Classification:
spre.phis.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1426846
Sample:
P.O.109961.xls
Startdate:
16/04/2024
Architecture:
WINDOWS
Score:
100
67
lnkz.at
2->67
103
Snort IDS alert for
network traffic
2->103
105
Found malware configuration
2->105
107
Malicious sample detected
(through community Yara
rule)
2->107
109
29 other signatures
2->109
11
EXCEL.EXE
58
55
2->11
started
signatures3
process4
dnsIp5
77
lnkz.at
172.67.180.182, 443, 49165, 49166
CLOUDFLARENETUS
United States
11->77
79
107.173.4.5, 49167, 49174, 49175
AS-COLOCROSSINGUS
United States
11->79
63
wegendideaoflovers...lialwayslove[1].doc, Rich
11->63
dropped
15
wscript.exe
6
14
11->15
started
19
WINWORD.EXE
337
41
11->19
started
22
AcroRd32.exe
11->22
started
file6
process7
dnsIp8
81
paste.ee
15->81
83
paste.ee
104.21.84.67, 443, 49176
CLOUDFLARENETUS
United States
15->83
87
System process connects
to network (likely due
to code injection or
exploit)
15->87
89
Uses certutil -decode
15->89
91
Suspicious powershell
command line found
15->91
101
5 other signatures
15->101
24
powershell.exe
4
15->24
started
27
cmd.exe
1
15->27
started
29
certutil.exe
1
15->29
started
85
lnkz.at
19->85
55
C:\Users\user\AppData\Roaming\...\lnkz.at.url, MS
19->55
dropped
57
C:\Users\user\AppData\Roaming\...\RR4of.url, MS
19->57
dropped
59
~WRF{ECB1C235-2A20...F-7030819374F1}.tmp, Composite
19->59
dropped
61
C:\Users\user\AppData\Local\...\2D98E959.doc, Rich
19->61
dropped
93
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
19->93
95
Office viewer loads
remote template
19->95
97
Microsoft Office drops
suspicious files
19->97
31
EQNEDT32.EXE
12
19->31
started
34
WerFault.exe
19->34
started
36
RdrCEF.exe
22->36
started
file9
99
Connects to a pastebin
service (likely for
C&C)
81->99
signatures10
process11
file12
115
Suspicious powershell
command line found
24->115
117
Suspicious execution
chain found
24->117
38
powershell.exe
12
5
24->38
started
65
C:\Users\user\...\imaginepixelloverkissu.vbs, Unicode
31->65
dropped
119
Office equation editor
establishes network
connection
31->119
121
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
31->121
signatures13
process14
dnsIp15
69
uploaddeimagens.com.br
172.67.215.45, 443, 49177, 49178
CLOUDFLARENETUS
United States
38->69
111
Writes to foreign memory
regions
38->111
113
Injects a PE file into
a foreign processes
38->113
42
RegAsm.exe
38->42
started
signatures16
process17
dnsIp18
71
nomoreremcos.duckdns.org
42->71
73
nomoreremcos.duckdns.org
192.3.101.28, 14645, 49180, 49182
AS-COLOCROSSINGUS
United States
42->73
75
geoplugin.net
178.237.33.50, 49181, 80
ATOM86-ASATOM86NL
Netherlands
42->75
123
Contains functionality
to bypass UAC (CMSTPLUA)
42->123
125
Detected Remcos RAT
42->125
127
Tries to steal Mail
credentials (via file
registry)
42->127
131
6 other signatures
42->131
46
RegAsm.exe
42->46
started
49
RegAsm.exe
42->49
started
51
RegAsm.exe
42->51
started
53
2 other processes
42->53
signatures19
129
Uses dynamic DNS services
71->129
process20
signatures21
133
Tries to steal Instant
Messenger accounts or
passwords
46->133
135
Tries to steal Mail
credentials (via file
/ registry access)
46->135
137
Searches for Windows
Mail specific files
46->137
139
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->139
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.