Analysis
-
max time kernel
21s -
max time network
60s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
14-06-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
globalCounter.hta
Resource
win7v20210408
Behavioral task
behavioral2
Sample
globalCounter.hta
Resource
win10v20210410
General
-
Target
globalCounter.hta
-
Size
2KB
-
MD5
a10cc5c493b3ebc1f075424e146e92f0
-
SHA1
1ccaa12aae57ee57c36db36d5eb315373bcadb6c
-
SHA256
3b5b0403702eb792bae7f736afdfb7474d83a1ee471c334e9988926d3cf420ae
-
SHA512
148c03979dedb4b24ca88dad4b0d4d7ea6409febd34921044fa37be016632bb0267c737ef2b0d3da317010f0a868ced277ec632868cd8810fdc80646260adcdd
Malware Config
Extracted
gozi_ifsb
6000
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 5 1248 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 344 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
mshta.exedescription pid process target process PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe PID 1248 wrote to memory of 344 1248 mshta.exe regsvr32.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\globalCounter.hta"1⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\users\public\globalCounter.jpg2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\c:\users\public\globalCounter.jpgMD5
3849a8c0cdebf6b8d360ba056e65b092
SHA18da10eedee90cc9e2c03946dbe31dd04d071ec62
SHA2567fee6aa3d700b17ea7eccbecb00be255ccedbd68575324d144a812f8cc3b29df
SHA51298d72188f30ba60f0295eced90f0d88af0b07d0805029daaf9669fcb04b06006ac73ebe0d7b91b7a68fe87cbb1ec7a4d8b17d1915f6257749206e88b71815127
-
\Users\Public\globalCounter.jpgMD5
3849a8c0cdebf6b8d360ba056e65b092
SHA18da10eedee90cc9e2c03946dbe31dd04d071ec62
SHA2567fee6aa3d700b17ea7eccbecb00be255ccedbd68575324d144a812f8cc3b29df
SHA51298d72188f30ba60f0295eced90f0d88af0b07d0805029daaf9669fcb04b06006ac73ebe0d7b91b7a68fe87cbb1ec7a4d8b17d1915f6257749206e88b71815127
-
memory/344-59-0x0000000000000000-mapping.dmp
-
memory/344-60-0x0000000076A01000-0x0000000076A03000-memory.dmpFilesize
8KB
-
memory/344-64-0x00000000732E0000-0x000000007338F000-memory.dmpFilesize
700KB
-
memory/344-63-0x00000000732E0000-0x00000000732ED000-memory.dmpFilesize
52KB
-
memory/344-65-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB