Classification:
spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Downloads files with wrong headers with respect to MIME Content-Type
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
Sigma detected: Disable power options
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Stop EventLog
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Uses powercfg.exe to modify the power settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Costura Assembly Loader
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1560438
Sample:
file.exe
Startdate:
21/11/2024
Architecture:
WINDOWS
Score:
100
86
246.204.9.0.in-addr.arpa
2->86
126
Antivirus / Scanner
detection for submitted
sample
2->126
128
Multi AV Scanner detection
for submitted file
2->128
130
Yara detected Powershell
download and execute
2->130
132
20 other signatures
2->132
15
file.exe
2
2->15
started
18
Mig.exe
2->18
started
21
svchost.exe
2->21
started
signatures3
process4
dnsIp5
82
C:\Users\user\AppData\Local\...\tempScript.js, ASCII
15->82
dropped
84
C:\Users\user\AppData\Local\...\file.exe.log, CSV
15->84
dropped
24
wscript.exe
1
1
15->24
started
106
Detected unpacking (changes
PE section rights)
18->106
108
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
18->108
110
Machine Learning detection
for dropped file
18->110
112
3 other signatures
18->112
88
127.0.0.1
unknown
unknown
21->88
file6
signatures7
process8
signatures9
136
Suspicious powershell
command line found
24->136
138
Wscript starts Powershell
(via cmd or directly)
24->138
140
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
24->140
142
Suspicious execution
chain found
24->142
27
powershell.exe
10
19
24->27
started
31
powershell.exe
7
17
24->31
started
process10
dnsIp11
80
C:\Users\user\AppData\Roaming\CMD.vbs, ASCII
27->80
dropped
154
Potential malicious
VBS script found (suspicious
strings)
27->154
156
Found many strings related
to Crypto-Wallets (likely
being stolen)
27->156
158
Uses ipconfig to lookup
or modify the Windows
network settings
27->158
164
2 other signatures
27->164
34
wscript.exe
1
27->34
started
37
conhost.exe
27->37
started
92
176.113.115.178, 49704, 49705, 49706
SELECTELRU
Russian Federation
31->92
160
Writes to foreign memory
regions
31->160
162
Injects a PE file into
a foreign processes
31->162
39
RegSvcs.exe
3
31->39
started
42
conhost.exe
31->42
started
44
ipconfig.exe
1
31->44
started
file12
signatures13
process14
dnsIp15
114
Wscript starts Powershell
(via cmd or directly)
34->114
116
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
34->116
46
cmd.exe
1
34->46
started
90
176.113.115.177, 49707, 49711, 7702
SELECTELRU
Russian Federation
39->90
118
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
39->118
120
Tries to steal Mail
credentials (via file
/ registry access)
39->120
122
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->122
124
3 other signatures
39->124
signatures16
process17
process18
48
mshta.exe
17
46->48
started
51
conhost.exe
46->51
started
signatures19
94
Suspicious powershell
command line found
48->94
53
powershell.exe
48->53
started
process20
file21
76
C:\Users\user\AppData\Roaming\LB31.exe, PE32+
53->76
dropped
134
Adds a directory exclusion
to Windows Defender
53->134
57
LB31.exe
53->57
started
61
powershell.exe
53->61
started
63
conhost.exe
53->63
started
signatures22
process23
file24
78
C:\ProgramData\Mig\Mig.exe, PE32+
57->78
dropped
144
Detected unpacking (changes
PE section rights)
57->144
146
Machine Learning detection
for dropped file
57->146
148
Uses powercfg.exe to
modify the power settings
57->148
152
6 other signatures
57->152
65
dialer.exe
57->65
started
68
powershell.exe
57->68
started
70
cmd.exe
57->70
started
72
13 other processes
57->72
150
Loading BitLocker PowerShell
Module
61->150
signatures25
process26
signatures27
96
Injects code into the
Windows Explorer (explorer.exe)
65->96
98
Contains functionality
to inject code into
remote processes
65->98
100
Writes to foreign memory
regions
65->100
104
4 other signatures
65->104
102
Loading BitLocker PowerShell
Module
68->102
74
conhost.exe
68->74
started
process28
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.