Report - IAEA.doc.lnk

Generic Malware AntiDebug AntiVM Lnk Format GIF Format
ScreenShot
Created 2024.09.05 08:33 Machine s1_win7_x6401
Filename IAEA.doc.lnk
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Sat Dec 7 00:09:39 2019, mtime=Mon Apr 17 03:06:41 2023, atime=Sat Dec 7 00:09:39 2019, length=148
AI Score Not founds Behavior Score
4.6
ZERO API file : clean
VT API (file) 18 detected (Malicious, score, Nioc, VPUJ, DownLnk, Static AI, Suspicious LNK, Detected, ai score=83, Probably Heur, LNKScript)
md5 1d2b9a986461e97edfff9b91e64e1e5b
sha256 c2bc69085df7036bdef980932a2383b34a9fb76a92d85b9f377beca060053c17
ssdeep 24:8ALkQCvn//E8AZ68+xebf+/2gnTT4I0BXQaR3+POh6BOY+/vm:8Ckx/WI8+ebfUMIOXv3Fh6BOYk
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Disables proxy possibly for traffic interception
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Yara rule detected in process memory
info Checks amount of memory in system

Rules (11cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info lnk_file_format Microsoft Windows Shortcut File Format binaries (upload)
info Lnk_Format_Zero LNK Format binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pkinfo.live JP ARTERIA Networks Corporation 103.231.75.189 mailcious
103.231.75.189 JP ARTERIA Networks Corporation 103.231.75.189 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure