Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
fuck_niggers_8.hta
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
fuck_niggers_8.hta
Resource
win10v2004-20230621-en
General
-
Target
fuck_niggers_8.hta
-
Size
47KB
-
MD5
f540c1239b6be3493bcf0b37eadec775
-
SHA1
c7964aa243408c4721203fbe387476d59a2255d9
-
SHA256
a53d92946047621132de3c9469b18a297f557d6a1b8588fd93c107cee7f0a572
-
SHA512
54757a9538c0ff4120fb68b73a265fbcb987260c869ec2e8945715353c3f5a8a0558e2a937698c67951ff795704b26f4f4042c1dd77c2408aa20451c90e6df32
-
SSDEEP
768:YPEpxUkObj6fpPJxUWPePmeTe5WKb1eAYFel22GBRIekYWX9Oe5LAopD2Tn80RH5:YPEpxUkObj6fpPJxUWPePmeTe5WKb1el
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 16 3940 wscript.exe 32 3940 wscript.exe 48 3940 wscript.exe 49 3940 wscript.exe 69 3940 wscript.exe 74 3940 wscript.exe 85 3940 wscript.exe 86 3940 wscript.exe 87 3940 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{461C7135-8D6D-4C29-84AE-6EEB3E196BA0}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3940 3148 mshta.exe 83 PID 3148 wrote to memory of 3940 3148 mshta.exe 83 PID 3148 wrote to memory of 3940 3148 mshta.exe 83
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\fuck_niggers_8.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\ProgramData\fuck_all_niggers.vbs2⤵
- Blocklisted process makes network request
PID:3940
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f07c71e933512f13c613a4848f7be660
SHA1d0caaffada0fa76df2c3f6dfa8e3fb441881f42f
SHA2564bfe2207e97529a64108dd03978f894f637a26b7bbf3307d9e4a97f813f613b8
SHA5123d5c6829b52d93c8657d9b770589662f4c9bdbdab51f79a7a9a388f43ad644239ca5ec56c4b144a88a2cec54610aeaeec79b657a510df997c7f45ebb5bb29552