Classification:
spre.phis.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Command shell drops VBS files
Connects to a pastebin service (likely for C&C)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Document exploit detected (process start blacklist hit)
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
Yara detected VBS Downloader Generic
Yara detected WebBrowserPassView password recovery tool
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1433996
Sample:
New Order.xla.xlsx
Startdate:
30/04/2024
Architecture:
WINDOWS
Score:
100
85
pop.tg
2->85
87
www.msftncsi.com
2->87
89
ipv6.msftncsi.com
2->89
127
Snort IDS alert for
network traffic
2->127
129
Multi AV Scanner detection
for domain / URL
2->129
131
Found malware configuration
2->131
133
27 other signatures
2->133
11
EXCEL.EXE
7
23
2->11
started
15
chrome.exe
4
2->15
started
18
chrome.exe
2->18
started
20
9 other processes
2->20
signatures3
process4
dnsIp5
109
pop.tg
104.21.15.201, 49163, 80
CLOUDFLARENETUS
United States
11->109
111
107.175.242.96, 49164, 49168, 49191
AS-COLOCROSSINGUS
United States
11->111
79
fishermansaidyouar...rethananyone[1].doc, Rich
11->79
dropped
22
wscript.exe
11
11->22
started
26
WINWORD.EXE
336
37
11->26
started
113
192.168.2.16
unknown
unknown
15->113
115
192.168.2.17
unknown
unknown
15->115
117
4 other IPs or domains
15->117
181
Suspicious execution
chain found
15->181
29
chrome.exe
15->29
started
31
chrome.exe
18->31
started
33
chrome.exe
20->33
started
35
chrome.exe
20->35
started
37
chrome.exe
20->37
started
39
5 other processes
20->39
file6
signatures7
process8
dnsIp9
95
paste.ee
22->95
97
paste.ee
104.21.84.67, 443, 49169
CLOUDFLARENETUS
United States
22->97
149
System process connects
to network (likely due
to code injection or
exploit)
22->149
151
Suspicious powershell
command line found
22->151
153
Wscript starts Powershell
(via cmd or directly)
22->153
163
5 other signatures
22->163
41
powershell.exe
4
22->41
started
99
pop.tg
26->99
101
172.67.206.230, 49165, 49166, 49167
CLOUDFLARENETUS
United States
26->101
71
C:\Users\user\AppData\Roaming\...\pop.tg.url, MS
26->71
dropped
73
C:\Users\user\AppData\Roaming\...3eM2.url, MS
26->73
dropped
75
~WRF{9DDC82EA-8DE9...A-FE76190A9E3D}.tmp, Composite
26->75
dropped
77
C:\Users\user\AppData\Local\...\F1E5601C.doc, Rich
26->77
dropped
155
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
26->155
157
Office viewer loads
remote template
26->157
159
Microsoft Office drops
suspicious files
26->159
44
EQNEDT32.EXE
12
26->44
started
103
www.google.com
142.250.190.132, 443, 49170, 49202
GOOGLEUS
United States
29->103
105
plus.l.google.com
172.217.1.110, 443, 49190
GOOGLEUS
United States
29->105
107
2 other IPs or domains
29->107
file10
161
Connects to a pastebin
service (likely for
C&C)
95->161
signatures11
process12
file13
165
Suspicious powershell
command line found
41->165
167
Suspicious execution
chain found
41->167
47
powershell.exe
13
6
41->47
started
81
C:\Users\user\...\imageofthefishermanlove.vbs, Unicode
44->81
dropped
83
C:\Users\...\imageofthefishermankiss[1].gif, Unicode
44->83
dropped
169
Office equation editor
establishes network
connection
44->169
171
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
44->171
signatures14
process15
dnsIp16
119
uploaddeimagens.com.br
172.67.215.45, 443, 49173, 49176
CLOUDFLARENETUS
United States
47->119
121
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
47->121
123
Writes to foreign memory
regions
47->123
125
Injects a PE file into
a foreign processes
47->125
51
RegAsm.exe
47->51
started
55
RegAsm.exe
47->55
started
57
cmd.exe
47->57
started
60
RegAsm.exe
47->60
started
signatures17
process18
dnsIp19
91
107.172.31.178, 2404, 49192, 49193
AS-COLOCROSSINGUS
United States
51->91
93
geoplugin.net
178.237.33.50, 49195, 80
ATOM86-ASATOM86NL
Netherlands
51->93
135
Detected Remcos RAT
51->135
137
Maps a DLL or memory
area into another process
51->137
62
RegAsm.exe
51->62
started
65
RegAsm.exe
51->65
started
67
RegAsm.exe
51->67
started
139
Contains functionality
to bypass UAC (CMSTPLUA)
55->139
141
Tries to steal Mail
credentials (via file
registry)
55->141
143
Contains functionality
to steal Chrome passwords
or cookies
55->143
147
4 other signatures
55->147
69
C:\ProgramData\bismutho.vbs, ASCII
57->69
dropped
145
Command shell drops
VBS files
57->145
file20
signatures21
process22
signatures23
173
Tries to steal Instant
Messenger accounts or
passwords
62->173
175
Tries to steal Mail
credentials (via file
/ registry access)
62->175
177
Searches for Windows
Mail specific files
62->177
179
Tries to harvest and
steal browser information
(history, passwords,
etc)
65->179
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.