Analysis
-
max time kernel
150s -
max time network
92s -
platform
windows7_x64 -
resource
win7 -
submitted
30-06-2020 05:56
Static task
static1
Behavioral task
behavioral1
Sample
LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe
-
Size
347KB
-
MD5
1d2585eb104895bd6a4059cee636cee7
-
SHA1
79437779f16915a20a5a38a768242427eed08401
-
SHA256
1bf9db8285719827160844a6a51292c30346c3099a4753c92177cba4e59b2404
-
SHA512
b5733f78528110f8f04c0df961f38a974d04a888a9b920ad48758954fadfa5a43d46106537dbfa9877acd25d58631d9c1cd4ffac709f13f7ad6ea43869b9d201
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
LIST OF PRODUCTS AND SPECIFICATIONS.bat.execmd.exedescription pid process Token: SeDebugPrivilege 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe Token: SeDebugPrivilege 1692 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
LIST OF PRODUCTS AND SPECIFICATIONS.bat.execmd.exepid process 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1692 cmd.exe 1692 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
LIST OF PRODUCTS AND SPECIFICATIONS.bat.exeExplorer.EXEcmd.exedescription pid process target process PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 896 wrote to memory of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 1276 wrote to memory of 1692 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 1692 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 1692 1276 Explorer.EXE cmd.exe PID 1276 wrote to memory of 1692 1276 Explorer.EXE cmd.exe PID 1692 wrote to memory of 1864 1692 cmd.exe cmd.exe PID 1692 wrote to memory of 1864 1692 cmd.exe cmd.exe PID 1692 wrote to memory of 1864 1692 cmd.exe cmd.exe PID 1692 wrote to memory of 1864 1692 cmd.exe cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
LIST OF PRODUCTS AND SPECIFICATIONS.bat.exeLIST OF PRODUCTS AND SPECIFICATIONS.bat.execmd.exedescription pid process target process PID 896 set thread context of 1636 896 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe PID 1636 set thread context of 1276 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe Explorer.EXE PID 1636 set thread context of 1276 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe Explorer.EXE PID 1692 set thread context of 1276 1692 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
LIST OF PRODUCTS AND SPECIFICATIONS.bat.execmd.exepid process 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1636 LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1864 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe"C:\Users\Admin\AppData\Local\Temp\LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe"{path}"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/896-1-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/1636-2-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1636-3-0x000000000041E2F0-mapping.dmp
-
memory/1692-4-0x0000000000000000-mapping.dmp
-
memory/1692-5-0x000000004A480000-0x000000004A4CC000-memory.dmpFilesize
304KB
-
memory/1692-7-0x0000000003210000-0x0000000003399000-memory.dmpFilesize
1.5MB
-
memory/1864-6-0x0000000000000000-mapping.dmp