Summary | ZeroBOX

ukbvxz01.lnk

Generic Malware Antivirus GIF Format Lnk Format
Category Machine Started Completed
FILE s1_win7_x6401 July 6, 2024, 12:45 p.m. July 6, 2024, 12:48 p.m.
Size 1.6KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Sun Jun 16 20:57:10 2024, mtime=Sun Jun 16 20:57:10 2024, atime=Sun Jun 16 20:57:10 2024, length=987136, window=hide
MD5 5029bd93186f57a8f5b7978910999604
SHA256 5dc2d627ff1b7756fccc0a8f2fe119d6be6b84796f9f2beca8896829b5f8d11d
CRC32 C3C046B9
ssdeep 24:8tl97Jmm0rdwkiPPMKA4UPAx+/FSUD1JGY4I02g21pK6+/CIab/yDnq+/CWxm93:8tl97wmI5iPPM54lpUD1+IXBcaz2nq4
Yara
  • Antivirus - Contains references to security software
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file C:\Users\test22\AppData\Local\Temp\ukbvxz01.lnk.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c22000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\ukbvxz01.lnk