Classification:
spre.troj.spyw.expl.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1397816
Sample:
entregar confirmaci#U00f3n ...
Startdate:
23/02/2024
Architecture:
WINDOWS
Score:
100
62
Snort IDS alert for
network traffic
2->62
64
Found malware configuration
2->64
66
Malicious sample detected
(through community Yara
rule)
2->66
68
21 other signatures
2->68
9
EXCEL.EXE
52
57
2->9
started
process3
dnsIp4
52
172.245.214.91, 49162, 49163, 49164
AS-COLOCROSSINGUS
United States
9->52
50
mylovetoindustryto...thenewthings[1].doc, ISO-8859
9->50
dropped
13
wscript.exe
1
9->13
started
17
WINWORD.EXE
345
37
9->17
started
file5
process6
dnsIp7
56
paste.ee
13->56
58
104.21.84.67, 443, 49168
CLOUDFLARENETUS
United States
13->58
82
System process connects
to network (likely due
to code injection or
exploit)
13->82
84
Suspicious powershell
command line found
13->84
86
Wscript starts Powershell
(via cmd or directly)
13->86
96
5 other signatures
13->96
20
powershell.exe
4
13->20
started
38
mylovetoindustryto...henewthings.doC.url, MS
17->38
dropped
40
C:\Users\user\AppData\...\172.245.214.91.url, MS
17->40
dropped
42
~WRF{DA3C120A-B31A...8-3EAD8B943775}.tmp, Composite
17->42
dropped
44
C:\Users\user\AppData\Local\...\220D8EA9.doc, ISO-8859
17->44
dropped
88
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
17->88
90
Office viewer loads
remote template
17->90
92
Microsoft Office drops
suspicious files
17->92
23
EQNEDT32.EXE
12
17->23
started
file8
94
Connects to a pastebin
service (likely for
C&C)
56->94
signatures9
process10
file11
70
Suspicious powershell
command line found
20->70
26
powershell.exe
12
5
20->26
started
46
C:\Users\user\AppData\...\fridaexploit.vbs, Unicode
23->46
dropped
48
C:\Users\user\...\fridaexploit1[1].vbs, Unicode
23->48
dropped
72
Office equation editor
establishes network
connection
23->72
74
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
23->74
signatures12
process13
dnsIp14
54
uploaddeimagens.com.br
172.67.215.45, 443, 49170
CLOUDFLARENETUS
United States
26->54
76
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
26->76
78
Writes to foreign memory
regions
26->78
80
Injects a PE file into
a foreign processes
26->80
30
AddInProcess32.exe
12
2
26->30
started
34
AddInProcess32.exe
26->34
started
36
AddInProcess32.exe
26->36
started
signatures15
process16
dnsIp17
60
ip-api.com
208.95.112.1, 49172, 80
TUT-ASUS
United States
30->60
98
Tries to steal Mail
credentials (via file
/ registry access)
30->98
100
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
30->100
102
Tries to harvest and
steal browser information
(history, passwords,
etc)
30->102
104
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
34->104
106
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
34->106
108
Contains functionality
to check if a debugger
is running (CheckRemoteDebuggerPresent)
34->108
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.