Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
7c719c617c6294974d9a37258c42b3ae.hta
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7c719c617c6294974d9a37258c42b3ae.hta
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
7c719c617c6294974d9a37258c42b3ae.hta
-
Size
11KB
-
MD5
7c719c617c6294974d9a37258c42b3ae
-
SHA1
5dcf053d10b035348b139cd51ca43be9ecd63f87
-
SHA256
c1b42cead41649bbc060e01a1c3b1748a1b4f4f08b01583ea8737d9289ab116b
-
SHA512
64a184b71f45157c02eab63bdb021ab9e9bcd2533028e687420e55e0c891c17c08a500b969115a7d4282b92e4059ceb47de2c074706a8dfac54fed5148e4e7dc
-
SSDEEP
192:Z4E4I4/405agwx4B4B4B4B4n4B4B4a41+47Z4e4L49j24mB4N4Xv4V4z4h4h4h4V:Z1VEFMIIIICIIF6+GZX2QqPBiOveEIIH
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28 PID 2236 wrote to memory of 2316 2236 mshta.exe 28
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\7c719c617c6294974d9a37258c42b3ae.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\ProgramData\qListDataTypeDateTime.dll,D2D1CreateFactory2⤵PID:2316
-