Classification:
spre.bank.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates a thread in another existing process (thread injection)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1448086
Sample:
#20240627_Edlen_A.xls
Startdate:
27/05/2024
Architecture:
WINDOWS
Score:
100
71
z2.ink
2->71
91
Snort IDS alert for
network traffic
2->91
93
Multi AV Scanner detection
for domain / URL
2->93
95
Found malware configuration
2->95
97
21 other signatures
2->97
12
EXCEL.EXE
57
31
2->12
started
16
taskeng.exe
1
2->16
started
signatures3
process4
dnsIp5
81
198.46.177.156, 49162, 49167, 49170
AS-COLOCROSSINGUS
United States
12->81
83
z2.ink
54.241.153.192, 49161, 49163, 49164
AMAZON-02US
United States
12->83
65
lionsarebeautifult...ionbeautiufl[1].doc, ISO-8859
12->65
dropped
18
wscript.exe
11
12->18
started
22
WINWORD.EXE
339
33
12->22
started
25
rugtucw
16->25
started
file6
process7
dnsIp8
73
paste.ee
18->73
75
paste.ee
188.114.96.3, 443, 49172
CLOUDFLARENETUS
European Union
18->75
99
System process connects
to network (likely due
to code injection or
exploit)
18->99
101
Suspicious powershell
command line found
18->101
103
Wscript starts Powershell
(via cmd or directly)
18->103
113
5 other signatures
18->113
27
powershell.exe
4
18->27
started
77
z2.ink
22->77
55
C:\Users\user\AppData\Roaming\...\z2.ink.url, MS
22->55
dropped
57
C:\Users\user\AppData\Roaming\...\nXPJ.url, MS
22->57
dropped
59
~WRF{D9BCE685-2557...C-EEF401A63014}.tmp, Composite
22->59
dropped
61
C:\Users\user\AppData\Local\...\1B25204E.doc, ISO-8859
22->61
dropped
105
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
22->105
107
Office viewer loads
remote template
22->107
109
Microsoft Office drops
suspicious files
22->109
30
EQNEDT32.EXE
12
22->30
started
file9
111
Connects to a pastebin
service (likely for
C&C)
73->111
signatures10
process11
file12
131
Suspicious powershell
command line found
27->131
133
Suspicious execution
chain found
27->133
33
powershell.exe
12
5
27->33
started
67
C:\Users\...\lionarekingofjungleimageshe.vbs, Unicode
30->67
dropped
135
Office equation editor
establishes network
connection
30->135
137
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
30->137
signatures13
process14
dnsIp15
69
uploaddeimagens.com.br
188.114.97.3, 443, 49173, 49174
CLOUDFLARENETUS
European Union
33->69
87
Writes to foreign memory
regions
33->87
89
Injects a PE file into
a foreign processes
33->89
37
RegAsm.exe
33->37
started
signatures16
process17
signatures18
115
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
37->115
117
Maps a DLL or memory
area into another process
37->117
119
Checks if the current
machine is a virtual
machine (disk enumeration)
37->119
121
Creates a thread in
another existing process
(thread injection)
37->121
40
explorer.exe
3
5
37->40
injected
process19
dnsIp20
79
prolinice.ga
77.232.129.190, 49176, 49177, 80
BSTV-ASRU
Russian Federation
40->79
63
C:\Users\user\AppData\Roaming\rugtucw, PE32
40->63
dropped
123
Benign windows process
drops PE files
40->123
125
Injects code into the
Windows Explorer (explorer.exe)
40->125
127
Writes to foreign memory
regions
40->127
129
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
40->129
45
explorer.exe
6
40->45
started
49
explorer.exe
40->49
started
51
explorer.exe
40->51
started
53
6 other processes
40->53
file21
signatures22
process23
dnsIp24
85
prolinice.ga
45->85
139
System process connects
to network (likely due
to code injection or
exploit)
45->139
141
Found evasive API chain
(may stop execution
after checking mutex)
45->141
143
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
45->143
147
3 other signatures
45->147
145
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->145
signatures25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.