Managed XDR
Group-IB MDP Report
File info
Filename: c-users-user-appdata-local-temp-shortcut-2-.lnk
File Type: MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Wed Jun 12 15:05:10 2024, mtime=Fri Dec 20 21:06:48 2024, atime=Wed Jun 12 15:05:10 2024, length=289792, window=hidenormalshowminimized
File Size: 2.2 KB
Env info
win7/x86 en
Hashes
SHA1: c53f41655fa6cc4347785be29db2d6976ac493c4
SHA256: 6b14387aa6102e8aed2a6dc8b1e41c7be5701a326129217f7a80fd81b35b93fa
MD5: 252266cb747a2264813824ebfee5b589
Signatures
Execution
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1204 suspicious_lnk: LNK file with suspicious content
T1059.001 suspicious_process: Spawns a suspicious process
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Discovery
T1082 recon_systeminfo: Collects system information (ipconfig, netstat, systeminfo, net)
Command and Control
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other
yara_rules: Static rules
unexpected_exception: Unexpected exception
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
Managed XDR