Classification:
spre.troj.spyw.expl.evad
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Found malware configuration
Injects a PE file into a foreign processes
Installs new ROOT certificates
Malicious sample detected (through community Yara rule)
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected VBS Downloader Generic
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1435897
Sample:
citat-05022024.xla.xlsx
Startdate:
03/05/2024
Architecture:
WINDOWS
Score:
100
69
pop.tg
2->69
105
Snort IDS alert for
network traffic
2->105
107
Multi AV Scanner detection
for domain / URL
2->107
109
Found malware configuration
2->109
111
24 other signatures
2->111
10
EXCEL.EXE
7
23
2->10
started
14
chrome.exe
4
2->14
started
16
chrome.exe
2->16
started
18
12 other processes
2->18
signatures3
process4
dnsIp5
85
pop.tg
172.67.206.230, 49161, 49163, 80
CLOUDFLARENETUS
United States
10->85
87
192.3.101.142, 49162, 49166, 49187
AS-COLOCROSSINGUS
United States
10->87
65
wewanthowthemagica...lingmefortea[1].doc, Rich
10->65
dropped
20
wscript.exe
11
10->20
started
24
WINWORD.EXE
336
37
10->24
started
89
192.168.2.5
unknown
unknown
14->89
91
192.168.2.6
unknown
unknown
14->91
93
239.255.255.250
unknown
Reserved
14->93
27
chrome.exe
14->27
started
29
chrome.exe
16->29
started
31
chrome.exe
18->31
started
33
chrome.exe
18->33
started
35
chrome.exe
18->35
started
37
9 other processes
18->37
file6
process7
dnsIp8
71
paste.ee
20->71
73
paste.ee
104.21.84.67, 443, 49167
CLOUDFLARENETUS
United States
20->73
113
System process connects
to network (likely due
to code injection or
exploit)
20->113
115
Suspicious powershell
command line found
20->115
117
Wscript starts Powershell
(via cmd or directly)
20->117
127
5 other signatures
20->127
39
powershell.exe
4
20->39
started
75
pop.tg
24->75
77
104.21.15.201, 49164, 49165, 80
CLOUDFLARENETUS
United States
24->77
53
C:\Users\user\AppData\Roaming\...\pop.tg.url, MS
24->53
dropped
55
C:\Users\user\AppData\Roaming\...\89zB6.url, MS
24->55
dropped
57
~WRF{A3A6F7D3-36FA...F-8DDEBBFF17EB}.tmp, Composite
24->57
dropped
59
C:\Users\user\AppData\Local\...\624E5EEE.doc, Rich
24->59
dropped
119
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
24->119
121
Office viewer loads
remote template
24->121
123
Microsoft Office drops
suspicious files
24->123
42
EQNEDT32.EXE
12
24->42
started
79
www.google.com
142.250.190.132, 443, 49169, 49173
GOOGLEUS
United States
27->79
81
127.0.0.1
unknown
unknown
27->81
83
google.com
27->83
file9
125
Connects to a pastebin
service (likely for
C&C)
71->125
signatures10
process11
file12
129
Suspicious powershell
command line found
39->129
45
powershell.exe
12
5
39->45
started
61
C:\Users\user\...\imagesfishingboat.vbs, Unicode
42->61
dropped
63
C:\Users\user\...\hotstuffnewrdp[1].vbs, Unicode
42->63
dropped
131
Office equation editor
establishes network
connection
42->131
133
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
42->133
signatures13
process14
dnsIp15
95
uploaddeimagens.com.br
104.21.45.138, 443, 49168, 49180
CLOUDFLARENETUS
United States
45->95
135
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
45->135
137
Writes to foreign memory
regions
45->137
139
Injects a PE file into
a foreign processes
45->139
49
AddInProcess32.exe
45->49
started
signatures16
process17
dnsIp18
67
ip-api.com
208.95.112.1, 49194, 80
TUT-ASUS
United States
49->67
97
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
49->97
99
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
49->99
101
Tries to steal Mail
credentials (via file
/ registry access)
49->101
103
2 other signatures
49->103
signatures19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.