Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 12:15

General

  • Target

    c5d9bba6d92154976f4dbe02fb197cb4.hta

  • Size

    125KB

  • MD5

    c5d9bba6d92154976f4dbe02fb197cb4

  • SHA1

    bed41f710cbfdd8e4775d4ca58fd7cb92f5b43df

  • SHA256

    39d3636bdb488c207ac0f7173d9194aaaeed94a800297e007fa3f0879b39c9f7

  • SHA512

    5e57786511cd3b6b265fd2b5b2bc04ac7d523f521a2c2d916956bc30de97106c3d762330d26b93f2531763411915a8c97fe504e78c7d1a3b70d37aa278e86494

  • SSDEEP

    1536:lHW07/gfbVk2+UoszsGtm8qF+yogaq0ZqEiESkL3RSEF0+qF:M07Xuti+Bq0ZqzESkL3RSEF0+qF

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\c5d9bba6d92154976f4dbe02fb197cb4.hta"
    1⤵
    • Blocklisted process makes network request
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" "C:\ProgramData\utjpc\35600y5s.h"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\ProgramData\utjpc\d.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 localhost
          4⤵
          • Runs ping.exe
          PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\utjpc\35600y5s.h

    Filesize

    72KB

    MD5

    6aff617340ec7545ca684d4582379653

    SHA1

    fb33b52a050a73ef4a96537c30ecc8d83912a206

    SHA256

    a39df85862fa95da04990bc27245b179e7aa7f4ca03ee1800940e265eec6dacb

    SHA512

    11a6df961348070ee12dfdc25e45ae51c61812373374beeb9727f6c9088e6e2c53168df723a2878198d258e7de50fb562be5ca3326bd7d8aa8c64ef03f2479bf

  • C:\ProgramData\utjpc\d.bat

    Filesize

    90B

    MD5

    b5999e610d011cbe3178b20018d0d854

    SHA1

    4ce1f8704ab393714bd5856be715a74e37fa3d77

    SHA256

    8b3ba930117699a253b8aac138a7656602ecf09dafbf6ee261a28ba465128b43

    SHA512

    c549c47d86a16e087697037167059f6b633d6d851df919bd5c1d0b75ea08bc7379948deafe78214de3da47c63de4903c3fa1ca038200953c986a5de12951beb3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SZ2A9SGY\jquery.min[1].js

    Filesize

    70KB

    MD5

    10092eee563dec2dca82b77d2cf5a1ae

    SHA1

    65cbff4e9d95d47a6f31d96ab4ea361c1f538a7b

    SHA256

    e23a2a4e2d7c2b41ebcdd8ffc0679df7140eb7f52e1eebabf827a88182643c59

    SHA512

    cc92cf5a9b3a62a18af432fdffb81b76da84e2f43ce3c7800a919c10809118d0611e29a47f103ff3df18a54d5331bc5f06ef4771dc406cc763b30ff2a66a3e81