Resubmissions

19-08-2021 15:28

210819-qvpqyzvlrs 10

22-07-2021 08:22

210722-68kbddkzna 10

Analysis

  • max time kernel
    1441s
  • max time network
    1471s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    19-08-2021 15:28

General

  • Target

    1.hta

  • Size

    2KB

  • MD5

    c5f48abc68324cd059e74b35c44b64c7

  • SHA1

    e68b086934eb0d4576ac3711062efba4236df436

  • SHA256

    9a3c69a9e5f02c1e3022586c5ffe3e9dca7224f4c5107ce1f758eae62f747576

  • SHA512

    271dedd705ed5a64cda497d0b86cd1509f34911602aac65cbc8a5120ef37efccc2ec8d45538cec29e1bbb5aa5fb5d76aa0a3502e00208e0c4067d4dd9b465d21

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\1.hta"
    1⤵
    • Blocklisted process makes network request
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" c:\users\public\simpleAndAnd.jpg
      2⤵
        PID:1480

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1480-60-0x0000000000000000-mapping.dmp
    • memory/1480-61-0x0000000076E11000-0x0000000076E13000-memory.dmp
      Filesize

      8KB

    • memory/1480-62-0x00000000001F0000-0x00000000001F1000-memory.dmp
      Filesize

      4KB