Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
test.hta
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
test.hta
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
test.hta
-
Size
147B
-
MD5
0144b746edf817419d3fe42b0c50fe92
-
SHA1
f469ffccdf5213f4be17608d2b44d738a604b807
-
SHA256
7e360e8b091aab014189554faeef805a3ae2ffd11124fd4ffdd827abf3be7306
-
SHA512
da5447e4ea8313b7cfdc5bb7c3dffe8c21cf2ae5b07c653f0abd125415647f71330c84502f5a0eafdbd7b1a465d0de103ed9598e9183d6587f08299d0df683a2
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 6 1000 mshta.exe 9 1000 mshta.exe 17 1000 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe