๐Ÿšจ Control-Flow Flattening Obfuscated #JavaScript Drops #Remcos.
โš ๏ธ The observed JS contains multiple self-invoking functions that loop arrays of strings and numbers in a while(!![]) loop until a calculated checksum matches a predefined value. This #obfuscation technique forces static analyzers to parse through the array content instead of returning the required string directly.

๐ŸŽฏ #ANYRUNโ€™s Script Tracer enables easy analysis of heavily obfuscated scripts by logging their execution in real time, with no need for manual deobfuscation.

๐Ÿ”— Execution chain:
#Wscript (JavaScript) โžก๏ธ PowerShell โžก๏ธ MSBuild (Remcos ๐Ÿšจ)

๐Ÿ‘จโ€๐Ÿ’ป See analysis session: https://app.any.run/tasks/eaef10ea-3567-4284-b87e-a3a0aedc5f83/?utm_source=mastodon&utm_medium=post&utm_campaign=obfuscated_js_drops_remcos&utm_term=110625&utm_content=linktoservice

This script invokes #PowerShell using ActiveXObject("http://WScript.Shell") with parameters and executes the following:
๐Ÿ”น Creates a http://System.Net.WebClient object
๐Ÿ”น Specifies the URL to download the binary
๐Ÿ”น Downloads the binary data and passes it to #MSBuild

โš ๏ธ As a result, the script downloads and executes the Remcos #malware module.

๐Ÿ‘จโ€๐Ÿ’ป Observe obfuscated loaders, explore execution flows, and extract behavioral indicators in real time. Improve your security operations with #ANYRUN Sandbox.

๐Ÿšจ New #Stegocampaign abuses obfuscated registry to execute payload
The attack is carried out through users following instructions, such as downloading a REG file that adds a #malicious script to Autorun. While exploiting Autorun has been rarely used recently, we found a sample actively using this method.

๐Ÿ”— Execution chain:
PDF โžก๏ธ Phish link โžก๏ธ REG file adds a script to Autorun โžก๏ธ OS reboot โžก๏ธ CMD โžก๏ธ PowerShell โžก๏ธ #Wscript โžก๏ธ Stegocampaign payload (DLL) extraction โžก๏ธ Malware extraction and injection into AddInProcess32 โžก๏ธ XWorm

โš ๏ธ Victims receive a phishing PDF containing a link to download a .REG file. By opening it, users unknowingly modify the registry with a #script that fetches a VBS file from the web and adds it to Autorun.

Upon system reboot, the #VBS file launches #PowerShell, triggering an execution chain that ultimately infects the operating system with #malware.

๐Ÿ‘พ Then, #ReverseLoader downloads #XWorm, initiating its execution. The payload contains a DLL file embedded in an image, which then extracts XWorm from its resources and injects it into the AddInProcess32 system process.

โ—๏ธ This chain of actions abuses legitimate system tools and relies on user actions, making it difficult for automated security solutions to detect.
This puts organizations at risk by allowing attackers to evade detection, potentially leading to data breaches and access to sensitive data. #ANYRUN Sandbox offers full control over the VM, which allows you to interact with malware and manipulate its behavior.

๐Ÿ‘จโ€๐Ÿ’ป See analysis with a reboot:
https://app.any.run/tasks/068db7e4-6ff2-439a-bee8-06efa7abfabc/?utm_source=mastodon&utm_medium=post&utm_campaign=stegocampaign&utm_term=190225&utm_content=linktoservice

๐Ÿš€ #ANYRUN's interactive VMs let users manually execute each step of the entire attack chain, even without a system reboot:
https://app.any.run/tasks/f9f07ae8-343f-4ea5-9499-a18f7c8534ef/?utm_source=mastodon&utm_medium=post&utm_campaign=stegocampaign&utm_term=190225&utm_content=linktoservice

๐Ÿ” Use this TI Lookup search query to find similar samples to enrich your company's detection systems:
https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=stegocampaign&utm_content=linktoti&utm_term=190225#%7B%22query%22:%22domainName:%5C%22filemail.com$%5C%22%22,%22dateRange%22:180%7D

Analyze and investigate the latest malware and phishing threats with #ANYRUN ๐Ÿ›ก๏ธ

#cybersecurity #infosec

Analysis package_photo.pdf (MD5: 3D89F1BCC3873D106F138F35A9B1D3C6) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

The Curious Case of QUEENCREEK

Discover the mysterious QUEENCREEK autorun entry in Windows. Is it a hidden threat or something else? Let's find out.

Mo Beigi | Software Engineer
ๆŠŠๆช”ๆกˆๆ‹–ๆ›ณๅˆฐๅŸท่กŒๆช”ไธŠ๏ผŒ็ด„็ญ‰ๆ–ผๅ‘ผๅซๅŸท่กŒๆช”ไธฆๆŠŠๆ‹–ๆ”พ็š„ๆช”ๆกˆ่ทฏๅพ‘็•ถไฝœๅƒๆ•ธๅ‚ณๅ…ฅใ€‚ๅŽŸไพ† #windows ้‚„ๆœ‰้€™็จฎๆ–นไพฟ็š„ๅŠŸ่ƒฝ๏ผŒ #wscript ๅˆๆœ‰ๆ›ดๅคšๆฑ่ฅฟๅฏไปฅ็Žฉไบ†ใ€‚
https://stackoverflow.com/questions/42057121/current-working-directory-in-a-vbscript-invoked-by-a-drag-drop-operation
current working directory in a vbscript invoked by a drag & drop operation

When I was trying to get elevated rights for my batch script, when I found two related SO questions How to request Administrator access inside a batch file How can I auto-elevate my batch file, so...

Stack Overflow