Threat name:
Cobalt Strike, Remcos, HTMLPhisher
Alert
Classification:
rans.phis.troj.spyw.expl.evad
AI detected suspicious sample
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Detected Cobalt Strike Beacon
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Obfuscated command line found
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected HtmlPhish44
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1562936
Sample:
thinkingbestthingswhichcomi...
Startdate:
26/11/2024
Architecture:
WINDOWS
Score:
100
63
balalalala.duckdns.org
2->63
65
ip.3105.filemail.com
2->65
67
2 other IPs or domains
2->67
85
Suricata IDS alerts
for network traffic
2->85
87
Found malware configuration
2->87
89
Malicious sample detected
(through community Yara
rule)
2->89
93
22 other signatures
2->93
12
mshta.exe
1
2->12
started
signatures3
91
Uses dynamic DNS services
63->91
process4
signatures5
117
Detected Cobalt Strike
Beacon
12->117
119
Suspicious powershell
command line found
12->119
121
PowerShell case anomaly
found
12->121
15
powershell.exe
3
39
12->15
started
process6
dnsIp7
75
198.46.178.192, 49704, 49747, 80
AS-COLOCROSSINGUS
United States
15->75
55
wecreatedbetterthi...attogobetterthi.vBs, Unicode
15->55
dropped
57
C:\Users\user\AppData\...\2ds2dwze.cmdline, Unicode
15->57
dropped
77
Detected Cobalt Strike
Beacon
15->77
79
Suspicious powershell
command line found
15->79
81
Obfuscated command line
found
15->81
83
Found suspicious powershell
code related to unpacking
or dynamic code loading
15->83
20
wscript.exe
1
15->20
started
23
powershell.exe
21
15->23
started
25
csc.exe
3
15->25
started
28
conhost.exe
15->28
started
file8
signatures9
process10
file11
95
Detected Cobalt Strike
Beacon
20->95
97
Suspicious powershell
command line found
20->97
99
Wscript starts Powershell
(via cmd or directly)
20->99
103
3 other signatures
20->103
30
powershell.exe
7
20->30
started
101
Loading BitLocker PowerShell
Module
23->101
59
C:\Users\user\AppData\Local\...\2ds2dwze.dll, PE32
25->59
dropped
33
cvtres.exe
1
25->33
started
signatures12
process13
signatures14
123
Detected Cobalt Strike
Beacon
30->123
125
Suspicious powershell
command line found
30->125
127
Obfuscated command line
found
30->127
35
powershell.exe
15
16
30->35
started
39
conhost.exe
30->39
started
process15
dnsIp16
69
ip.3105.filemail.com
193.30.119.205, 443, 49705
DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
unknown
35->69
105
Writes to foreign memory
regions
35->105
107
Injects a PE file into
a foreign processes
35->107
41
CasPol.exe
35->41
started
signatures17
process18
dnsIp19
71
balalalala.duckdns.org
192.3.101.149, 49757, 49763, 6946
AS-COLOCROSSINGUS
United States
41->71
73
geoplugin.net
178.237.33.50, 49764, 80
ATOM86-ASATOM86NL
Netherlands
41->73
61
C:\ProgramData\remcos\logs.dat, data
41->61
dropped
109
Contains functionality
to bypass UAC (CMSTPLUA)
41->109
111
Detected Remcos RAT
41->111
113
Tries to steal Mail
credentials (via file
registry)
41->113
115
8 other signatures
41->115
46
CasPol.exe
41->46
started
49
CasPol.exe
41->49
started
51
CasPol.exe
41->51
started
53
2 other processes
41->53
file20
signatures21
process22
signatures23
129
Tries to steal Instant
Messenger accounts or
passwords
46->129
131
Tries to steal Mail
credentials (via file
/ registry access)
46->131
133
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->133
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.