Click to jump to signature section
Source: https://president-gov-lk.donwloaded.net/a4884a53/file.rtf | Avira URL Cloud: Label: malware |
Source: PyrNUtAUkw.docx | ReversingLabs: Detection: 44% |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll | Jump to behavior |
Source: unknown | HTTPS traffic detected: 15.197.130.221:443 -> 192.168.2.22:49163 version: TLS 1.2 |
Source: global traffic | DNS query: name: president-gov-lk.donwloaded.net |
Source: global traffic | DNS query: name: president-gov-lk.donwloaded.net |
Source: global traffic | DNS query: name: president-gov-lk.donwloaded.net |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49163 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 15.197.130.221:443 -> 192.168.2.22:49164 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: Network traffic | Suricata IDS: 2055106 - Severity 1 - ET MALWARE TA399 SideWinder APT CnC Domain in DNS Lookup (president-gov-lk .donwloaded .net) : 192.168.2.22:54562 -> 8.8.8.8:53 |
Source: Network traffic | Suricata IDS: 2055136 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (president-gov-lk .donwloaded .net in TLS SNI) : 192.168.2.22:49163 -> 15.197.130.221:443 |
Source: Network traffic | Suricata IDS: 2055136 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (president-gov-lk .donwloaded .net in TLS SNI) : 192.168.2.22:49164 -> 15.197.130.221:443 |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | DNS query: president-gov-lk.donwloaded.net is down |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | DNS query: president-gov-lk.donwloaded.net is down |
Source: Joe Sandbox View | IP Address: 15.197.130.221 15.197.130.221 |
Source: Joe Sandbox View | ASN Name: TANDEMUS TANDEMUS |
Source: Joe Sandbox View | JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FF002987-24C9-4E73-9229-2CB3F164EF0B}.tmp | Jump to behavior |
Source: global traffic | DNS traffic detected: DNS query: president-gov-lk.donwloaded.net |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenAlt-Svc: h3=":50559"; ma=2592000Content-Length: 146Content-Type: text/htmlDate: Fri, 13 Dec 2024 14:34:16 GMTServer: CaddyServer: nginxConnection: close |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenAlt-Svc: h3=":50559"; ma=2592000Content-Length: 146Content-Type: text/htmlDate: Fri, 13 Dec 2024 14:34:18 GMTServer: CaddyServer: nginxConnection: close |
Source: ~WRS{7AD94162-947F-4B76-A1FE-64233B9775A4}.tmp.0.dr | String found in binary or memory: https://president-gov-lk.donwloaded.net/a4884a53/file.rtf |
Source: unknown | Network traffic detected: HTTP traffic on port 49163 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49164 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49164 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49163 |
Source: unknown | HTTPS traffic detected: 15.197.130.221:443 -> 192.168.2.22:49163 version: TLS 1.2 |
Source: _rels\document.xml.rels, type: SAMPLE | Matched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen |
Source: _rels\document.xml.rels, type: SAMPLE | Matched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents |
Source: classification engine | Classification label: mal80.troj.evad.winDOCX@1/15@3/1 |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File created: C:\Users\user\Desktop\~$rNUtAUkw.docx | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File created: C:\Users\user\AppData\Local\Temp\CVR847A.tmp | Jump to behavior |
Source: msoA94A.tmp.0.dr | OLE indicator, Word Document stream: true |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File read: C:\Users\desktop.ini | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA | Jump to behavior |
Source: PyrNUtAUkw.docx | ReversingLabs: Detection: 44% |
Source: PyrNUtAUkw.LNK.0.dr | LNK file: ..\..\..\..\..\Desktop\PyrNUtAUkw.docx |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image8.png |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image6.jpeg |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image9.png |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = docProps/custom.xml |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image1.jpg |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image10.png |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image11.png |
Source: msoA94A.tmp.0.dr | Initial sample: OLE zip file path = word/media/image2.jpg |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems | Jump to behavior |
Source: PyrNUtAUkw.docx | Static file information: File size 1651194 > 1048576 |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll | Jump to behavior |
Source: msoA94A.tmp.0.dr | Initial sample: OLE indicators vbamacros = False |
Source: _rels\document.xml.rels | Extracted files from sample: https://president-gov-lk.donwloaded.net/a4884a53/file.rtf |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |