Threat name:
Lokibot, Strela Stealer
Alert
Classification:
spre.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates autostart registry keys with suspicious values (likely registry only malware)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: rundll32 run dll from internet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected aPLib compressed binary
Yara detected Strela Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1388848
Sample:
Debit note.xls
Startdate:
08/02/2024
Architecture:
WINDOWS
Score:
100
85
Snort IDS alert for
network traffic
2->85
87
Multi AV Scanner detection
for domain / URL
2->87
89
Found malware configuration
2->89
91
26 other signatures
2->91
9
EXCEL.EXE
58
57
2->9
started
13
wscript.exe
2->13
started
process3
dnsIp4
67
172.245.135.142, 49162, 49163, 49164
AS-COLOCROSSINGUS
United States
9->67
53
ballonprocessedbym...formanceofpc[1].doc, ISO-8859
9->53
dropped
16
wscript.exe
1
9->16
started
20
WINWORD.EXE
346
37
9->20
started
23
AcroRd32.exe
28
9->23
started
117
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
13->117
file5
signatures6
process7
dnsIp8
59
paste.ee
16->59
61
paste.ee
172.67.187.200, 443, 49171, 49172
CLOUDFLARENETUS
United States
16->61
69
System process connects
to network (likely due
to code injection or
exploit)
16->69
71
Suspicious powershell
command line found
16->71
73
Wscript starts Powershell
(via cmd or directly)
16->73
83
5 other signatures
16->83
25
powershell.exe
4
16->25
started
45
ballonprocessedbym...ormanceofpc.doC.url, MS
20->45
dropped
47
C:\Users\user\...\b19 on 172.245.135.142.url, MS
20->47
dropped
49
~WRF{5BFF9BFB-4A04...C-82F3DC5AF8EB}.tmp, Composite
20->49
dropped
51
C:\Users\user\AppData\Local\...\3154C601.doc, ISO-8859
20->51
dropped
75
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
20->75
77
Office viewer loads
remote template
20->77
79
Microsoft Office drops
suspicious files
20->79
28
EQNEDT32.EXE
12
20->28
started
31
rundll32.exe
9
20->31
started
33
RdrCEF.exe
23->33
started
file9
81
Connects to a pastebin
service (likely for
C&C)
59->81
signatures10
process11
file12
109
Suspicious powershell
command line found
25->109
111
Suspicious execution
chain found
25->111
35
powershell.exe
13
6
25->35
started
55
C:\Users\user\AppData\...\cupcakesweet.vbs, Unicode
28->55
dropped
57
C:\Users\user\AppData\...\cupcakesweet[1].vbs, Unicode
28->57
dropped
113
Office equation editor
establishes network
connection
28->113
115
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
28->115
signatures13
process14
dnsIp15
63
45.74.19.84, 49173, 80
HVC-ASUS
United States
35->63
93
Suspicious powershell
command line found
35->93
95
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
35->95
97
Writes to foreign memory
regions
35->97
99
Injects a PE file into
a foreign processes
35->99
39
RegAsm.exe
35->39
started
43
powershell.exe
5
35->43
started
signatures16
process17
dnsIp18
65
sempersim.su
103.215.221.168, 49175, 49176, 49177
ErtebatGostarAminKoshaEU
Iran (ISLAMIC Republic Of)
39->65
101
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
39->101
103
Tries to steal Mail
credentials (via file
registry)
39->103
105
Tries to steal Mail
credentials (via file
/ registry access)
39->105
107
2 other signatures
39->107
signatures19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.