RTF Document Takes Advantage of CVE-2017-11882 Vulnerability   | VTI by Category
Try VMRay Analyzer
VTI Information
VTI Score
100 / 100
VTI Database Version 2.6
VTI Rule Match Count 36
VTI Rule Type Documents
Detected Threats
Arrow Anti Analysis
Arrow
Try to detect kernel debugger
Check via API "NtQuerySystemInformation".
Arrow
Illegitimate API usage
Internal API "CreateProcessInternalW" was used to start "C:\Windows\System32\cmmon32.exe".
Internal API "CreateProcessInternalW" was used to start "C:\Windows\System32\cmd.exe".
Internal API "CreateProcessInternalW" was used to start "C:\Program Files\Mozilla Firefox\Firefox.exe".
Arrow
Try to detect debugger
Check via API "NtQueryInformationProcess".
Arrow
Delay execution
One thread sleeps more than 5 minutes.
Arrow File System
Arrow
Modify operating system directory
Create file "\??\C:\Windows\SYSTEM32\ntdll.dll" in the OS directory.
Modify file "\??\C:\Windows\SYSTEM32\ntdll.dll" in the OS directory.
Create file "\??\C:\Windows\System32\cmmon32.exe" in the OS directory.
Modify file "\??\C:\Windows\System32\cmmon32.exe" in the OS directory.
Create file "\??\C:\Windows\System32\drivers\etc\hosts" in the OS directory.
Modify file "\??\C:\Windows\System32\drivers\etc\hosts" in the OS directory.
Arrow
Handle with malicious files
File "c:\users\bgc6u8oy yxgxkr\appdata\local\temp\lambdoidtegument.exe" is a known malicious file.
Arrow Injection
Arrow
Write into memory of another process
"c:\users\bgc6u8~1\appdata\local\temp\lambdoidtegument.exe" modifies memory of "c:\windows\explorer.exe"
Arrow
Modify control flow of another process
"c:\users\bgc6u8~1\appdata\local\temp\lambdoidtegument.exe" alters context of "c:\windows\explorer.exe"
Arrow Network
Arrow
Read network configuration
Read the current network configuration trough the host.conf file.
Arrow
TCP Server not available
Every TCP connection attempt failed.
Arrow
Download data
URL "doc2th.com/tin/off.exe".
Arrow
Perform DNS request
Resolve host name "doc2th.com".
Arrow
Connect to HTTP server
URL "doc2th.com/tin/off.exe".
Arrow PE
Arrow
Execute dropped PE file
Execute dropped file "c:\users\bgc6u8oy yxgxkr\appdata\local\temp\lambdoidtegument.exe".
Arrow
Drop PE file
Drop file "c:\users\bgc6u8oy yxgxkr\appdata\local\temp\lambdoidtegument.exe".
Arrow Persistence
Arrow
Install system startup script or application
Add "C:\Program Files\Crfitq6x\gdigzvh.exe" to windows startup via registry.
Arrow Process
Arrow
Create process
Create process "C:\Windows/system32/WindowsPowerShell/v1.0/powershell.exe".
Create process ""C:\Users\BGC6U8~1\AppData\Local\Temp\lambdoidtegument.exe"".
Create process "C:\Windows\System32\cmmon32.exe".
Create process "C:\Windows\System32\cmd.exe".
Create process "C:\Program Files\Mozilla Firefox\Firefox.exe".
Arrow
Read from memory of another process
"c:\windows\explorer.exe" reads from "C:\Windows\System32\cmmon32.exe".
"c:\users\bgc6u8~1\appdata\local\temp\lambdoidtegument.exe" reads from "c:\windows\explorer.exe".
"c:\windows\system32\cmmon32.exe" reads from "c:\windows\explorer.exe".
"c:\windows\system32\cmmon32.exe" reads from "C:\Program Files\Mozilla Firefox\Firefox.exe".
Arrow
Create system object
Create mutex with name "Local\!PrivacIE!SharedMemory!Mutex".
Create mutex with name "Global\.net clr networking".
Create nameless mutex.
Create mutex with name "664908S9UTEIZ6MN".
Create mutex with name "OLO0NDS-0AXWwKzG".
- Browser
- Device
- OS
- Hide Tracks
- Information Stealing
- Kernel
- Masquerade
- User
- VBA Macro
- YARA
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image