Summary | ZeroBOX

Invoice_RVSJKAM02GH_pdf.lnk

GIF Format
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 2, 2023, 4:57 p.m. Aug. 2, 2023, 4:59 p.m.
Size 2.9KB
Type MS Windows shortcut, Points to a file or directory, Has Working directory, Icon number=0, Archive, ctime=Sun Dec 31 15:32:08 1600, mtime=Fri Jun 30 05:52:53 2023, atime=Fri Jun 30 05:52:53 2023, length=352216, window=hidenormalshowminimized
MD5 ca4756de93f1356c73c37d5ce1e64405
SHA256 84d32881ef43a7662841c032d263478fb93c5bac82a126a0d06daf685ad7fa3c
CRC32 ED9A4BFD
ssdeep 24:8DqaYbE+uLiOd8nzE58ypDCj+7ShcE+WzhjCRaEduuYjSGJntVBQeTjFxMcriWq5:8D5YY5iBze7yYShjCKjSGj3TjIbWqjO
Yara
  • Lnk_Format_Zero - LNK Format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
192.155.91.72 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 2027260 ET INFO Dotted Quad Host VBS Request Potentially Bad Traffic
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 2027260 ET INFO Dotted Quad Host VBS Request Potentially Bad Traffic
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 2019158 ET MALWARE Possible Malicious Invoice EXE A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Access is denied.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3044
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72f22000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3044
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72da3000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3044
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03f40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\Invoice_RVSJKAM02GH_pdf.lnk
FireEye Trojan.GenericKD.68469944
BitDefender Trojan.GenericKD.68469944
MicroWorld-eScan Trojan.GenericKD.68469944
MAX malware (ai score=80)
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
host 192.155.91.72
registry HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Mozilla Thunderbird\Capabilities\Hidden