Classification:
spre.phis.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sample uses process hollowing technique
Searches for Windows Mail specific files
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1395034
Sample:
Order295676.xls
Startdate:
20/02/2024
Architecture:
WINDOWS
Score:
100
93
Snort IDS alert for
network traffic
2->93
95
Multi AV Scanner detection
for domain / URL
2->95
97
Found malware configuration
2->97
99
26 other signatures
2->99
10
EXCEL.EXE
58
68
2->10
started
14
wscript.exe
2->14
started
process3
dnsIp4
83
104.218.236.114, 49162, 49163, 49164
SPARTANHOSTGB
Reserved
10->83
65
sweetpotattolikeba...emakefasterp[1].doc, ISO-8859
10->65
dropped
17
wscript.exe
1
10->17
started
21
WINWORD.EXE
345
41
10->21
started
24
AcroRd32.exe
28
10->24
started
147
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
14->147
file5
signatures6
process7
dnsIp8
71
paste.ee
17->71
73
paste.ee
172.67.187.200, 443, 49171
CLOUDFLARENETUS
United States
17->73
101
System process connects
to network (likely due
to code injection or
exploit)
17->101
103
Suspicious powershell
command line found
17->103
105
Wscript starts Powershell
(via cmd or directly)
17->105
115
5 other signatures
17->115
26
powershell.exe
4
17->26
started
29
cmd.exe
17->29
started
57
C:\Users\user\...\win on 104.218.236.114.url, MS
21->57
dropped
59
sweetpotattolikeba...makefasterp.doC.url, MS
21->59
dropped
61
~WRF{C7642B05-0EAE...9-2CC48747158A}.tmp, Composite
21->61
dropped
63
C:\Users\user\AppData\Local\...\7C061BE4.doc, ISO-8859
21->63
dropped
107
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
21->107
109
Office viewer loads
remote template
21->109
111
Microsoft Office drops
suspicious files
21->111
31
EQNEDT32.EXE
12
21->31
started
34
RdrCEF.exe
24->34
started
file9
113
Connects to a pastebin
service (likely for
C&C)
71->113
signatures10
process11
file12
139
Suspicious powershell
command line found
26->139
141
Suspicious execution
chain found
26->141
36
powershell.exe
13
6
26->36
started
67
C:\Users\user\AppData\...\loversmeetup.vbs, Unicode
31->67
dropped
69
C:\Users\user\AppData\...\Loversmeetup[1].vbs, Unicode
31->69
dropped
143
Office equation editor
establishes network
connection
31->143
145
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
31->145
signatures13
process14
dnsIp15
75
45.74.19.84, 49172, 80
HVC-ASUS
United States
36->75
117
Suspicious powershell
command line found
36->117
119
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
36->119
121
Writes to foreign memory
regions
36->121
123
Injects a PE file into
a foreign processes
36->123
40
RegAsm.exe
36->40
started
44
RegAsm.exe
36->44
started
46
powershell.exe
36->46
started
signatures16
process17
dnsIp18
77
mohmusremcos.duckdns.org
40->77
79
mohmusremcos.duckdns.org
192.227.173.10, 14645, 49174, 49175
AS-COLOCROSSINGUS
United States
40->79
81
geoplugin.net
178.237.33.50, 49176, 80
ATOM86-ASATOM86NL
Netherlands
40->81
125
Maps a DLL or memory
area into another process
40->125
127
Sample uses process
hollowing technique
40->127
48
RegAsm.exe
40->48
started
51
RegAsm.exe
40->51
started
53
RegAsm.exe
40->53
started
55
dllhost.exe
40->55
started
129
Contains functionality
to bypass UAC (CMSTPLUA)
44->129
131
Tries to steal Mail
credentials (via file
registry)
44->131
133
Contains functionality
to steal Chrome passwords
or cookies
44->133
137
4 other signatures
44->137
signatures19
135
Uses dynamic DNS services
77->135
process20
signatures21
85
Tries to steal Instant
Messenger accounts or
passwords
48->85
87
Tries to steal Mail
credentials (via file
/ registry access)
48->87
89
Searches for Windows
Mail specific files
48->89
91
Tries to harvest and
steal browser information
(history, passwords,
etc)
51->91
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.