Managed XDR
Group-IB MDP Report
File info
Filename: hajj_advisory.pdf.lnk
File Type: MS Windows shortcut, Item id list present, Points to a file or directory, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Mon Feb 26 07:00:34 2024, mtime=Wed Sep 18 09:53:43 2024, atime=Mon Feb 26 07:00:34 2024, length=450560, window=hidenormalshowminimized
File Size: 3 KB
Env info
win7/x86 en
Hashes
SHA1: 2a6f7b0eb4a0f88fda6944e9159b24d394dce2c4
SHA256: f74820b855153c373ccb745852c551ea087e4376af761b2fffa1216ecfc2dc85
MD5: fc81c75276fb21ccebb3ab6a4aac2239
Signatures
Execution
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1059.001 suspicious_process: Spawns a suspicious process
Persistence
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Other
creates_exe: Creates executable files in the file system
executes_dropped_exe: Executes dropped exe files
caon_rat_behavior: Exhibits behavior characteristics of BoxCaon RAT
unexpected_exception: Unexpected exception
no_graphical_activity: No graphic activity
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
yara_rules: Static rules
Managed XDR