Classification:
spre.phis.troj.spyw.expl.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Document exploit detected (process start blacklist hit)
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1426753
Sample:
SecuriteInfo.com.Exploit.Sh...
Startdate:
16/04/2024
Architecture:
WINDOWS
Score:
100
70
Snort IDS alert for
network traffic
2->70
72
Multi AV Scanner detection
for domain / URL
2->72
74
Found malware configuration
2->74
76
27 other signatures
2->76
11
WINWORD.EXE
291
15
2->11
started
14
wscript.exe
2->14
started
17
wscript.exe
2->17
started
process3
file4
56
~WRF{CA543F72-2079...E-1CAAB2B57148}.tmp, Composite
11->56
dropped
19
EQNEDT32.EXE
12
11->19
started
120
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
14->120
signatures5
process6
dnsIp7
58
23.94.36.10, 49161, 49165, 80
AS-COLOCROSSINGUS
United States
19->58
54
C:\Users\user\...\imageloverkissingme.vbs, Unicode
19->54
dropped
86
Office equation editor
establishes network
connection
19->86
88
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
19->88
24
wscript.exe
6
14
19->24
started
file8
signatures9
process10
dnsIp11
66
paste.ee
24->66
68
104.21.84.67, 443, 49162
CLOUDFLARENETUS
United States
24->68
98
System process connects
to network (likely due
to code injection or
exploit)
24->98
100
Uses certutil -decode
24->100
102
Suspicious powershell
command line found
24->102
106
6 other signatures
24->106
28
powershell.exe
4
24->28
started
31
cmd.exe
1
24->31
started
33
certutil.exe
1
24->33
started
signatures12
104
Connects to a pastebin
service (likely for
C&C)
66->104
process13
signatures14
108
Suspicious powershell
command line found
28->108
110
Suspicious execution
chain found
28->110
35
powershell.exe
13
6
28->35
started
process15
dnsIp16
60
uploaddeimagens.com.br
172.67.215.45, 443, 49163, 49164
CLOUDFLARENETUS
United States
35->60
78
Suspicious powershell
command line found
35->78
80
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
35->80
82
Writes to foreign memory
regions
35->82
84
Injects a PE file into
a foreign processes
35->84
39
RegAsm.exe
3
10
35->39
started
43
powershell.exe
5
35->43
started
signatures17
process18
dnsIp19
62
107.175.229.141, 36832, 49166, 49167
AS-COLOCROSSINGUS
United States
39->62
64
geoplugin.net
178.237.33.50, 49169, 80
ATOM86-ASATOM86NL
Netherlands
39->64
90
Contains functionality
to bypass UAC (CMSTPLUA)
39->90
92
Detected Remcos RAT
39->92
94
Tries to steal Mail
credentials (via file
registry)
39->94
96
7 other signatures
39->96
45
RegAsm.exe
39->45
started
48
RegAsm.exe
39->48
started
50
RegAsm.exe
39->50
started
52
3 other processes
39->52
signatures20
process21
signatures22
112
Tries to steal Instant
Messenger accounts or
passwords
45->112
114
Tries to steal Mail
credentials (via file
/ registry access)
45->114
116
Searches for Windows
Mail specific files
45->116
118
Tries to harvest and
steal browser information
(history, passwords,
etc)
48->118
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.