General Information

  • Date:29.05.2019
  • Duration:0h 2m 17s
  • Sample file name:ATTACHMENT 654860 I32560.doc
  • Cookbook:defaultwindowsofficecookbook.jbs
  • Icon:
  • Filetype:doc

Detection

MALICIOUS
    • Found 18 malicious signatures
    • Contacts 5 domains/IPs
    • Launches 6 processes
    • Drops 20 files

Signature Overview

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Contacted IPs

    Public

    IP Country Flag ASN ASN Name Malicious
    31.12.67.62
    Belgium
    44099 unknown true
    158.69.127.22
    Canada
    16276 unknown true
    68.183.65.234
    United States
    14061 unknown false

    Contacted Domains

    Name IP Active
    ceo.calcus.com 68.183.65.234 true
    lastminutelollipop.com 158.69.127.22 true

    Contacted URLs

    Name Malicious Antivirus Detection Reputation
    http://lastminutelollipop.com/wp-admin/aEQlppdlfo/ true
    • 12%, virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://31.12.67.62:7080/badge/results/ true
    • Avira URL Cloud: safe
    unknown
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 136644 Sample: ATTACHMENT 654860 I32560.doc Startdate: 29/05/2019 Architecture: WINDOWS Score: 100 41 Multi AV Scanner detection for domain / URL 2->41 43 Antivirus or Machine Learning detection for sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 8 other signatures 2->47 7 powershell.exe 12 8 2->7         started        12 watsonbegin.exe 2->12         started        14 WINWORD.EXE 11 48 2->14         started        process3 dnsIp4 29 lastminutelollipop.com 158.69.127.22, 49222, 80 unknown Canada 7->29 31 ceo.calcus.com 68.183.65.234, 80 unknown United States 7->31 25 C:\Users\user\936.exe, PE32 7->25 dropped 51 Drops PE files to the user root directory 7->51 53 Powershell drops PE file 7->53 16 936.exe 7->16         started        55 Found evasive API chain (may stop execution after checking mutex) 12->55 57 Drops executables to the windows directory (C:\Windows) and starts them 12->57 19 watsonbegin.exe 2 9 12->19         started        file5 signatures6 process7 dnsIp8 33 Antivirus or Machine Learning detection for dropped file 16->33 35 Multi AV Scanner detection for dropped file 16->35 37 Found evasive API chain (may stop execution after checking mutex) 16->37 22 936.exe 1 16->22         started        27 31.12.67.62, 49223, 7080 unknown Belgium 19->27 signatures9 39 Detected TCP or UDP traffic on non-standard ports 27->39 process10 signatures11 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->49