Classification:
spre.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1393417
Sample:
Facturas 0000051113, 005112...
Startdate:
16/02/2024
Architecture:
WINDOWS
Score:
100
70
Snort IDS alert for
network traffic
2->70
72
Multi AV Scanner detection
for domain / URL
2->72
74
Found malware configuration
2->74
76
24 other signatures
2->76
9
EXCEL.EXE
7
40
2->9
started
process3
dnsIp4
60
198.12.81.134, 49163, 49164, 49165
AS-COLOCROSSINGUS
United States
9->60
56
onemicrosoftdecent...foretoupdate[1].doc, ISO-8859
9->56
dropped
13
wscript.exe
1
9->13
started
17
WINWORD.EXE
345
37
9->17
started
20
AcroRd32.exe
27
9->20
started
file5
process6
dnsIp7
62
pastebin.com
13->62
64
pastebin.com
104.20.68.143, 443, 49168
CLOUDFLARENETUS
United States
13->64
96
System process connects
to network (likely due
to code injection or
exploit)
13->96
98
Suspicious powershell
command line found
13->98
100
Wscript starts Powershell
(via cmd or directly)
13->100
110
5 other signatures
13->110
22
powershell.exe
4
13->22
started
44
onemicrosoftdecent...oretoupdate.doC.url, MS
17->44
dropped
46
C:\Users\user\AppData\...\198.12.81.134.url, MS
17->46
dropped
48
~WRF{5A1D84CA-B299...6-2BD1533845C4}.tmp, Composite
17->48
dropped
50
C:\Users\user\AppData\Local\...\39AFE6B4.doc, ISO-8859
17->50
dropped
102
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
17->102
104
Office viewer loads
remote template
17->104
106
Microsoft Office drops
suspicious files
17->106
25
EQNEDT32.EXE
12
17->25
started
28
RdrCEF.exe
20->28
started
file8
108
Connects to a pastebin
service (likely for
C&C)
62->108
signatures9
process10
file11
90
Suspicious powershell
command line found
22->90
30
powershell.exe
12
5
22->30
started
52
C:\Users\user\AppData\...\extrafiledriod.vbs, Unicode
25->52
dropped
54
C:\Users\user\...\extrafiledroid1[1].vbs, Unicode
25->54
dropped
92
Office equation editor
establishes network
connection
25->92
94
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
25->94
signatures12
process13
dnsIp14
66
45.74.19.84, 49170, 80
HVC-ASUS
United States
30->66
68
172.245.214.91, 49171, 80
AS-COLOCROSSINGUS
United States
30->68
112
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
30->112
114
Writes to foreign memory
regions
30->114
116
Injects a PE file into
a foreign processes
30->116
34
AddInProcess32.exe
12
2
30->34
started
38
AddInProcess32.exe
30->38
started
40
AddInProcess32.exe
30->40
started
42
AddInProcess32.exe
30->42
started
signatures15
process16
dnsIp17
58
ip-api.com
208.95.112.1, 49172, 80
TUT-ASUS
United States
34->58
78
Tries to steal Mail
credentials (via file
/ registry access)
34->78
80
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->80
82
Tries to harvest and
steal browser information
(history, passwords,
etc)
34->82
84
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
38->84
86
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
38->86
88
Contains functionality
to check if a debugger
is running (CheckRemoteDebuggerPresent)
38->88
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.