Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
Journal-http.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Journal-http.hta
Resource
win10v2004-20241007-en
General
-
Target
Journal-http.hta
-
Size
29KB
-
MD5
439ba39a07845e334c3c4422a96bc72b
-
SHA1
20d5b07d9d525e003886c8ed82dc5bf98d52f99c
-
SHA256
836c97307357a8f7a318cf0206b6f1aff82cc71c80fd37ebbfd0777a2dff483a
-
SHA512
3f7145abe604c6ba48dfe175dc4311cb7f399b49b5707e8d03df5dc3e68458c156ab0ceee34be558a603524575767bfb23eec9ef8fba1fa48ab8cbf3c1373d4f
-
SSDEEP
384:kdeiNYnl3Q/2irLwQbyACD1JaSisfUD2O3Al3l0YKxAV6/a:kE3Q/T/weydi4s2O3Al3lqxRS
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.180.12:7810/l6Pj
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; Xbox)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 1 IoCs
Processes:
Journal-http.exepid Process 2104 Journal-http.exe -
Loads dropped DLL 2 IoCs
Processes:
mshta.exepid Process 2092 mshta.exe 2092 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exeJournal-http.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Journal-http.exe -
Processes:
mshta.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
mshta.exedescription pid Process procid_target PID 2092 wrote to memory of 2104 2092 mshta.exe 30 PID 2092 wrote to memory of 2104 2092 mshta.exe 30 PID 2092 wrote to memory of 2104 2092 mshta.exe 30 PID 2092 wrote to memory of 2104 2092 mshta.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\Journal-http.hta"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\rad30F2C.tmp\Journal-http.exe"C:\Users\Admin\AppData\Local\Temp\rad30F2C.tmp\Journal-http.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5556d332b12fc2a7db2d25cd985fa81de
SHA1d4ea756edd50b3a148d505e0e9a79404a4d2ed78
SHA2560635b21eb0e6c08cc8e7188c78eb1fa569cce9b48118d104bd6370c1b9b3d365
SHA5122adcbf98de59f27a0a15426f764418a796f5afc0264b998691735e2973960534e26d53e6c685d0ca43256db88039e6fcfa2a699eb0726576e05b032c19e72d18