Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
c5d9bba6d92154976f4dbe02fb197cb4.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5d9bba6d92154976f4dbe02fb197cb4.hta
Resource
win10v2004-20240226-en
General
-
Target
c5d9bba6d92154976f4dbe02fb197cb4.hta
-
Size
125KB
-
MD5
c5d9bba6d92154976f4dbe02fb197cb4
-
SHA1
bed41f710cbfdd8e4775d4ca58fd7cb92f5b43df
-
SHA256
39d3636bdb488c207ac0f7173d9194aaaeed94a800297e007fa3f0879b39c9f7
-
SHA512
5e57786511cd3b6b265fd2b5b2bc04ac7d523f521a2c2d916956bc30de97106c3d762330d26b93f2531763411915a8c97fe504e78c7d1a3b70d37aa278e86494
-
SSDEEP
1536:lHW07/gfbVk2+UoszsGtm8qF+yogaq0ZqEiESkL3RSEF0+qF:M07Xuti+Bq0ZqzESkL3RSEF0+qF
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2320 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2348 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2476 2320 mshta.exe 28 PID 2320 wrote to memory of 2476 2320 mshta.exe 28 PID 2320 wrote to memory of 2476 2320 mshta.exe 28 PID 2320 wrote to memory of 2476 2320 mshta.exe 28 PID 2476 wrote to memory of 2552 2476 mshta.exe 30 PID 2476 wrote to memory of 2552 2476 mshta.exe 30 PID 2476 wrote to memory of 2552 2476 mshta.exe 30 PID 2476 wrote to memory of 2552 2476 mshta.exe 30 PID 2552 wrote to memory of 2348 2552 cmd.exe 32 PID 2552 wrote to memory of 2348 2552 cmd.exe 32 PID 2552 wrote to memory of 2348 2552 cmd.exe 32 PID 2552 wrote to memory of 2348 2552 cmd.exe 32
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\c5d9bba6d92154976f4dbe02fb197cb4.hta"1⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\utjpc\35600y5s.h"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\utjpc\d.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
PID:2348
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56aff617340ec7545ca684d4582379653
SHA1fb33b52a050a73ef4a96537c30ecc8d83912a206
SHA256a39df85862fa95da04990bc27245b179e7aa7f4ca03ee1800940e265eec6dacb
SHA51211a6df961348070ee12dfdc25e45ae51c61812373374beeb9727f6c9088e6e2c53168df723a2878198d258e7de50fb562be5ca3326bd7d8aa8c64ef03f2479bf
-
Filesize
90B
MD5b5999e610d011cbe3178b20018d0d854
SHA14ce1f8704ab393714bd5856be715a74e37fa3d77
SHA2568b3ba930117699a253b8aac138a7656602ecf09dafbf6ee261a28ba465128b43
SHA512c549c47d86a16e087697037167059f6b633d6d851df919bd5c1d0b75ea08bc7379948deafe78214de3da47c63de4903c3fa1ca038200953c986a5de12951beb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SZ2A9SGY\jquery.min[1].js
Filesize70KB
MD510092eee563dec2dca82b77d2cf5a1ae
SHA165cbff4e9d95d47a6f31d96ab4ea361c1f538a7b
SHA256e23a2a4e2d7c2b41ebcdd8ffc0679df7140eb7f52e1eebabf827a88182643c59
SHA512cc92cf5a9b3a62a18af432fdffb81b76da84e2f43ce3c7800a919c10809118d0611e29a47f103ff3df18a54d5331bc5f06ef4771dc406cc763b30ff2a66a3e81