Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
03e3158b713d8e9dfcf36f26da65d77a.hta
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
03e3158b713d8e9dfcf36f26da65d77a.hta
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
03e3158b713d8e9dfcf36f26da65d77a.hta
-
Size
11KB
-
MD5
03e3158b713d8e9dfcf36f26da65d77a
-
SHA1
e5d037bfac4573b83a4bfa39f44666f752408e4f
-
SHA256
b13719846c027dfc8a39dc15152357d2298a20494ad52891686d7636a165df99
-
SHA512
c0f8c04d258c7339eabc7711e8845410fda6d0a111b35ffc4a26dc7ee090c5268a020dbb5f514a3267b02f02fe0ed585eb8dda024c76b43a048e914940b759a8
-
SSDEEP
192:j444b4/46PxSgl44B4B4B4B4T4B4B4a424xq4Rm44Rl4Azcj24m4N428v4T4z4hS:jxSE2IIIIOIIFDzz46gq3iCvcEIIIN/k
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28 PID 3004 wrote to memory of 2836 3004 mshta.exe 28
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\03e3158b713d8e9dfcf36f26da65d77a.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\ProgramData\qLinkStatusCopiedValues.dll,D2D1CreateFactory2⤵PID:2836
-