General

  • Target

    hcl_net.hta

  • Size

    3KB

  • Sample

    230713-jwzazafg78

  • MD5

    9c166b7c49e30a25ba012cee1095f95c

  • SHA1

    27dff755c058dfc8b3a3ee3069d896f3c7a06a91

  • SHA256

    64a9d75dd5248c5dea25ed825506581b99821e0bd26a8f8efa88c5cadab7917d

  • SHA512

    df6cdd20fb26d83ebd600d8d5863a2fb843c729404c8f83152d81b2da0d73ba97c74b3d3246f078db0ae25c20bf10256a3f2e6f0dc17d3f33fe9ccb27d69e37d

Score
8/10

Malware Config

Targets

    • Target

      hcl_net.hta

    • Size

      3KB

    • MD5

      9c166b7c49e30a25ba012cee1095f95c

    • SHA1

      27dff755c058dfc8b3a3ee3069d896f3c7a06a91

    • SHA256

      64a9d75dd5248c5dea25ed825506581b99821e0bd26a8f8efa88c5cadab7917d

    • SHA512

      df6cdd20fb26d83ebd600d8d5863a2fb843c729404c8f83152d81b2da0d73ba97c74b3d3246f078db0ae25c20bf10256a3f2e6f0dc17d3f33fe9ccb27d69e37d

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks