Summary | ZeroBOX

references.pdf.lnk

Generic Malware Antivirus GIF Format Lnk Format
Category Machine Started Completed
FILE s1_win7_x6402 April 2, 2025, 9:45 a.m. April 2, 2025, 9:47 a.m.
Size 1.6KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Thu Jan 16 03:11:30 2025, mtime=Tue Mar 18 21:52:55 2025, atime=Thu Jan 16 03:11:30 2025, length=867840, window=hide
MD5 99e60187abde030675774de31cc6e8d6
SHA256 bf3b19c30085a9611650aa283856bf3defec894aae0b303ccf90244746127206
CRC32 2807697D
ssdeep 24:8N5lJ1/La0i0AlPAg+/J+vZdYMrYqVPqOYbXQaR3+P/R2SRHe06N+/fm2:8N5lP/G0iD256YoBZfYbXv3yR2Sr6N0
Yara
  • Antivirus - Contains references to security software
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file C:\Users\test22\AppData\Local\Temp\references.pdf.lnk.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73da2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3068
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x737e3000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\references.pdf.lnk
Symantec Scr.Malcode!gen
TrendMicro-HouseCall HEUR_LNKEXEC.A
Avast LNK:Agent-LC [Drp]
Kaspersky HEUR:Trojan.WinLNK.Agent.gen
TrendMicro HEUR_LNKEXEC.A
Google Detected
GData Win32.Trojan.Agent.RM8BIJ
Ikarus Trojan.Win32.Agent
huorong Trojan/LNK.Agent.ah
Fortinet LNK/Agent.LC!tr
AVG LNK:Agent-LC [Drp]
alibabacloud Trojan:Win/Agent.gyf