MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 59707a70be5a6f88ec5e4a404479ba69457d8b34358e58e9399d2f327a2e5005. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 59707a70be5a6f88ec5e4a404479ba69457d8b34358e58e9399d2f327a2e5005
SHA3-384 hash: 5bb51c54513f21409e8caa6a2eb6323fdcf7bef762c4d2846df463c7856fcc2bb8916f73a6782969a6d48740553e37ce
SHA1 hash: c40f4810c85f4c64f5a11932d2e06570de0d87aa
MD5 hash: d2cf235a38c1f40b59379fcf9d2ab3cf
humanhash: cardinal-green-mississippi-red
File name:Q4_Report.hta
Download: download sample
File size:3'067 bytes
First seen:2025-11-29 05:32:49 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 48:I/h+PTuIJcF7DUPBK6ttqKShq963OV/PeMez3ZZPBwvJED+EPBVoA6K9P6WXaNEV:I+u0cFXix8Kn63EXeMedPwvJLyyAZVJL
TLSH T13651D753F816AD208D5F65F311324E1ABF9095236012AC57BA8C84989F497E4E0EE7F7
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
autorun trojan virus sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://80.78.18.241/Word.exe
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 go
Result
Gathering data
Verdict:
Malicious
File Type:
hta
Detections:
HEUR:Trojan.Script.Generic Trojan.Win64.Agent.sb Trojan-Dropper.Win32.Agent.sb Trojan-Downloader.JS.SLoad.sb Trojan.Win32.Reconyc.sb Trojan.Win32.Agent.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Win64.Goshell.gen
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Drops PE files with benign system names
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Legitimate Application Dropped Executable
Sigma detected: Schedule system process
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: System File Execution Location Anomaly
Switches to a custom stack to bypass stack traces
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1822727 Sample: Q4_Report.hta Startdate: 29/11/2025 Architecture: WINDOWS Score: 100 66 Antivirus detection for URL or domain 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 Sigma detected: Schedule system process 2->70 72 6 other signatures 2->72 8 mshta.exe 1 2 2->8         started        13 svchost.exe 2->13         started        15 svchost.exe 1 2->15         started        17 5 other processes 2->17 process3 dnsIp4 64 80.78.18.241, 49718, 80 CYBERDYNELR Cyprus 8->64 54 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 8->54 dropped 82 Uses schtasks.exe or at.exe to add and modify task schedules 8->82 84 Drops PE files with benign system names 8->84 19 svchost.exe 1 8->19         started        22 cmd.exe 13 8->22         started        24 schtasks.exe 1 8->24         started        34 2 other processes 8->34 86 Changes security center settings (notifications, updates, antivirus, firewall) 13->86 26 MpCmdRun.exe 1 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        32 conhost.exe 17->32         started        file5 signatures6 process7 signatures8 74 Multi AV Scanner detection for dropped file 19->74 76 Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners) 19->76 78 Switches to a custom stack to bypass stack traces 19->78 80 Potentially malicious time measurement code found 19->80 36 conhost.exe 19->36         started        38 chrome.exe 2 22->38         started        41 conhost.exe 22->41         started        43 conhost.exe 24->43         started        45 conhost.exe 26->45         started        47 conhost.exe 34->47         started        49 conhost.exe 34->49         started        process9 dnsIp10 62 192.168.2.4, 138, 443, 49596 unknown unknown 38->62 51 chrome.exe 38->51         started        process11 dnsIp12 56 www.google.com 172.253.122.99, 443, 49733 GOOGLEUS United States 51->56 58 e6066.dsca.akamaiedge.net 23.4.34.36, 443, 49721 AKAMAI-ASUS United States 51->58 60 2 other IPs or domains 51->60
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Script-ActiveX.Trojan.Heuristic
Status:
Malicious
First seen:
2025-11-29 05:19:55 UTC
File Type:
Text (HTML)
Extracted files:
2
AV detection:
8 of 36 (22.22%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution persistence
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Scheduled Task/Job: Scheduled Task
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Browser Information Discovery
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HTML Application (hta) hta 59707a70be5a6f88ec5e4a404479ba69457d8b34358e58e9399d2f327a2e5005

(this sample)

  
Delivery method
Distributed via web download

Comments