Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-12-2021 19:16
Static task
static1
Behavioral task
behavioral1
Sample
youTube.hta
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
youTube.hta
Resource
win10-en-20211014
General
-
Target
youTube.hta
-
Size
3KB
-
MD5
55d9eab53d4063a53b6ed05f7b1e75e7
-
SHA1
e6b4c81676d3ef0d2f7d08a6cc2ad90eb54908c3
-
SHA256
c7f40608ce8a3dda25c13d117790d08ef757b07b8c2ccb645a27a71adc322fb2
-
SHA512
e90768d87c7b191d41d3944957725db0e1f29fa865e24fd7308656fc9249ca0a5d1bd0abeda3bbc68528efc0ce6bc3a79eb434c375fd5c6ec90455c6e19a74f9
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 13 2704 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
mshta.exedescription pid process target process PID 2704 wrote to memory of 1528 2704 mshta.exe regsvr32.exe PID 2704 wrote to memory of 1528 2704 mshta.exe regsvr32.exe PID 2704 wrote to memory of 1528 2704 mshta.exe regsvr32.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\youTube.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\users\public\dowNext.jpg2⤵PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b5ff4c0f214fdf079ae6d835f046b7c5
SHA1fc1f09a696c92d366e4868a35a5afa79129b12be
SHA256aaf04ecb4c67de5a7833184f5abeec5f48a2fc17bb8167637a421596e00c7e4c
SHA5125dcfa31dd1a704ae698673763a2c3e96f0c7e70d06d4790033b6eccaff7e6a55d7d4f2913649915e1ad430e4fa9c68143d82a95a38c2b0bc315ad91099aeab3a