Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2023 20:16

General

  • Target

    ThinkBiosConfig.hta

  • Size

    84KB

  • MD5

    3c275ebe4a3e5bcfad51fb7796799ef4

  • SHA1

    36dad4037e2a59e07154960f267db7410a27cf99

  • SHA256

    df398af7add8f840adcc8071d49afdea1f6347ffc53906831462eaeafe47f0af

  • SHA512

    7897f54e5c1bdc700b9c1f0f898b3db4fc498eb6310b9f105e9e0835da9464947bab4d70e0c2959838c759c3997f7dacbec221518b4dabe1f423132682a7f405

  • SSDEEP

    1536:7kYYy65HHk/QpopBpPirbPN31DiK7dV/FwneFfm7el:wYY7HHk/QpopBpPirbPN31DiK7dV/uel

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\ThinkBiosConfig.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\whoami.exe
      whoami /groups
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3180
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:1740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:82946 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2696
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:740
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2216
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3724

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\analytics[1].js

        Filesize

        49KB

        MD5

        54e51056211dda674100cc5b323a58ad

        SHA1

        26dc5034cb6c7f3bbe061edd37c7fc6006cb835b

        SHA256

        5971b095cff574a66d35ada016d4c077c86e2dea62e9c0f14cf7c94b258619de

        SHA512

        e305d190287c28ca0cc2e45b909a304194175bb08351ad3f22825b1d632b1a217fb4b90dfd395637932307a8e0cc01da2f47831fa4eda91a18e49efe6685b74b

      • C:\Users\Admin\AppData\Local\Temp\~DFA518A5D5BEF81111.TMP

        Filesize

        16KB

        MD5

        3158b0981a6b9642d1a3bcf42dd16712

        SHA1

        3caa208725e180cac4ddc73d745b29aeebbdcde4

        SHA256

        043097ae362ac0c80d88860fd8b4c5a56d5234c0a5926e2707fe6f3433a8d0d2

        SHA512

        98f24865516de854a58ca8a8fd434279f3293f6a8df0b7d4fd502e29f4244019ac63033c77e7231d368b8e4bec5552fe1c0aa1b6ad3bd34302d9b1e386a2be6a

      • memory/740-195-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-194-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-196-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-200-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-206-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-205-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-204-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-203-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-202-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB

      • memory/740-201-0x000001774FD00000-0x000001774FD01000-memory.dmp

        Filesize

        4KB