Windows Analysis Report
DECIDENT.LNK.lnk

Overview

General Information

Sample Name: DECIDENT.LNK.lnk
Analysis ID: 795693
MD5: 0dcf849c45cbcbcc80f2faf974a2da70
SHA1: fb649af9030286b008898cbb0314f39689323a9e
SHA256: dc8d25b04313db41d710d03a22c60eb79eff2f2c8e36980fb8328de6f62e00af
Tags: IcedIDlnk
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Windows shortcut file (LNK) starts blacklisted processes
Machine Learning detection for sample
Sample execution stops while process was sleeping (likely an evasion)
Program does not show much activity (idle)

Classification

AV Detection

barindex
Source: DECIDENT.LNK.lnk Joe Sandbox ML: detected
Source: C:\Windows\System32\conhost.exe File read: C:\Users\desktop.ini Jump to behavior
Source: classification engine Classification label: mal52.winLNK@2/0@0/1
Source: unknown Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c "SPASTICS\STYRACIN.CMD reg" i Monoeidic X Sortieing
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Persistence and Installation Behavior

barindex
Source: LNK file Process created: C:\Windows\System32\cmd.exe
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs