Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
25jan. Required documents.lnk

Overview

General Information

Sample Name:25jan. Required documents.lnk
Analysis ID:794650
MD5:42d501d938b5152accfb8541ccd302a5
SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Windows shortcut file (LNK) starts blacklisted processes
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) contains suspicious command line arguments
Sample execution stops while process was sleeping (likely an evasion)
Uses taskkill to terminate processes
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges

Classification

  • System is w10x64_ra
  • cmd.exe (PID: 6496 cmdline: "C:\Windows\System32\cmd.exe" /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe MD5: 9D59442313565C2E0860B88BF32B2277)
    • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
    • taskkill.exe (PID: 6588 cmdline: taskkill /F /IM cmd.exe MD5: 3BBEE3AC757CA54F33710DF8FB9D47A7)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 25jan. Required documents.lnkVirustotal: Detection: 8%Perma Link

System Summary

barindex
Source: 25jan. Required documents.lnkLNK file: /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
Source: 25jan. Required documents.lnkVirustotal: Detection: 8%
Source: classification engineClassification label: mal60.winLNK@4/0@0/0
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM cmd.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM cmd.exeJump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: 25jan. Required documents.lnkLNK file: ..\..\..\Windows\System32\cmd.exe
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "cmd.exe")

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM cmd.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM cmd.exeJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
Path Interception11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
25jan. Required documents.lnk8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:794650
Start date and time:2023-01-30 19:46:32 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 3m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:25jan. Required documents.lnk
Detection:MAL
Classification:mal60.winLNK@4/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .lnk
  • Exclude process from analysis (whitelisted): dllhost.exe, rundll32.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.190.159.75, 40.126.31.73, 20.190.159.73, 20.190.159.4, 20.190.159.2, 40.126.31.71, 40.126.31.69, 20.190.159.23
  • Excluded domains from analysis (whitelisted): prda.aadg.msidentity.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, www.tm.a.prd.aadg.akadns.net, login.msa.msidentity.com, www.tm.lg.prod.aadmsa.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=14, Archive, ctime=Sat Jul 16 12:18:48 2016, mtime=Sat Jul 16 12:18:48 2016, atime=Sat Jul 16 12:18:48 2016, length=232960, window=hide
Entropy (8bit):4.469401886349938
TrID:
  • Windows Shortcut (20020/1) 100.00%
File name:25jan. Required documents.lnk
File size:1312
MD5:42d501d938b5152accfb8541ccd302a5
SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
SHA512:0ea012f85c749ccbb153766423c88d166eb186725b21ba1be442f3ac7d3290aa3356b80fefceff23dd010dd82e814bbd316f7e7b7a5d43e76c224c4e16f577e8
SSDEEP:24:8vJ25BdHdaUCMbXUx+/fqiT0x4o0agFDTXD/Fom:80hH5h0OoATXjFo
TLSH:C821870507FBA319F3B24E76043AE3458FA2F951FD63A72D5254A18C8860F08EC74B17
File Content Preview:L..................F.... .......d.......d.......d...........................5....P.O. .:i.....+00.../C:\...................V.1...../Urk..Windows.@........H.0/Urk..........................u...W.i.n.d.o.w.s.....Z.1.....)V.>..System32..B........H.0)V.>......
Icon Hash:74f0e4e4e4e9e1ed

General

Relative Path:..\..\..\Windows\System32\cmd.exe
Command Line Argument:/c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
Icon location:%SystemRoot%\system32\imageres.dll
Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:19:47:07
Start date:30/01/2023
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
Imagebase:0x7ff7f3020000
File size:280064 bytes
MD5 hash:9D59442313565C2E0860B88BF32B2277
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Target ID:1
Start time:19:47:07
Start date:30/01/2023
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7603a0000
File size:885760 bytes
MD5 hash:C5E9B1D1103EDCEA2E408E9497A5A88F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Target ID:3
Start time:19:47:07
Start date:30/01/2023
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /F /IM cmd.exe
Imagebase:0x7ff6c79d0000
File size:95744 bytes
MD5 hash:3BBEE3AC757CA54F33710DF8FB9D47A7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly