Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the user root directory
Drops PE files with benign system names
Found malware configuration
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Generic Downloader
Yara detected Telegram RAT
Yara detected Telegram Recon
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1483499
Sample:
Easy Anti-Cheat Analyzer.exe
Startdate:
27/07/2024
Architecture:
WINDOWS
Score:
100
106
api.telegram.org
2->106
108
main-although.gl.at.ply.gg
2->108
110
3 other IPs or domains
2->110
120
Multi AV Scanner detection
for domain / URL
2->120
122
Found malware configuration
2->122
124
Malicious sample detected
(through community Yara
rule)
2->124
128
32 other signatures
2->128
12
Easy Anti-Cheat Analyzer.exe
6
2->12
started
16
DhxfPrbgvxAlbKU.exe
2->16
started
19
svchost.exe
2->19
started
21
4 other processes
2->21
signatures3
126
Uses the Telegram API
(likely for C&C
communication)
106->126
process4
dnsIp5
84
C:\Users\user\AppData\Local\...\svchost.exe, PE32
12->84
dropped
86
C:\Users\...\Windows Driver Foundation.exe, PE32
12->86
dropped
88
C:\Users\user\AppData\...\Runtime Broker.exe, PE32
12->88
dropped
90
C:\Users\...asy Anti-Cheat Analyzer.exe.log, CSV
12->90
dropped
154
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
12->154
23
Runtime Broker.exe
3
6
12->23
started
26
svchost.exe
1
6
12->26
started
30
Windows Driver Foundation.exe
14
5
12->30
started
32
cmd.exe
1
12->32
started
104
freebov3.beget.tech
5.101.153.2, 49722, 49723, 49724
BEGET-ASRU
Russian Federation
16->104
92
35005415193d93447c...5e6edf987d5dd95.exe, PE32
16->92
dropped
94
8eb27030-d95e-454f-a345-816a53144759.vbs, ASCII
16->94
dropped
96
83b08bc4-bb9e-4339-bd6e-646401ea4753.vbs, ASCII
16->96
dropped
156
Antivirus detection
for dropped file
16->156
158
Multi AV Scanner detection
for dropped file
16->158
160
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->160
162
4 other signatures
16->162
34
wscript.exe
16->34
started
36
wscript.exe
16->36
started
file6
signatures7
process8
dnsIp9
76
C:\...\portproviderperf.exe, PE32
23->76
dropped
78
C:\...\FI5uMh3ETeLxf7f5t3w.vbe, data
23->78
dropped
38
wscript.exe
23->38
started
112
main-although.gl.at.ply.gg
147.185.221.21, 27263, 30970, 49732
SALSGIVERUS
United States
26->112
80
C:\Users\Public\svchost.exe, PE32
26->80
dropped
134
Antivirus detection
for dropped file
26->134
136
System process connects
to network (likely due
to code injection or
exploit)
26->136
138
Multi AV Scanner detection
for dropped file
26->138
152
5 other signatures
26->152
41
powershell.exe
26->41
started
114
ip-api.com
208.95.112.1, 49704, 49705, 49706
TUT-ASUS
United States
30->114
116
api.telegram.org
149.154.167.220, 443, 49731
TELEGRAMRU
United Kingdom
30->116
82
C:\Users\user\AppData\Roaming\XClient.exe, PE32
30->82
dropped
140
Protects its processes
via BreakOnTermination
flag
30->140
142
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
30->142
144
Adds a directory exclusion
to Windows Defender
30->144
43
powershell.exe
30->43
started
45
dllhost.exe
30->45
started
146
Uses ping.exe to sleep
32->146
148
Uses ping.exe to check
the status of other
devices and networks
32->148
47
PING.EXE
32->47
started
50
conhost.exe
32->50
started
52
timeout.exe
1
32->52
started
54
12 other processes
32->54
150
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
34->150
file10
signatures11
process12
dnsIp13
130
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
38->130
56
cmd.exe
38->56
started
58
conhost.exe
41->58
started
132
Loading BitLocker PowerShell
Module
43->132
60
conhost.exe
43->60
started
118
127.0.0.1
unknown
unknown
47->118
signatures14
process15
process16
62
portproviderperf.exe
56->62
started
66
conhost.exe
56->66
started
file17
98
C:\Windows\Performance\DhxfPrbgvxAlbKU.exe, PE32
62->98
dropped
100
C:\...\Memory Compression.exe, PE32
62->100
dropped
102
C:\Users\user\AppData\...\URT2YQtT3u.bat, DOS
62->102
dropped
164
Antivirus detection
for dropped file
62->164
166
Multi AV Scanner detection
for dropped file
62->166
168
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
62->168
170
7 other signatures
62->170
68
cmd.exe
62->68
started
signatures18
process19
process20
70
conhost.exe
68->70
started
72
w32tm.exe
68->72
started
74
portproviderperf.exe
68->74
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.