
        MD5:F288D4C2EB7E082E3E70035A6FB55D31
        SHA1:F8D59F8144FBAC213AC3666DAB7814A1B0239BB1
        SHA-256:7AC761D9A9F35C5FF94AF5CD3D16FBBA4427B26978764587D05D225073E3FD03
        SHA-512:D4DBE47F04F9C0F6C7F8B4D1DEB0EC1FD14B39113646DB0CB3C90F58077E64994845EF3014824736401F5FC68F96C877F388B4591F51DB346DEB60B069C8C11D
        Malicious:false
        Reputation:low
        Preview:--2024-10-24 11:34:42-- https://is.gd/BALCAOHN898GERENCIAPS676TRIBU..Resolving is.gd (is.gd)... 104.25.233.53, 104.25.234.53, 172.67.83.132..Connecting to is.gd (is.gd)|104.25.233.53|:443... connected...HTTP request sent, awaiting response... 403 Forbidden..2024-10-24 11:34:43 ERROR 403: Forbidden.....
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Oct 24, 2024 17:34:43.663306952 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:43.663363934 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:43.663433075 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:43.665466070 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:43.665483952 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.428061008 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.428297043 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.430444956 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.430457115 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.430814981 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.435039043 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.479330063 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.599050045 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.599134922 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.599169970 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.599185944 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.599215984 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.599260092 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.601512909 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.601864100 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.601900101 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.601931095 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.601943970 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.601953030 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.601990938 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.602004051 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.602018118 CEST44349706104.25.233.53192.168.2.6
        Oct 24, 2024 17:34:44.602050066 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.602089882 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.615506887 CEST49706443192.168.2.6104.25.233.53
        Oct 24, 2024 17:34:44.615525007 CEST44349706104.25.233.53192.168.2.6
        TimestampSource PortDest PortSource IPDest IP
        Oct 24, 2024 17:34:43.607636929 CEST6500253192.168.2.61.1.1.1
        Oct 24, 2024 17:34:43.619395018 CEST53650021.1.1.1192.168.2.6
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Oct 24, 2024 17:34:43.607636929 CEST192.168.2.61.1.1.10x726eStandard query (0)is.gdA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 24, 2024 17:34:43.619395018 CEST1.1.1.1192.168.2.60x726eNo error (0)is.gd104.25.233.53A (IP address)IN (0x0001)false
        Oct 24, 2024 17:34:43.619395018 CEST1.1.1.1192.168.2.60x726eNo error (0)is.gd104.25.234.53A (IP address)IN (0x0001)false
        Oct 24, 2024 17:34:43.619395018 CEST1.1.1.1192.168.2.60x726eNo error (0)is.gd172.67.83.132A (IP address)IN (0x0001)false
        • is.gd
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.649706104.25.233.534431764C:\Windows\SysWOW64\wget.exe
        TimestampBytes transferredDirectionData
        2024-10-24 15:34:44 UTC210OUTGET /BALCAOHN898GERENCIAPS676TRIBU HTTP/1.1
        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
        Accept: */*
        Accept-Encoding: identity
        Host: is.gd
        Connection: Keep-Alive
        2024-10-24 15:34:44 UTC1279INHTTP/1.1 403 Forbidden
        Date: Thu, 24 Oct 2024 15:34:44 GMT
        Content-Type: text/html; charset=UTF-8
        Content-Length: 8465
        Connection: close
        Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
        Critical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
        Cross-Origin-Embedder-Policy: require-corp
        Cross-Origin-Opener-Policy: same-origin
        Cross-Origin-Resource-Policy: same-origin
        Origin-Agent-Cluster: ?1
        Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
        Referrer-Policy: same-origin
        X-Content-Options: nosniff
        X-Frame-Options: SAMEORIGIN
        cf-mitigated: challenge
        2024-10-24 15:34:44 UTC646INData Raw: 63 66 2d 63 68 6c 2d 6f 75 74 3a 20 4c 64 4f 4c 63 6a 37 38 55 71 78 55 55 46 33 62 62 76 6b 76 38 2f 66 6e 52 65 36 30 76 2f 62 49 46 53 53 30 4d 33 71 57 75 31 32 70 34 79 4e 31 58 46 64 6d 4d 37 75 61 4d 57 77 4f 35 58 43 54 6f 48 62 31 62 6e 4c 45 37 47 52 67 30 65 4f 32 43 55 61 5a 64 65 71 4b 77 7a 44 6e 67 4e 72 39 59 52 56 61 76 4f 44 4b 78 75 72 6d 30 69 6d 66 36 76 59 68 55 31 4a 57 2f 76 39 4d 35 48 6f 43 48 30 49 7a 2f 6a 6b 43 35 36 6b 44 4a 2b 6c 4a 39 73 4a 64 33 77 3d 3d 24 6c 74 35 66 2f 6f 4c 44 6d 68 2f 61 74 65 73 41 54 4c 56 4a 65 51 3d 3d 0d 0a 43 61 63 68 65 2d 43 6f 6e 74 72 6f 6c 3a 20 70 72 69 76 61 74 65 2c 20 6d 61 78 2d 61 67 65 3d 30 2c 20 6e 6f 2d 73 74 6f 72 65 2c 20 6e 6f 2d 63 61 63 68 65 2c 20 6d 75 73 74 2d 72 65 76 61
        Data Ascii: cf-chl-out: LdOLcj78UqxUUF3bbvkv8/fnRe60v/bIFSS0M3qWu12p4yN1XFdmM7uaMWwO5XCToHb1bnLE7GRg0eO2CUaZdeqKwzDngNr9YRVavODKxurm0imf6vYhU1JW/v9M5HoCH0Iz/jkC56kDJ+lJ9sJd3w==$lt5f/oLDmh/atesATLVJeQ==Cache-Control: private, max-age=0, no-store, no-cache, must-reva
        2024-10-24 15:34:44 UTC813INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 4a 75 73 74 20 61 20 6d 6f 6d 65 6e 74 2e 2e 2e 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70
        Data Ascii: <!DOCTYPE html><html lang="en-US"><head><title>Just a moment...</title><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=Edge"><meta name="robots" content="noindex,nofollow"><meta name="viewp
        2024-10-24 15:34:44 UTC1369INData Raw: 66 6f 6e 74 2d 77 65 69 67 68 74 3a 35 30 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 32 2e 32 35 72 65 6d 7d 40 6d 65 64 69 61 20 28 77 69 64 74 68 20 3c 3d 20 37 32 30 70 78 29 7b 2e 68 32 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 35 72 65 6d 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 35 72 65 6d 7d 7d 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 65 78 74 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 75 72 6c 28 64 61 74 61 3a 69 6d 61 67 65 2f 73 76 67 2b 78 6d 6c 3b 62 61 73 65 36 34 2c 50 48 4e 32 5a 79 42 34 62 57 78 75 63 7a 30 69 61 48 52 30 63 44 6f 76 4c 33 64 33 64 79 35 33 4d 79 35 76 63 6d 63 76 4d 6a 41 77 4d 43 39 7a 64 6d 63 69 49 48 64 70 5a 48 52 6f 50 53 49 7a 4d 69 49 67 61 47 56 70 5a 32 68 30 50 53 49 7a 4d 69 49 67
        Data Ascii: font-weight:500;line-height:2.25rem}@media (width <= 720px){.h2{font-size:1.25rem;line-height:1.5rem}}#challenge-error-text{background-image:url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSIzMiIgaGVpZ2h0PSIzMiIg
        2024-10-24 15:34:44 UTC1369INData Raw: 30 45 76 55 7a 31 52 6c 6d 62 58 66 64 67 5f 70 2e 74 69 64 6b 4a 36 69 56 27 2c 63 55 50 4d 44 54 6b 3a 20 22 5c 2f 42 41 4c 43 41 4f 48 4e 38 39 38 47 45 52 45 4e 43 49 41 50 53 36 37 36 54 52 49 42 55 3f 5f 5f 63 66 5f 63 68 6c 5f 74 6b 3d 76 6c 46 6a 56 5a 61 70 77 48 6d 45 77 76 7a 64 57 54 43 5a 52 51 75 33 37 4e 45 4d 6d 63 62 63 74 63 4b 78 38 45 69 65 32 66 45 2d 31 37 32 39 37 38 34 30 38 34 2d 31 2e 30 2e 31 2e 31 2d 77 4a 55 34 70 47 4e 6c 54 6e 6b 77 75 38 2e 56 76 5a 72 69 37 49 35 79 58 75 57 47 59 75 59 71 4a 54 56 69 58 67 6f 55 68 30 30 22 2c 63 46 50 57 76 3a 20 27 67 27 2c 63 49 54 69 6d 65 53 3a 20 27 31 37 32 39 37 38 34 30 38 34 27 2c 63 54 54 69 6d 65 4d 73 3a 20 27 31 30 30 30 27 2c 63 4d 54 69 6d 65 4d 73 3a 20 27 33 39 30 30 30
        Data Ascii: 0EvUz1RlmbXfdg_p.tidkJ6iV',cUPMDTk: "\/BALCAOHN898GERENCIAPS676TRIBU?__cf_chl_tk=vlFjVZapwHmEwvzdWTCZRQu37NEMmcbctcKx8Eie2fE-1729784084-1.0.1.1-wJU4pGNlTnkwu8.VvZri7I5yXuWGYuYqJTViXgoUh00",cFPWv: 'g',cITimeS: '1729784084',cTTimeMs: '1000',cMTimeMs: '39000
        2024-10-24 15:34:44 UTC1369INData Raw: 63 48 59 71 50 51 30 73 31 75 4a 75 5f 48 7a 65 58 34 71 69 50 32 50 52 70 67 66 57 33 57 4f 33 4e 32 63 44 6b 75 38 57 38 76 59 65 36 78 6f 52 39 66 7a 4f 79 50 7a 52 33 45 39 6d 50 6e 4b 53 36 4a 79 33 34 72 4e 70 33 4d 51 52 61 6b 64 78 69 63 5f 49 5a 4d 76 51 4e 47 43 68 4d 48 70 68 59 4d 45 6f 49 44 5a 47 32 45 57 48 35 45 72 72 30 50 5a 4d 79 7a 45 2e 31 6e 63 71 63 32 4a 4a 76 58 72 44 6b 30 35 71 71 4f 64 68 65 48 52 39 76 35 79 6d 73 62 45 64 59 35 75 2e 75 59 4d 61 6b 58 68 44 62 47 77 5f 79 58 70 35 63 73 59 55 62 31 56 42 56 71 76 50 6e 67 36 46 52 62 6d 30 58 44 57 64 65 54 43 5a 79 63 5f 38 38 35 2e 68 58 71 49 5f 77 6a 41 6d 45 41 55 4a 6f 71 5f 42 66 4c 4f 65 4b 64 4f 5f 75 34 61 68 6e 46 34 57 42 41 65 76 71 5a 33 52 2e 63 59 4f 73 4c 6c
        Data Ascii: cHYqPQ0s1uJu_HzeX4qiP2PRpgfW3WO3N2cDku8W8vYe6xoR9fzOyPzR3E9mPnKS6Jy34rNp3MQRakdxic_IZMvQNGChMHphYMEoIDZG2EWH5Err0PZMyzE.1ncqc2JJvXrDk05qqOdheHR9v5ymsbEdY5u.uYMakXhDbGw_yXp5csYUb1VBVqvPng6FRbm0XDWdeTCZyc_885.hXqI_wjAmEAUJoq_BfLOeKdO_u4ahnF4WBAevqZ3R.cYOsLl
        2024-10-24 15:34:44 UTC1369INData Raw: 58 50 4a 52 37 4f 47 2e 71 55 58 34 46 6e 75 51 7a 70 36 78 30 6a 6d 69 51 6f 36 2e 33 71 42 78 59 79 65 6f 41 67 33 6e 59 69 46 35 32 38 34 4f 6c 4a 31 4e 71 70 39 6f 4a 65 31 35 72 56 79 52 71 64 77 68 4c 4a 66 41 76 4b 6a 57 5f 6c 32 4b 56 39 72 65 32 77 52 2e 49 45 65 41 61 48 49 44 73 4f 6f 56 71 38 37 57 44 45 75 52 4f 45 54 31 53 66 39 7a 57 4b 53 49 2e 39 39 68 63 4d 59 78 4b 48 47 2e 65 30 31 55 58 70 5f 46 7a 50 58 68 6e 6c 57 4c 4d 78 70 45 44 46 53 4a 56 4c 6e 6a 42 52 57 32 59 5a 70 55 73 72 46 47 71 59 64 45 6c 6d 65 68 68 35 35 57 34 36 64 4f 6a 67 4c 44 4e 53 68 54 35 62 5a 36 5f 75 77 78 54 5a 70 55 75 63 35 33 47 6a 7a 33 75 68 62 65 52 5a 76 30 6f 36 53 5f 38 6b 4d 49 73 69 30 79 62 38 6c 38 6e 55 55 71 7a 41 59 72 74 71 45 50 79 47 65
        Data Ascii: XPJR7OG.qUX4FnuQzp6x0jmiQo6.3qBxYyeoAg3nYiF5284OlJ1Nqp9oJe15rVyRqdwhLJfAvKjW_l2KV9re2wR.IEeAaHIDsOoVq87WDEuROET1Sf9zWKSI.99hcMYxKHG.e01UXp_FzPXhnlWLMxpEDFSJVLnjBRW2YZpUsrFGqYdElmehh55W46dOjgLDNShT5bZ6_uwxTZpUuc53Gjz3uhbeRZv0o6S_8kMIsi0yb8l8nUUqzAYrtqEPyGe
        2024-10-24 15:34:44 UTC1369INData Raw: 4f 71 38 65 49 37 6f 66 51 6f 76 74 59 4b 51 6b 6a 78 58 74 42 63 46 4f 48 76 46 53 74 39 4e 34 71 69 37 67 35 70 30 47 77 6e 30 41 38 4e 6a 30 77 73 34 52 61 55 66 4d 44 4c 52 35 39 5f 6c 6a 33 42 69 76 57 56 56 49 67 63 37 61 54 49 64 78 32 54 6a 30 42 6a 68 30 59 6e 4e 79 76 62 70 54 33 6c 4c 32 44 54 59 71 78 4a 54 72 74 72 43 66 54 67 34 37 66 64 43 34 68 44 75 76 6a 5f 75 37 43 64 77 38 4d 69 69 63 6c 41 31 2e 68 64 64 39 38 52 6a 38 61 73 4d 5a 65 38 45 71 6c 62 66 6a 5f 35 6f 50 4a 41 4a 51 44 75 5a 65 50 6b 43 34 41 52 45 67 77 68 41 67 51 46 7a 30 36 6c 78 68 4d 48 6f 78 61 33 38 32 6b 6a 59 36 4d 79 6a 46 44 47 62 74 56 51 71 6e 74 66 70 42 37 5f 39 76 50 4e 63 67 6d 67 53 50 74 4f 42 6a 5f 76 4c 53 42 67 65 57 30 4d 5f 48 5a 52 73 52 56 4e 43
        Data Ascii: Oq8eI7ofQovtYKQkjxXtBcFOHvFSt9N4qi7g5p0Gwn0A8Nj0ws4RaUfMDLR59_lj3BivWVVIgc7aTIdx2Tj0Bjh0YnNyvbpT3lL2DTYqxJTrtrCfTg47fdC4hDuvj_u7Cdw8MiiclA1.hdd98Rj8asMZe8Eqlbfj_5oPJAJQDuZePkC4AREgwhAgQFz06lxhMHoxa382kjY6MyjFDGbtVQqntfpB7_9vPNcgmgSPtOBj_vLSBgeW0M_HZRsRVNC
        2024-10-24 15:34:44 UTC807INData Raw: 27 3b 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 63 4f 67 55 48 61 73 68 20 3d 20 6c 6f 63 61 74 69 6f 6e 2e 68 61 73 68 20 3d 3d 3d 20 27 27 20 26 26 20 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 2e 69 6e 64 65 78 4f 66 28 27 23 27 29 20 21 3d 3d 20 2d 31 20 3f 20 27 23 27 20 3a 20 6c 6f 63 61 74 69 6f 6e 2e 68 61 73 68 3b 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 63 4f 67 55 51 75 65 72 79 20 3d 20 6c 6f 63 61 74 69 6f 6e 2e 73 65 61 72 63 68 20 3d 3d 3d 20 27 27 20 26 26 20 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 2e 73 6c 69 63 65 28 30 2c 20 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 2e 6c 65 6e 67 74 68 20 2d 20 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 63 4f 67 55 48 61 73 68 2e 6c 65 6e 67 74 68 29 2e 69 6e 64 65
        Data Ascii: ';window._cf_chl_opt.cOgUHash = location.hash === '' && location.href.indexOf('#') !== -1 ? '#' : location.hash;window._cf_chl_opt.cOgUQuery = location.search === '' && location.href.slice(0, location.href.length - window._cf_chl_opt.cOgUHash.length).inde


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:11:34:42
        Start date:24/10/2024
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1
        Imagebase:0x1c0000
        File size:236'544 bytes
        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:11:34:42
        Start date:24/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff66e660000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:11:34:42
        Start date:24/10/2024
        Path:C:\Windows\SysWOW64\wget.exe
        Wow64 process (32bit):true
        Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU"
        Imagebase:0x400000
        File size:3'895'184 bytes
        MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly