Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-01-2022 05:04
Static task
static1
General
-
Target
hta.hta
-
Size
3.6MB
-
MD5
3aeb3119d5782739c238aa5c216f706e
-
SHA1
68e8ce8c8a39660555661d7436d9081ec2454dfa
-
SHA256
12138c2aca3eaebf6c6b3f1b7b24c68ea5b9d29d4e88ed8412b46b5ce8feb2bb
-
SHA512
fe47a283d8ddd9782a7ac9e9f77c427dd528fd3e8536c3a9e32c147313df326e256f8660c6633621b7282928bd02fa2cc7019cef2030ce4c09dd551e503ea4df
Malware Config
Extracted
bitrat
1.38
learnatallcost2.ddns.net:9050
-
communication_password
4a3e00961a08879c34f91ca0070ea2f5
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2736-249-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2736-250-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2736-251-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
aspnet_compiler.exepid process 2736 aspnet_compiler.exe 2736 aspnet_compiler.exe 2736 aspnet_compiler.exe 2736 aspnet_compiler.exe 2736 aspnet_compiler.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3760 set thread context of 2736 3760 powershell.exe aspnet_compiler.exe -
NTFS ADS 2 IoCs
Processes:
aspnet_compiler.exedescription ioc process File created C:\Users\Admin\AppData\Local:20-01-2022 aspnet_compiler.exe File opened for modification C:\Users\Admin\AppData\Local:20-01-2022 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exepid process 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe 3760 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cmd.exepid process 2208 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 3760 powershell.exe Token: SeShutdownPrivilege 2736 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aspnet_compiler.exepid process 2736 aspnet_compiler.exe 2736 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
powershell.execmd.exepowershell.exedescription pid process target process PID 1648 wrote to memory of 2208 1648 powershell.exe cmd.exe PID 1648 wrote to memory of 2208 1648 powershell.exe cmd.exe PID 2208 wrote to memory of 2936 2208 cmd.exe mshta.exe PID 2208 wrote to memory of 2936 2208 cmd.exe mshta.exe PID 2208 wrote to memory of 3760 2208 cmd.exe powershell.exe PID 2208 wrote to memory of 3760 2208 cmd.exe powershell.exe PID 3760 wrote to memory of 1020 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 1020 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 1020 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3768 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3768 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3768 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3112 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3112 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3112 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3692 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3692 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 3692 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe PID 3760 wrote to memory of 2736 3760 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\hta.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mshta.exemshta hta.hta3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -ep unrestricted3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ea6243fdb2bfcca2211884b0a21a0afc
SHA12eee5232ca6acc33c3e7de03900e890f4adf0f2f
SHA2565bc7d9831ea72687c5458cae6ae4eb7ab92975334861e08065242e689c1a1ba8
SHA512189db6779483e5be80331b2b64e17b328ead5e750482086f3fe4baae315d47d207d88082b323a6eb777f2f47e29cac40f37dda1400462322255849cbcc973940
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveMD5
f93bd7d721758b9a4f242b4643201bb8
SHA1f418c2a282f3f5428cdb7c9d35cca502b21aac4a
SHA25648fed95ae39b31ffcdb9323cf9eb4cf2a7cbbf51773a46625365942b908866dd
SHA5128b0e2bfd98a11b7944ea2a47f9d85166e85fc04970460191f761d7e0e5c079806ebcfd7ecc774ef1cb293f504a916fdbac9722b728f79b88c6ea1ce9ea9a75a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txtMD5
67d41d568f596bcfe6911791c277d91c
SHA17ee59fe79785fe80ca3ff7bb763c9877e88a4480
SHA2568877f6d59b190961cfc6af69df0c8a8278efd2bd7c1d89a094781475140adb98
SHA5128b4b0f2f2511b1ec8f0255746e3662a778bd050a19803732bdd2ed71d5709b2c153a6c65884f86e6973422d9b207dd141868fe35f51871baf26c7661a40fb1c6
-
memory/1648-185-0x0000022A48C68000-0x0000022A48C69000-memory.dmpFilesize
4KB
-
memory/1648-152-0x0000022A49B40000-0x0000022A49BB6000-memory.dmpFilesize
472KB
-
memory/1648-184-0x0000022A48C66000-0x0000022A48C68000-memory.dmpFilesize
8KB
-
memory/1648-141-0x0000022A495F0000-0x0000022A4962C000-memory.dmpFilesize
240KB
-
memory/1648-120-0x0000022A48C60000-0x0000022A48C62000-memory.dmpFilesize
8KB
-
memory/1648-121-0x0000022A48C63000-0x0000022A48C65000-memory.dmpFilesize
8KB
-
memory/1648-119-0x0000022A48B30000-0x0000022A48B52000-memory.dmpFilesize
136KB
-
memory/2736-249-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2736-251-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2736-250-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/3760-197-0x0000028B3E330000-0x0000028B3E332000-memory.dmpFilesize
8KB
-
memory/3760-240-0x0000028B3E320000-0x0000028B3E32E000-memory.dmpFilesize
56KB
-
memory/3760-239-0x0000028B3E336000-0x0000028B3E338000-memory.dmpFilesize
8KB
-
memory/3760-199-0x0000028B3E333000-0x0000028B3E335000-memory.dmpFilesize
8KB