Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2024, 08:04

General

  • Target

    bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta

  • Size

    70KB

  • MD5

    4b4622857d5a8049c8eabc65cbbf9759

  • SHA1

    3c0b1087394f1584a53ae19a60eeee26adf5323a

  • SHA256

    bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234

  • SHA512

    bd4e13fc189cff886ac5097814fb35145d897c8f3626df93ba1413fdb38117d3df48152fa099c3bfb4852760425bb97f07aa6020e61331580c7780604285cf9e

  • SSDEEP

    1536:qzp24Z02CaLYQZ3h+3vsA7gI8GLRMsQMIF9AbR0F:ErZFJYYx+fsAD8qqsQMIFKC

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 6 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 4 IoCs

    Payload decoded via CertUtil.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & findstr /b "a2ZneGw7" "C:\Users\Admin\AppData\Local\Temp\bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta">1.log & certutil -decode -f 1.log password.txt & del 1.log && password.txt
      2⤵
      • Checks computer location settings
      • Deobfuscate/Decode Files or Information
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Windows\SysWOW64\findstr.exe
        findstr /b "a2ZneGw7" "C:\Users\Admin\AppData\Local\Temp\bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2508
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode -f 1.log password.txt
        3⤵
        • Manipulates Digital Signatures
        • Deobfuscate/Decode Files or Information
        • System Location Discovery: System Language Discovery
        PID:4440
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\password.txt
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local & findstr /b "TVqQAAMAAA" "C:\Users\Admin\AppData\Local\Temp\bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta">1.log & certutil -decode -f 1.log netserv32.dll & del 1.log & rundll32 netserv32.dll,MainWork
      2⤵
      • Deobfuscate/Decode Files or Information
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\SysWOW64\findstr.exe
        findstr /b "TVqQAAMAAA" "C:\Users\Admin\AppData\Local\Temp\bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2956
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode -f 1.log netserv32.dll
        3⤵
        • Manipulates Digital Signatures
        • Deobfuscate/Decode Files or Information
        • System Location Discovery: System Language Discovery
        PID:2692
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 netserv32.dll,MainWork
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\system32\rundll32.exe
          rundll32 netserv32.dll,MainWork
          4⤵
          • Blocklisted process makes network request
          • Looks for VMWare Tools registry key
          • Loads dropped DLL
          • Accesses Microsoft Outlook accounts
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -w hidden Compress-Archive -CompressionLevel Optimal -Path "C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp" "C:\Users\Admin\AppData\Local\micro.log.zip"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2888
          • C:\Windows\system32\cmd.exe
            cmd.exe /c dir C:\Users\Admin\*.hwp C:\Users\Admin\*.pdf C:\Users\Admin\*.doc C:\Users\Admin\*.docx C:\Users\Admin\*.xls C:\Users\Admin\*.xlsx C:\Users\Admin\*.zip C:\Users\Admin\*.rar C:\Users\Admin\*.egg C:\Users\Admin\*.txt C:\Users\Admin\*.jpg C:\Users\Admin\*.png C:\Users\Admin\*.jpeg C:\Users\Admin\*.alz /s >> "c:\users\admin\appdata\local\netlist.log"
            5⤵
              PID:3836
            • C:\Windows\system32\cmd.exe
              cmd.exe /c dir C:\Users\Admin\*wallet* C:\Users\Admin\UTC--* /s >> "c:\users\admin\appdata\local\netlist.log"
              5⤵
                PID:4940
              • C:\Windows\system32\cmd.exe
                cmd.exe /c dir d:\*.hwp d:\*.pdf d:\*.doc d:\*.docx d:\*.xls d:\*.xlsx d:\*.zip d:\*.rar d:\*.egg d:\*.txt d:\*.jpg d:\*.png d:\*.jpeg d:\*.alz /s >> "c:\users\admin\appdata\local\netlist.log"
                5⤵
                  PID:2960
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c dir d:\*wallet* d:\UTC--* /s >> "c:\users\admin\appdata\local\netlist.log"
                  5⤵
                    PID:4864
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c dir f:\*.hwp f:\*.pdf f:\*.doc f:\*.docx f:\*.xls f:\*.xlsx f:\*.zip f:\*.rar f:\*.egg f:\*.txt f:\*.jpg f:\*.png f:\*.jpeg f:\*.alz /s >> "c:\users\admin\appdata\local\netlist.log"
                    5⤵
                      PID:2028
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /c dir f:\*wallet* f:\UTC--* /s >> "c:\users\admin\appdata\local\netlist.log"
                      5⤵
                        PID:752

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\1.log

                      Filesize

                      59KB

                      MD5

                      71593a662d03e58b27b29ab199a6d7b5

                      SHA1

                      d24e55399d35ac3a25f1b6a8d3bdd0e3e37db5d2

                      SHA256

                      e6da91d2fc4d3029e3915e9f7fc9586bf76f8ee024082c05ee4e5bf0f174c237

                      SHA512

                      c8005c9131b575f15ccd8bcde0fe66f820fff8b4c54800fdcaf814c1aede5f98343854276c301210c0935bf2669f925eafc2ecd15ff88496ededd918bfca3b07

                    • C:\Users\Admin\AppData\Local\Temp\1.log

                      Filesize

                      22B

                      MD5

                      2ac7510166832b4a6e4344f37d944578

                      SHA1

                      c766dd5112d72620614842d4bf0e986c34c5a2d0

                      SHA256

                      09e4c6d57fbf21a95fab469149ac50d73ee046f2bc2e57b6565eb0e9adf9e1ad

                      SHA512

                      ecb5c29e8e1d81b914b1d4c3e2787cf2b78d5707473f368aa48df6af1b7235adac5f96ccd43cfc0501f93640b52dd4b06905c889ffd0e9b7c989e150c89e521a

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rgnp30tx.ord.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\cc_Default_Cookies

                      Filesize

                      20KB

                      MD5

                      6e86b6f358f5d778881937294b43ac24

                      SHA1

                      0b0de45f33ab9ee86fef84756bb7c5be8320702d

                      SHA256

                      19ed915b2701b0b3c5353db7dd045c126145584368bbdc33f3b9462280bf53fa

                      SHA512

                      dc524cfaf9c652f4ffb26feaa15b7ff60cc0b63ec70d3d7539b6472af70807b70a74378cb178fca4c54d9806249477dcaf5bde909f150b031f8907a8edd45726

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\cc_Default_Login Data

                      Filesize

                      40KB

                      MD5

                      a182561a527f929489bf4b8f74f65cd7

                      SHA1

                      8cd6866594759711ea1836e86a5b7ca64ee8911f

                      SHA256

                      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                      SHA512

                      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\cc_Default_Web Data

                      Filesize

                      114KB

                      MD5

                      ab87d892a202f83f7e925c5e294069e8

                      SHA1

                      0b86361ff41417a38ce3f5b5250bb6ecd166a6a1

                      SHA256

                      bdc61a1c60fe8c08fe7a5256e9c8d7ad1ba4dd0963a54357c484256fc8834130

                      SHA512

                      f9a03eaae52d7fb544047fea3ffa7d8c6f7debdbb907348adfc46545e7b6c3783427983f16885ae138e43e51eec6ce73520c38581e4d9bb7140beeae2137de41

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\cc_key

                      Filesize

                      64B

                      MD5

                      f470520743c3b6a01a4d7a0affbef2a4

                      SHA1

                      4318fb899fe1f21dfa6238ad25bcd2c3ec530d6b

                      SHA256

                      7d6fb14e76439291eb51c2c4df36cad871f430c94eabdff9759b5e094999b2ae

                      SHA512

                      981cfc2557a3d0016a996ff00ba1a73ab054543e01b1ec8856df5d4e683bbc7001d1925a9ff42b60d5cd3765d3316044ae73b51ce8b605d85820904c2bad317b

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\ee_Default_Cookies

                      Filesize

                      20KB

                      MD5

                      49693267e0adbcd119f9f5e02adf3a80

                      SHA1

                      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                      SHA256

                      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                      SHA512

                      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\ee_Default_Login Data

                      Filesize

                      48KB

                      MD5

                      349e6eb110e34a08924d92f6b334801d

                      SHA1

                      bdfb289daff51890cc71697b6322aa4b35ec9169

                      SHA256

                      c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                      SHA512

                      2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\ee_Default_Web Data

                      Filesize

                      116KB

                      MD5

                      f70aa3fa04f0536280f872ad17973c3d

                      SHA1

                      50a7b889329a92de1b272d0ecf5fce87395d3123

                      SHA256

                      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                      SHA512

                      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                    • C:\Users\Admin\AppData\Local\Temp\nsv7CB3.tmp\ee_key

                      Filesize

                      64B

                      MD5

                      ab65b1a23524d73575e80dcbcf4b58b4

                      SHA1

                      eacf19cbda987f244512aba07376f4b10e6bbfa5

                      SHA256

                      d1791ebbb7a4954bbfd0a25226f1e2eac0a0d259b2a05eaa7cec64055b7f73e7

                      SHA512

                      8f3ba48bb83d1a0f42c9c546635b4128addc41d605cd9ed0f3ef5af6672452aad16651742755fded03f6439265738189d11f7405a62d790e5260a427de11df1f

                    • C:\Users\Admin\AppData\Local\Temp\password.txt

                      Filesize

                      14B

                      MD5

                      6a0e721cb89a06736206b91af92239cd

                      SHA1

                      bb87db8bbcb512a584c45c80504fc21a0a972b3a

                      SHA256

                      a5a56f7eed7db360188ca88386bed5c84a8146b99ece4e68a3abfdbb5f091015

                      SHA512

                      c9921cafd2a284c3bc32b845685e25f03bc9fbaa380dbecbe8bfd9ec4992d5cf4a832e462cf097bcbc12f1ae3b00a0c8e7688be373aede81a9bd331d400b6a0c

                    • C:\Users\Admin\AppData\Local\micro.log

                      Filesize

                      7KB

                      MD5

                      311a2c063514a94a873bf8c7486547d8

                      SHA1

                      69305cc09546c3a0230d3d1ba87620766a442399

                      SHA256

                      eb83ccc9c9a14d52b8115f7e1da82097968cc8a5082f4031ccd0306538e42317

                      SHA512

                      26d76d75f1d4cd9113e7eb8e2681f0b5ecdbad336e5e50569acbf80b13b79b65e07f8a1a7afe489a27e49c9d94e45c93727b5e7e7bd1a3b9e8b702203bd4fccd

                    • C:\Users\Admin\AppData\Local\micro.log.zip

                      Filesize

                      16KB

                      MD5

                      149b2845d7cf4b695ad3a39975e216fc

                      SHA1

                      8137272305952a0d769349b1f70dcc4b1a7e43d1

                      SHA256

                      d81d7ef894a6b2d3386401f3842d0e403c01b2685a93eb815c2a78af1ff3b2d1

                      SHA512

                      5623d4a58f2064a8cb39d24722f3134219e551c93a2517eb8860750002f1df528f55849b078061c6a70ad34bf5d79afaad0af4e84e5b2ebfa65f438697a5c46f

                    • C:\Users\Admin\AppData\Local\net

                      Filesize

                      478KB

                      MD5

                      de9438683614ccf3f0316139418985a9

                      SHA1

                      dcbbfb18c16f4bf9025233e6ecf42be64c33932d

                      SHA256

                      d5ec8265369b5f52a14b039c1f9495a343a9755a89b0c48db5983c94d140f18b

                      SHA512

                      925a919ecbe169adc2ebb10b9f93cc33ab5ba44794d3fccd0d7f2faa49c8a35b46e3c6779d0e357122433461bf48fc4af2f9571fae0aa11fd85c9dcc26a47470

                    • C:\Users\Admin\AppData\Local\netserv32.dll

                      Filesize

                      44KB

                      MD5

                      56d4fcfa7eb3a84740081264c5c0f10a

                      SHA1

                      06edf5464d2cfe1a75f3600c9039eabab97248bd

                      SHA256

                      5a18a29791cfb18767a43bebb61f923e64be7988235213678514007174f60b3e

                      SHA512

                      df622d9aebc8b9367219777216ba7e21942974e048fa40233fb17d17a85d940f8301ab4c605703cfa4b9ffdc61f2095b2a96b6256d017b445e40e94aedfd8609

                    • C:\Users\Admin\AppData\Local\notepad.log

                      Filesize

                      139KB

                      MD5

                      6199c9d0ad1df4105c85ae041e833a0e

                      SHA1

                      c9016a4bcd8bd2ea646dfa86e2c9c59cd9f50fd1

                      SHA256

                      c45b1bb615385f2b2b2c1bfb29646a89ef9beb9c4f00cbb5f16c02171c61bcf4

                      SHA512

                      b2b972ba63cfb93c6b59634ecf5f8ffda04c74ba9ee86dbd8fefea43ff408f86718a75a0e9282ba5fe122cb3079511847c6775393e1e2d5c556ec3e8ab599de3

                    • \??\c:\users\admin\appdata\local\netlist.log

                      Filesize

                      17KB

                      MD5

                      f3b90ce6c87b9de5edcdac1ac9b4c36f

                      SHA1

                      d41bcfeb2877e2520940820d17d690fef51b9b96

                      SHA256

                      385710e0b834abd20940156db5008e1657fcaaef344c143366a5252383531019

                      SHA512

                      72ee5fe1070078ff1b786a61ea3986bd5119a98d78f533727a1a39b78cd8d77edd456c8a47ab3b469b4b3c2c6f7bfccd18a4195289d47a191051cf6a743b9c2c

                    • \??\c:\users\admin\appdata\local\netlist.log

                      Filesize

                      17KB

                      MD5

                      4557beea354d237448c61e02a2c7bd17

                      SHA1

                      877ba42bb43b02936d59ece114ed3ff33e906d96

                      SHA256

                      a725edb0ddde5d58c2206ef49009b3349935e0cd4cab37a3a3bc5c714afe9eff

                      SHA512

                      80f0f55b8108ba7efa7245e6a89f6a62c863626cc18d8b8c6b462f14e23816af5f2161366d2e8bc5542df6382658fdabaa17ed0b2bc39d9216e982acc2356421

                    • \??\c:\users\admin\appdata\local\netlist.log

                      Filesize

                      17KB

                      MD5

                      8f173962e10757f55ee5fb261e380f57

                      SHA1

                      4866b8eaf8820f3538b482b5dc8940426fc4cfa1

                      SHA256

                      af4e210293aad43094841bdaeb2cba8fd4efc8daf6f447acfc0d2851bb92673e

                      SHA512

                      be0eec3fa227dab33ab3a910fd9b89736f527533102f4c3e1012bf1dffc11e1d8df9c84a8d960c78271f3e2c0b0519c4d51128bfc3eafec6df85126c5617a2cf

                    • memory/1384-22-0x0000000180000000-0x0000000180127000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/1384-71-0x0000000180000000-0x0000000180032000-memory.dmp

                      Filesize

                      200KB

                    • memory/1384-21-0x0000000180000000-0x0000000180127000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/1384-93-0x00007FFBF5DB0000-0x00007FFBF5DCF000-memory.dmp

                      Filesize

                      124KB

                    • memory/1384-18-0x0000000180000000-0x0000000180127000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/1384-11-0x00007FFBF5DB0000-0x00007FFBF5DCF000-memory.dmp

                      Filesize

                      124KB

                    • memory/1384-118-0x00007FFBF5DB0000-0x00007FFBF5DCF000-memory.dmp

                      Filesize

                      124KB

                    • memory/1384-119-0x00007FFBF5DB0000-0x00007FFBF5DCF000-memory.dmp

                      Filesize

                      124KB

                    • memory/1652-91-0x00000000003B0000-0x00000000003CF000-memory.dmp

                      Filesize

                      124KB

                    • memory/1652-9-0x00000000003B0000-0x00000000003CF000-memory.dmp

                      Filesize

                      124KB

                    • memory/2888-51-0x0000014DE9560000-0x0000014DE956A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2888-50-0x0000014DEB940000-0x0000014DEB952000-memory.dmp

                      Filesize

                      72KB

                    • memory/2888-40-0x0000014DE9410000-0x0000014DE9432000-memory.dmp

                      Filesize

                      136KB