Summary | ZeroBOX

DKM-9067291.pdf.lnk

GIF Format Lnk Format
Category Machine Started Completed
FILE s1_win7_x6402 Nov. 20, 2024, 9:11 a.m. Nov. 20, 2024, 9:14 a.m.
Size 1.9KB
Type MS Windows shortcut, Points to a file or directory, Icon number=11, Archive, ctime=Sun Nov 17 08:56:53 2024, mtime=Sun Nov 17 08:56:44 2024, atime=Sun Nov 17 08:56:44 2024, length=153, window=hidenormalshowminimized
MD5 ec59f33659d0f4d2b1cddc76d82c9556
SHA256 45d00dc1fa18402b7062f11116e11d0267a8abcf341893d66854bac17b2624ee
CRC32 10F7FB80
ssdeep 24:8koHdFgrWncY6/wHcmBnR1E583nK5Cj+7S/TIU2JQvMcCvDxIU2SKs:8lUWcf0cc31K578EU2JYC6U2SK
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format

Name Response Post-Analysis Lookup
ni-olympic-forests-invoice.trycloudflare.com
IP Address Status Action
164.124.101.2 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Access is denied.
console_handle: 0x0000000b
1 1 0
file C:\Users\test22\AppData\Local\Temp\DKM-9067291.pdf.lnk
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
ESET-NOD32 LNK/TrojanDownloader.Agent.CDU
Sophos Troj/DownLnk-CN
Google Detected
Kingsoft Win32.Troj.Undef.a
GData Win32.Trojan.Agent.8I32DT
Ikarus Trojan-Downloader.LNK.Agent
Tencent Win32.Trojan-Downloader.Der.Zmhl
huorong TrojanDownloader/LNK.Agent.en
Fortinet LNK/Agent.CDU!tr
alibabacloud Trojan[downloader]:Win/Agent.CFW
registry HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Microsoft Outlook\Capabilities\Hidden