Classification:
phis.troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Installs a global keyboard hook
Installs new ROOT certificates
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Microsoft Office drops suspicious files
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Powershell uses Background Intelligent Transfer Service (BITS)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Equation Editor Network Connection
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AveMaria stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1383149
Sample:
product_list_and_specificat...
Startdate:
30/01/2024
Architecture:
WINDOWS
Score:
100
66
Snort IDS alert for
network traffic
2->66
68
Multi AV Scanner detection
for domain / URL
2->68
70
Found malware configuration
2->70
72
26 other signatures
2->72
7
EXCEL.EXE
58
57
2->7
started
11
taskeng.exe
1
2->11
started
process3
dnsIp4
62
198.12.89.27, 49160, 49161, 49162
AS-COLOCROSSINGUS
United States
7->62
48
hclupdationprocess...eformtheside[1].doc, ISO-8859
7->48
dropped
13
conhosts.exe
5
7->13
started
17
WINWORD.EXE
345
37
7->17
started
19
AcroRd32.exe
7->19
started
21
hYnJcpennYk.exe
11->21
started
file5
process6
file7
50
C:\Users\user\AppData\...\hYnJcpennYk.exe, PE32
13->50
dropped
52
C:\Users\user\AppData\Local\...\tmpBF78.tmp, XML
13->52
dropped
100
Multi AV Scanner detection
for dropped file
13->100
102
Contains functionality
to hide user accounts
13->102
104
Machine Learning detection
for dropped file
13->104
118
3 other signatures
13->118
23
RegSvcs.exe
3
6
13->23
started
27
RegSvcs.exe
13->27
started
29
powershell.exe
4
13->29
started
31
schtasks.exe
13->31
started
54
hclupdationprocess...formtheside.doC.url, MS
17->54
dropped
56
C:\Users\user\...\hcl on 198.12.89.27.url, MS
17->56
dropped
58
~WRF{485A984E-636D...5-470756A8CC30}.tmp, Composite
17->58
dropped
60
C:\Users\user\AppData\Local\...\4853220C.doc, ISO-8859
17->60
dropped
106
Microsoft Office launches
external ms-search protocol
handler (WebDAV)
17->106
108
Office viewer loads
remote template
17->108
110
Microsoft Office drops
suspicious files
17->110
33
EQNEDT32.EXE
12
17->33
started
36
RdrCEF.exe
19->36
started
112
Writes to foreign memory
regions
21->112
114
Allocates memory in
foreign processes
21->114
116
Adds a directory exclusion
to Windows Defender
21->116
38
powershell.exe
21->38
started
40
RegSvcs.exe
21->40
started
42
schtasks.exe
21->42
started
signatures8
process9
dnsIp10
64
wz-lk.giftsbybierd.com
44.203.203.154, 4434, 49167
AMAZON-AESUS
United States
23->64
74
Tries to steal Mail
credentials (via file
/ registry access)
23->74
76
Tries to harvest and
steal browser information
(history, passwords,
etc)
23->76
78
Increases the number
of concurrent connection
per server for Internet
Explorer
23->78
98
2 other signatures
23->98
80
Found evasive API chain
(may stop execution
after checking mutex)
27->80
82
Contains functionality
to inject threads in
other processes
27->82
84
Contains functionality
to steal Chrome passwords
or cookies
27->84
86
Contains functionality
to steal e-mail passwords
27->86
88
Installs new ROOT certificates
29->88
90
Powershell uses Background
Intelligent Transfer
Service (BITS)
29->90
44
C:\Users\user\AppData\Roaming\conhosts.exe, PE32
33->44
dropped
46
C:\Users\user\AppData\...\conhost[1].exe, PE32
33->46
dropped
92
Office equation editor
establishes network
connection
33->92
94
Office equation editor
starts processes (likely
CVE 2017-11882 or CVE-2018-0802)
33->94
96
Contains functionality
to hide user accounts
40->96
file11
signatures12
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.