Machine learning behavioral analysis detected malicious patterns
This is an obfuscated HTML-based threat detected by behavioral analysis. It leverages scripting (likely VBScript/JScript) to download and execute secondary malicious payloads, such as a JavaScript file, from a remote HTTP source, potentially using legitimate Windows binaries like `mshta.exe` or `regsvr32.exe` for execution and persistence.
Relevant strings associated with this threat:
- = CallByName(CreateObject(Dilnerc(" Wx Scx rix ptx. xSx hex xll ")), Dilnerc("Rx xun"), Frame1.Zoom - 99, Jilerdo, Frame1.Zoom - 99) (MACROHSTR_EXT)
- = Environ("USERPROFILE") & "\" & Application.Name (MACROHSTR_EXT)
- .Open "G" + "E" + "T", Url (MACROHSTR_EXT)
- .Run RUNCMD (MACROHSTR_EXT)
- C:\Pro (MACROHSTR_EXT)
- http:// (MACROHSTR_EXT)
- /24.gif (MACROHSTR_EXT)
- licen1 = "fl" + "st" + "udi" + "o" + ".j" + "s" (MACROHSTR_EXT)
- Set fso = CreateObject("Scripting.FileSystemObject") (MACROHSTR_EXT)
- Set fo = fso.CreateTextFile(licen1) (MACROHSTR_EXT)
- fo.WriteLine ignttext (MACROHSTR_EXT)
- = "try {WScript.Sleep(14000);var s = (MACROHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)Isolate the affected system immediately, perform a full antivirus scan, and remove all detected malicious files. Investigate for persistence mechanisms, network communication to observed URLs, and ensure all operating system and application software is fully patched and updated.