Classification:
phis.troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Drops VBS files to the startup folder
Found evasive API chain checking for user administrative privileges
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suricata IDS alerts for network traffic
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1783976
Sample:
SHPMT ORDER HGH-PO25012 - P...
Startdate:
25/09/2025
Architecture:
WINDOWS
Score:
100
109
textbin.net
2->109
111
bg.microsoft.map.fastly.net
2->111
113
2 other IPs or domains
2->113
123
Suricata IDS alerts
for network traffic
2->123
125
Found malware configuration
2->125
127
Malicious sample detected
(through community Yara
rule)
2->127
131
22 other signatures
2->131
11
SHPMT ORDER HGH-PO25012 - PTWH SMS EL49.scr.exe
7
2->11
started
15
hIzYhtlQoR.exe
2->15
started
17
wscript.exe
2->17
started
19
wscript.exe
2->19
started
signatures3
129
Connects to a pastebin
service (likely for
C&C)
109->129
process4
file5
99
C:\Users\user\AppData\...\hIzYhtlQoR.exe, PE32+
11->99
dropped
101
C:\Users\...\hIzYhtlQoR.exe:Zone.Identifier, ASCII
11->101
dropped
103
C:\Users\user\AppData\Local\...\tmp287A.tmp, XML
11->103
dropped
105
SHPMT ORDER HGH-PO...MS EL49.scr.exe.log, CSV
11->105
dropped
165
Writes to foreign memory
regions
11->165
167
Allocates memory in
foreign processes
11->167
169
Modifies the context
of a thread in another
process (thread injection)
11->169
171
Adds a directory exclusion
to Windows Defender
11->171
21
vbc.exe
8
31
11->21
started
26
powershell.exe
23
11->26
started
28
powershell.exe
23
11->28
started
30
schtasks.exe
1
11->30
started
173
Multi AV Scanner detection
for dropped file
15->173
175
Injects a PE file into
a foreign processes
15->175
32
vbc.exe
15->32
started
34
schtasks.exe
15->34
started
177
Wscript starts Powershell
(via cmd or directly)
17->177
179
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
17->179
36
cmd.exe
17->36
started
38
cmd.exe
19->38
started
signatures6
process7
dnsIp8
115
69.5.189.18, 2404, 49687, 49688
OMNISUS
United States
21->115
117
api.findip.net
172.67.214.3, 443, 49695
CLOUDFLARENETUS
United States
21->117
119
2 other IPs or domains
21->119
85
C:\Users\user\AppData\Local\Temp\THE5C9.tmp, MS-DOS
21->85
dropped
87
C:\Users\user\AppData\Local\Temp\THE00C.tmp, MS-DOS
21->87
dropped
89
C:\Users\user\AppData\Local\Temp\THDF9D.tmp, PE32
21->89
dropped
91
7 other malicious files
21->91
dropped
133
Contains functionality
to bypass UAC (CMSTPLUA)
21->133
135
Detected Remcos RAT
21->135
137
Attempt to bypass Chrome
Application-Bound Encryption
21->137
147
9 other signatures
21->147
40
wscript.exe
21->40
started
45
RmClient.exe
21->45
started
53
8 other processes
21->53
139
Uses ipconfig to lookup
or modify the Windows
network settings
26->139
141
Loading BitLocker PowerShell
Module
26->141
143
Powershell drops PE
file
26->143
47
conhost.exe
26->47
started
55
2 other processes
28->55
49
conhost.exe
30->49
started
51
conhost.exe
34->51
started
145
Wscript starts Powershell
(via cmd or directly)
36->145
57
2 other processes
36->57
59
2 other processes
38->59
file9
signatures10
process11
dnsIp12
121
textbin.net
172.67.166.77
CLOUDFLARENETUS
United States
40->121
93
C:\Users\user\AppData\Roaming\...\XJHOP.ps1, Non-ISO
40->93
dropped
95
C:\Users\user\AppData\Roaming\...\DXQBW.cmd, ASCII
40->95
dropped
97
C:\Users\user\AppData\Roaming\...\ZBJUL.vbs, ASCII
40->97
dropped
149
System process connects
to network (likely due
to code injection or
exploit)
40->149
151
Wscript starts Powershell
(via cmd or directly)
40->151
153
Potential malicious
VBS script found (suspicious
strings)
40->153
163
4 other signatures
40->163
61
cmd.exe
40->61
started
155
Tries to steal Instant
Messenger accounts or
passwords
45->155
157
Tries to steal Mail
credentials (via file
/ registry access)
45->157
159
Tries to steal Mail
credentials (via file
registry)
53->159
161
Tries to harvest and
steal browser information
(history, passwords,
etc)
53->161
64
conhost.exe
53->64
started
66
msedge.exe
53->66
started
68
ipconfig.exe
57->68
started
70
ipconfig.exe
57->70
started
72
ipconfig.exe
59->72
started
74
ipconfig.exe
59->74
started
file13
signatures14
process15
signatures16
181
Wscript starts Powershell
(via cmd or directly)
61->181
183
Bypasses PowerShell
execution policy
61->183
76
powershell.exe
61->76
started
79
conhost.exe
61->79
started
process17
file18
107
C:\Users\user\AppData\Local\...\RegSvcs.exe, PE32
76->107
dropped
81
ipconfig.exe
76->81
started
83
ipconfig.exe
76->83
started
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.